在高级--安全策略:里面 密码猜测保护,增加了一项。原来针对pop3 imap4等密码探测是没有保护的,现在看帮助应该是可以自动阻止相应协议上的探测行为了。
鉴于现在有大量的密码探测行为,中过招的朋友可以考虑升级计划。
Block IP addresses suspicious of password guessing attacks
If you find out that anyone attempts to guess password to any account (presumption based on several unsuccessful authentication attempts), you can enable this option to block their IP address.
Warning
Each blocking action applies to a particular service only. This implies that if for example a POP3 attack is detected, the user still can login via Webmail.
IP address is blocked when the count of ten unsuccessful login attempts is reached within one minute. After five minutes without an attack attempt, the service is unblocked automatically for the IP address.
Never block this IP address group
It is possible to set trustworthy IP address groups (e.g. local addresses) and leave them out of the blocking rule.
Block user accounts probably targeted by password guessing
The option described above blocks only the affected IP address for a particular service. However, the same account may be attacked by using another service.
You can use this option to block the user account if attacked.
Warning
The account is blocked when the count of ten unsuccessful login attempts is reached within one minute. The account gets unblocked automatically after five minutes without an attack attempt or this can be done manually by clicking on Unlock All Accounts Now. |