I have several public servers that we remote in to through remote desktop services. I have Remote Desktop - User Mode (tcpip-in)
set to only allows specific remote ip addresses through. I have checked and the windows firewall is enabled. I have all of the other rules for remote desktop disabled.
I am still getting events such as these in my event log:
An account failed to log on.
Subject:
Security ID: NULL SID
Account Name: -
Account Domain: -
Logon ID: 0x0
Logon Type: 3
Account For Which Logon Failed:
Security ID: NULL SID
Account Name: Administrator
Account Domain:
Failure Information:
Failure Reason: Unknown user name or bad password.
Status: 0xC000006D
Sub Status: 0xC0000064
Process Information:
Caller Process ID: 0x0
Caller Process Name: -
Network Information:
Workstation Name: \\94.102.52.22
Source Network Address: 94.102.52.22
Source Port: 54358
I do not have the option for a hardware firewall so I have to rely on the windows firewall, which has been fine up till now.
How are they able to get to the login option to begin with? Shouldn't the windows firewall block them before they get that far?