IIS HTTP requests from security scanner

Set up the iis integration.

This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Goal

Detect when a web application is being scanned. This will identify attacker IP addresses who are not trying to hide their attempt to attack your system. More advanced hackers will use an inconspicuous user agent.

Strategy

Inspect the user agent in the HTTP headers to determine if an IP is scanning your application and generate an INFO signal.

Triage and response

  1. Determine if this IP is making authenticated requests to the application.
  2. If the IP is making authenticated requests to the application:
    • Investigate the HTTP logs and determine if the user is attacking your application.

The HTTP headers in the query are from darkqusar’s gist

PREVIEWING: esther/docs-9518-update-example-control-sensitive-log-data