Netsdk Software RdpGuard v7.9.9

Netsdk Software RdpGuard v7.9.9
RdpGuard is a host-based intrusion prevention system (HIPS) that protects your Windows Server from brute-force attacks on various protocols and services (RDP, FTP, IMAP, POP3, SMTP, MySQL, MS-SQL, IIS Web Login, ASP.NET Web Forms, MS Exchange, RD Web Access, VoIP/SIP, SSH, etc).
It monitors the logs on your server and detects failed logon attempts. If the number of failed logon attempts from a single IP address reaches a set limit, the attacker's IP address will be blocked for a specified period of time.
Why do you need it?
Many Windows Server machines are under constant attack. Network scanners and RDP brute-force tools work 24/7. Eventually they may find a password to access your server! Moreover, RDP brute-force attacks abuse server resources (CPU, RAM, Disk Space and Network Bandwidth).
Take a look at your server's Security EventLog. How many failed login attempts do you see? The log may note thousands of failed login attempts from a single IP address. This means that someone is trying to find a password to access your server.
24 May, 2022 - RdpGuard Version 7.9.9 Released
New custom action events (maintenance expiration, new version)
Customizable exclusions for User Logged In custom action event
IP Cloud and Geo-IP improvements and optimizations
RD-WEB Engine now reports user name
FTP Engine improved to support new FileZilla log format
Improved support for Windows Filtering Platform
Fixed an issue with MS-Exchange (SMTP) monitoring configuration
Whois links now open in default browser
Minor UI improvements and bug-fixes
New custom action events (maintenance expiration, new version)
Customizable exclusions for User Logged In custom action event
IP Cloud and Geo-IP improvements and optimizations
RD-WEB Engine now reports user name
FTP Engine improved to support new FileZilla log format
Improved support for Windows Filtering Platform
Fixed an issue with MS-Exchange (SMTP) monitoring configuration
Whois links now open in default browser
Minor UI improvements and bug-fixes


Warning! You are not allowed to view this text.