共用方式為

External Exchange Web Service configuration

Tang, Ken 65 信譽點數
2025-01-27T08:17:47.8266667+00:00

image

We are using Exchange 2016 with Hybrid setup. Eventually we have suspect some brute force account attack on our On-Perm Exchange web service, which makes account lock frequently.

We have tried ews, activesync and autodiscover web service may face this login attempt.

Does any one got idea how to avoid this situation?

Exchange | Exchange伺服器 | 其他
Exchange | Exchange伺服器 | 其他

由 Microsoft 開發的強大電子郵件、日曆和協作平台,專為企業級通訊和資料管理而設計。不符合特定類別的雜項主題。

0 則留言 沒有留言
{count} 則投票

1 個回答

排序依據: 最實用
  1. 匿名
    2025-01-28T02:54:21.8266667+00:00

    Hi @Tang, Ken,

    Welcome to the Microsoft Q&A platform!

    Based on your description, you are dealing with a situation where the On-Perm Exchange network service has been hit by some brute force account attacks. Here are some strategies to help mitigate brute force attacks against your Exchange 2016 Hybrid setup:

    1. Adding an extra layer of security can significantly reduce the risk of unauthorized access.
    2. Limit access to Exchange services via VPN. This ensures that only users connected to the internal network can access the services.
    3. Configure your Active Directory to lock accounts after a certain number of failed login attempts. This helps prevent brute force attacks.
    4. Adding reCAPTCHA to your OWA/ECP login page can help block automated login attempts.
    5. Implement authentication policies to detect and block password spray attacks, which are a type of brute force attack.
    6. Regularly monitor your logs for suspicious activity and block IP addresses that show signs of brute force attempts.

    Please feel free to contact me for any updates. And if this helps, don't forget to mark it as an answer.

    Best,

    Jake Zhang


您的回答

答案可由問題作者標示為「已接受」,而由仲裁者標示為「推薦」,這可協助使用者知道答案解決了作者的問題。