ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Best Practices - Securing your Windows Server 2016 VM on Vultr

    IT Discussion
    fail2ban vultr iaas windows windows server windoes server 2016 security hosting reverse proxy vpn zerotier directaccess rds azure
    11
    55
    9.4k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller @bigbear
      last edited by

      @bigbear said in Best Practices - Securing your Windows Server 2016 VM on Vultr:

      I would guess its a brute force attempt to access my system vs a DDoS attack.

      Correct, if it was DDoS you'd know it.

      1 Reply Last reply Reply Quote 0
      • scottalanmillerS
        scottalanmiller @bigbear
        last edited by

        @bigbear said in Best Practices - Securing your Windows Server 2016 VM on Vultr:

        So I am trying to decide what the best way to block these attempts (which I imagine are more common on Vultr than Azure) would be.

        Use a Windows equivalent to Fail2Ban to shut down IP addresses that are doing this dynamically. This is what keeps attacks on Linux at bay.

        1 Reply Last reply Reply Quote 2
        • scottalanmillerS
          scottalanmiller
          last edited by

          I assume that part of the issue is that RDP is directly exposed from this machine? How else are they attacking you?

          1 Reply Last reply Reply Quote 1
          • bigbearB
            bigbear
            last edited by

            Yes at the moment it is exposed. The only difference on Azure is that the use a high level port instead of 3389.

            I would guess those who are scanning would also discover those higher number ports.

            Or do I create a Vultr firewall and restrict login attempts to particular IP address ranges?

            scottalanmillerS A 2 Replies Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller @bigbear
              last edited by

              @bigbear said in Best Practices - Securing your Windows Server 2016 VM on Vultr:

              Yes at the moment it is exposed. The only difference on Azure is that the use a high level port instead of 3389.

              I would guess those who are scanning would also discover those higher number ports.

              Or do I create a Vultr firewall and restrict login attempts to particular IP address ranges?

              Well general rule of thumb is that RDP should never be exposed directly, it's not considered a secure protocol and it is the absolutely number one target of attacks because being exposed flags you as being on Windows (making you a high profile target because you are less likely to be properly secured), flagging you as not following security best practices (making you a high profile target because you are less likely to be properly secured) and lets people know that you are paying a premium over UNIX, so you have money to spend and something to lose (the poor can't consider Windows.) So if attackers see RDP, they go after it like crazy. And the expectation from the Microsoft side is that it will never be exposed to the Internet.

              This is where a proxy or VPN are expected, always. Not that those won't also get attacked, but they have a different exposure profile, provide another layer of defence, use stronger security, can fail closed, and provide stronger authentication. Same as we were discussing in the other thread about Exchange the other day.

              DashrenderD 1 Reply Last reply Reply Quote 1
              • bigbearB
                bigbear
                last edited by

                I have no idea of a fail to ban for windows... do you have something in mind?

                If RDP is running on port 50000+ can it still be identified as RDP?

                scottalanmillerS 2 Replies Last reply Reply Quote 0
                • scottalanmillerS
                  scottalanmiller @bigbear
                  last edited by

                  @bigbear said in Best Practices - Securing your Windows Server 2016 VM on Vultr:

                  I have no idea of a fail to ban for windows... do you have something in mind?

                  https://rdpguard.com/

                  1 Reply Last reply Reply Quote 4
                  • scottalanmillerS
                    scottalanmiller @bigbear
                    last edited by

                    @bigbear said in Best Practices - Securing your Windows Server 2016 VM on Vultr:

                    If RDP is running on port 50000+ can it still be identified as RDP?

                    Yes. Moving ports does nothing.

                    1 Reply Last reply Reply Quote 1
                    • bigbearB
                      bigbear
                      last edited by

                      Thanks for the link.

                      Seems like launching a firewall and only allowing access from my office IP range would be the best start. That would at least keep the load off the server.

                      I am not sure if Vultr firewall has VPN. That could be the roaming solution though. Or Windows DirectAccess?

                      scottalanmillerS 2 Replies Last reply Reply Quote 0
                      • scottalanmillerS
                        scottalanmiller @bigbear
                        last edited by

                        @bigbear said in Best Practices - Securing your Windows Server 2016 VM on Vultr:

                        Thanks for the link.

                        Seems like launching a firewall and only allowing access from my office IP range would be the best start. That would at least keep the load off the server.

                        Yes, that will do a lot. you should have the firewall on teh Windows box doing that already anyway as a best practice. So this would only be additional to that, hopefully.

                        bigbearB 1 Reply Last reply Reply Quote 1
                        • scottalanmillerS
                          scottalanmiller @bigbear
                          last edited by

                          @bigbear said in Best Practices - Securing your Windows Server 2016 VM on Vultr:

                          I am not sure if Vultr firewall has VPN. That could be the roaming solution though. Or Windows DirectAccess?

                          It does not, but you are free to implement anything that you want. OpenVPN is very good. ZeroTier is very good. Loads of options. Most are free.

                          1 Reply Last reply Reply Quote 2
                          • bigbearB
                            bigbear @scottalanmiller
                            last edited by

                            @scottalanmiller said in Best Practices - Securing your Windows Server 2016 VM on Vultr:

                            @bigbear said in Best Practices - Securing your Windows Server 2016 VM on Vultr:

                            Thanks for the link.

                            Seems like launching a firewall and only allowing access from my office IP range would be the best start. That would at least keep the load off the server.

                            Yes, that will do a lot. you should have the firewall on teh Windows box doing that already anyway as a best practice. So this would only be additional to that, hopefully.

                            Firewall is on but not configured to allow RDP from a specific range. Honestly I didn't have trouble with Azure but I planned to go through some security best practices before launching it to my employees. Not surprised its happening though.

                            1 Reply Last reply Reply Quote 0
                            • black3dynamiteB
                              black3dynamite
                              last edited by

                              https://github.com/glasnt/wail2ban

                              scottalanmillerS 1 Reply Last reply Reply Quote 3
                              • scottalanmillerS
                                scottalanmiller @black3dynamite
                                last edited by

                                @black3dynamite said in Best Practices - Securing your Windows Server 2016 VM on Vultr:

                                https://github.com/glasnt/wail2ban

                                nice find. Anyone using it?

                                bigbearB 1 Reply Last reply Reply Quote 0
                                • bigbearB
                                  bigbear @scottalanmiller
                                  last edited by

                                  @scottalanmiller Since I'm in testing phase, and because the logo is basically a photo of a drawing, I am going all in...

                                  1 Reply Last reply Reply Quote 1
                                  • DustinB3403D
                                    DustinB3403
                                    last edited by

                                    /sarcasm

                                    Turn it off

                                    sarcasm/

                                    1 Reply Last reply Reply Quote 0
                                    • DashrenderD
                                      Dashrender
                                      last edited by

                                      JB was using a Windows version of fail2ban awhile ago.

                                      JaredBuschJ 1 Reply Last reply Reply Quote 0
                                      • JaredBuschJ
                                        JaredBusch @Dashrender
                                        last edited by

                                        @Dashrender said in Best Practices - Securing your Windows Server 2016 VM on Vultr:

                                        JB was using a Windows version of fail2ban awhile ago.

                                        I looked into and tested. Did not deploy.
                                        Related: I completely forgot about that project. WTF server was I testing that on.

                                        1 Reply Last reply Reply Quote 0
                                        • bigbearB
                                          bigbear
                                          last edited by

                                          Have had some issues with it banning the servers external WAN address when behind NAT instead of the remote IP Address. Have been sifting through code but its not an active project, just a one time port.

                                          Using the VULTR firewall to restrict all inbound traffic and to allow RDP sessions based on our office WAN IP has stopped the issues. However, I am still trying to decide how that helps my roaming users.

                                          Outside of VPN or DirectAccess I am not sure what other secure access methods there could be. Looking for ideas.

                                          black3dynamiteB DashrenderD scottalanmillerS 3 Replies Last reply Reply Quote 0
                                          • black3dynamiteB
                                            black3dynamite @bigbear
                                            last edited by

                                            @bigbear said in Best Practices - Securing your Windows Server 2016 VM on Vultr:

                                            Have had some issues with it banning the servers external WAN address when behind NAT instead of the remote IP Address. Have been sifting through code but its not an active project, just a one time port.

                                            Using the VULTR firewall to restrict all inbound traffic and to allow RDP sessions based on our office WAN IP has stopped the issues. However, I am still trying to decide how that helps my roaming users.

                                            Outside of VPN or DirectAccess I am not sure what other secure access methods there could be. Looking for ideas.

                                            Maybe a jump server could be an option?

                                            1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 1 / 3
                                            • First post
                                              Last post