Hi,
How can we perform logging of failed authentication attempts? We're experiencing situations where users might get locked out and it's difficult to troubleshoot without information.
A very similar article is Solved: McAfee Enterprise Support Community - Re: MWG6.8.7 - 8378: Logging failed authentication... ...
I've created a rule similar to that, just made it so it logs onto the MWG itself rather than utilize an SNMP trap.
I'm just not sure where exactly this rule needs to be placed for Authentication.Failed to actually be evaluated.
There's also the parameter "Authentication.RawCredentials" that piqued my interest, would adding this to the log reveal which username was pushed during the failed authentication attempt?
That would drastically improve our workflow in these cases, otherwise it'd still require us to plug the IP into tcpdump, packet trace then filter down with Wireshark.
Best regards
Hello @luka_hajnrihar,
I have not read the other guide now but the rule itself is a logging rule where a string logline is generated which is then written into the access log.
Such rules are located under "Policy" > "Rule sets" (upper left tab) > "Log Handler" (below left side).
Let us know if you have further questions.
Hi, I appreciate the feedback.
Regarding the case we were dealing with, we've managed to come up with a different (better) approach.
Though I have a question regarding the log handler; when exactly are the rules in there evaluated? Can I use the same condition as the rule I've posted in the original post? Because otherwise I use a similar type of rule to handle logging for our 3rd party ICAP sandbox & it works just fine within the context of a regular ruleset (not log handler rules).
Corporate Headquarters
6220 America Center Drive
San Jose, CA 95002 USA