MS-SQL Server Brute-Force Protection. How to Stop brute-force attacks on MS-SQL Server.
Intrusion prevention system for your Windows Server

How to Stop Brute-Force Attacks on MS-SQL Server

If you are running Microsoft SQL Server you probably aware of brute-force attacks on SA account. Almost every SQL server connected to the Internet is under constant attack.

Once a hacker has access to a SA (DBA) account, or even a normal user account, it can get full access to the file system on a server, or even to the files on the network to which it is connected.

If your SQL server accepts remote connections, System Event Log may contain thousands of entries like below:

Failed SA Logon Attempts

Login failed for user 'sa' error 18456.

This means that someone is trying to get access to your server. Brute-force attacks may also abuse your server resources (CPU, RAM and Bandwidth).

RdpGuard allows you to protect your MS SQL Server from brute-force attacks.

It monitors the EventLog and detects failed login attempts. If the number of failed login attempts from a single IP address reaches a set limit (three by default), the attacker's IP address will be blocked!

For Windows XP, Vista, 7, 8, 8.1, 10 and Windows Server 2003 (R2), 2008 (R2), 2012 (R2), 2016

See Also

How to Enable and Configure MS-SQL Brute-Force Protection

RdpGuard 5.1.1 Free Trial

RdpGuard protects:

Social Connection
RdpGuard Logo
Like Us!
People like RdpGuard!
People like us
Our Other Products
Windows Client for Amazon Glacier - new low-cost storage for data archiving and backup.
Copyright © 2012-2018 NetSDK Software. All rights reserved.  Terms of Use.  Privacy Policy.