<Task Name="BlockVPNBrutersBySecurity6273" Active="true">
<!-- the description ..-->
<Description>
This rule checks the security Log for failed VPN attempts
</Description>
<!-- this is the time a temporary ban is issued for, in seconds-->
<LockTime>
3600
</LockTime>
<!-- this is used for rules that only need new events for evaluating.
- If you dont know what this does, leave it set to false
- If you set this to true, it means that the task will only receive events it has not already received
- If you set this to false, it means that the task will receive all events of its timeframe, everytime it is polled
(e.g. task gets events provided until they fall out of the timeframe)-->
<OnlyNew>
False
</OnlyNew>
<!-- this is the timeframe (in seconds) to be inspected-->
<EventAge>
120
</EventAge>
<!-- this is the amount of times an entry must occur within the time frame to be considered a brute force attempt-->
<TriggerCount>
5
</TriggerCount>
<!-- after this amount of times temporarily banned, the ban will become permanent (enter a negative number to disable permanent bans) -->
<PermaBanCount>
3
</PermaBanCount>
<!-- This is the place where the rule looks for entries, separated by comma-->
<EventPath>
Security
</EventPath>
<!-- This was introduced because sole regex matching is too CPU intensive. it incredibly speeds up the filtering when you enter some (or at least one) words that MUST be contained in the LogEntry to undergo the regex inspection-->
<RegexBoosters>
<Booster>6273</Booster>
<Booster>CallingStationID</Booster>
</RegexBoosters>
<!-- This is the regex that tries to extract an IP from the entries that contain the booster words, for testing use regex101.com-->
<Regex>
<Data Name=.CallingStationID.>(\d*.\d*.\d*.\d*)
</Regex>
</Task>
NPS deny task: