Hello Watt Song
It looks like you've received a concerning email about your Azure resource being used for DDoS and brute force activities. Here's a step-by-step approach to tackle this issue:
- Please Check and review your Azure Activity Logs for any unusual or unauthorized access patterns to your VM. You can access the logs through the Azure Portal.
- Enable JIT access for your VM to restrict exposure to only when you need to connect, reducing vulnerability to attacks.
- If you need to connect to your VM, consider using Azure Bastion for a secure connection via the Azure portal, which does not expose your VMs to the public internet.
- Review and update your NSG Rules to limit incoming traffic to your VM. Make sure to restrict RDP access to specific IP addresses if necessary.
- Setting up a VPN can provide an encrypted tunnel for remote access, keeping your VM less exposed.
- Leverage Azure Security Center to assess and improve your security posture. It can offer insights into any vulnerabilities and recommendations tailored to your setup.
Review Best Practices
- Use complex and long passwords for any user accounts on your VMs.
- Regularly update your software, including the OS and any applications, to protect against known vulnerabilities.
If the attacks persist, consider enabling logging and alerts to monitor for suspicious activities continuously. Check for abnormal connections, repeated failed logins, or unusual resource utilization in your VM.
Can you please update us if the action plan provided by was helpful?
Should there be any follow-up questions or concerns, please let us know and we shall try to address them. Please don’t forget to close the thread by clicking "Accept the answer" and "Yes" wherever the information provided helps you, as this can be beneficial to other community members.