jerome_itable Lv2Posted 27 Mar 2024 08:18
  
The most effective Sangfor NGAF function to protect internal hosts from SSH and RDP brute-force attacks is:

4. IPS (Intrusion Prevention System)

Here's why IPS is the best choice for this scenario:

    Brute-force attack detection: IPS is designed to monitor network traffic for malicious activity, including brute-force login attempts. It can identify patterns of repeated failed login attempts from a single source, which is a hallmark of brute-force attacks.

    Blocking malicious traffic: Once IPS detects a brute-force attack, it can take action to block the attacker's IP address or throttle login attempts after a certain number of failures. This significantly reduces the risk of successful unauthorized access.

    Real-time protection: IPS operates in real-time, constantly analyzing network traffic for threats. This ensures immediate response to ongoing brute-force attacks.

While the other options you mentioned offer valuable security features, they are not directly suited for this specific task:

    APT Detection: APT (Advanced Persistent Threat) detection focuses on identifying sophisticated, targeted attacks, which may not involve brute-force methods.

    RT Vulnerability Scanner: This function identifies vulnerabilities in systems and applications, but it doesn't actively block attacks that exploit those vulnerabilities.

    Web App Protection: This feature is designed to secure web applications from attacks, not SSH or RDP services typically used for remote server access.

By implementing Sangfor NGAF's IPS and configuring it with appropriate rules for SSH and RDP traffic, you can significantly strengthen your defenses against brute-force attacks and protect your internal hosts.

I Can Help:

Change

Moderator on This Board

0
2
4

Started Topics

Followers

Follow

67
14
3

Started Topics

Followers

Follow

3
0
2

Started Topics

Followers

Follow

1
131
3

Started Topics

Followers

Follow

Board Leaders