4776 is for NTLM authentication. Unless the attempt is directly made against the domain controller, you will not see the event 4625 with the source IP on your DCs. You will see the event on the server being "attacked". And since you don't have the info in the 4776... You need more data :) And you can get that data by enabling the NTLM auditing (you can follow this procedure to enable it on your DCs: https://learn.microsoft.com/en-us/defender-for-identity/configure-windows-event-collection#event-id-8004). Once this is on, you will get an event 8004 in the NTLM/Operational event log with the the name of the server being attacked.
Detect real source brute force attacker
Hello to all,
I hope in your support for a problem that I have encountered on these days, I have a DC windows 2012R2 server from where I received random notifications (I was configured task notificatin of failed login attempts 4776 and lock account), going to see the logs I see that the Source Workstation always changes with random names thus defeating any attempt to identify the source machine.
No server is exposed on the Internet so the attack is certainly from the internal network but how do you think it is possible to identify the real IP address of the attacker?
Thank you!
Andrew
Windows for business | Windows Server | Devices and deployment | Configure application groups
-
Pierre Audonnet - MSFT 10,191 Reputation points Microsoft Employee
2021-11-23T02:48:06.65+00:00
3 additional answers
Sort by: Most helpful
-
Limitless Technology 39,921 Reputation points
2021-11-22T20:53:26.203+00:00 Hello @Anonymous
If the login attempt is done using computer account, there is the likeliness to be a multi distributed attack or malware spread through the network.
I would recommend update security signatures to latest on some of the Source Workstation detected, to try and identify the attack source.
If nothing is reported in the scans, I would recommend to report it at Microsoft Security Response Center
https://www.microsoft.com/en-us/msrc
Hope this helps with your query,
-------
--If the reply is helpful, please Upvote and Accept as answer-- -
MotoX80 36,291 Reputation points
2021-11-22T21:35:42.13+00:00 Do you see any event id 4625's? If not, you may need to modify your audit policies.
https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4625
https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4624
-
Andrea 276 Reputation points
2021-11-24T18:03:21.157+00:00 Thank you for your answers, I've enabled NTLM auditing but attacker no longer presence on server event logs.
There are some software to monitor this attack and auto response it (IPS) ?