In order to provide optimal remote desktop protection, SunFirewall Cybersecurity system offers a number of features, specifications of each of which, we have detailed in separate articles. But what is particularly handy in both the RDP protection itself and also in presenting invaluable meta data regarding it, is a detailed report log, with tables, graphs, and maps, that give a thorough outlook into where, when, who, how many, how much of brute force attacks have been launched against your system through remote desktop. Below you will find a full, exhaustive, rigorous description of what you will find in each tab of the report section, giving you a transparent idea of what makes Sun Firewall stand out as a remote desktop protection system.
In the second tab of the report section of the Sun Firewall remote desktop protection software , brute force attack details are reported, categorized by country; here is how it works: in the first column the name of the country with the highest numbers of attacks is shown. in the next column the total number of failed logins coming from that country is seen. in the third column number of blocked IP addresses of that country is reported, which is usually about one third of the failed login number, as IP addresses are blocked after 3 failed attempts, and usually, but not always, any given IP makes three attempts within 12 hours; And on the fourth column, the time of the last attack made by an IP from the country is shown.
When clicked on, his tab opens into a page featuring 4 line graphs, comparing and contrasting the rate of incoming brute force attacks in 4 time frames: the last hour, the last 24 hours, the last week, and the last months, accurate by the minute. Another level of accuracy is also provided through zooming analysis of the lines. You can scroll into each part of the rising, falling or plateauing line, and see the number of attacks having happened at that minute, hour, day, and week, respectively. The total number of attacks in each window of time is written above its designated graph.
Tab 5 consists of another 4 line graphs presenting summarized data in the same 4 time frames as the previous tab: last our, last day, last week, and last month, but this time on the blocked IP addresses. On these 4 graphs, too, you can scroll up and down, zooming in and out, observing at what minute of the hour, what hour of the day, what day of the week, and what week of the month, what number of IP addresses were blocked, which gives precise insight into what time frames the least, and the most attacks tend to happen.
The sixth and last tab of the report section in our remote desktop protection software, sun firewall, presents 3 bar charts showcasing stats on the distribution and prevalence of brute force attacks in three windows of time, the last 24 ours, the last week, and the last year. The first graph shows the rate of hourly change in the number of IP addresses attempting to log in. The second bar chart exhibits that on what days. The last chart shows annual trends. The exact number of attacks at any point in any time period can be seen with a simple cursor hover on the bar.