7. FTP Logon Attempt Restrictions
Brute-force attacks can create a Denial-of-Service (DoS) condition that can prevent legitimate users from accessing an FTP server. To prevent this from happening, IIS 8 includes a new feature called FTP
Logon Attempt Restrictions that lets you block offending users from
logging on to an IIS FTP server for a specified period of time. Unlike
the Dynamic IP Address Restrictions described in the previous section,
which blacklists any client whose IP address violates the configured
dynamic IP address filtering settings, FTP Logon Attempt Restrictions
uses a “graylisting” approach that denies only the offending user for a
certain period of time. However, by configuring this time period to be
slightly more than that specified by your domain account lockout
policy, you can prevent malicious users from locking legitimate users out of accessing your FTP server.
To configure FTP Logon Attempt Restrictions for FTP sites on your
server, select the FTP Logon Attempt Restrictions node for your server
in IIS Manager. This displays the settings shown in Figure 6,
which let you enable the feature and specify a maximum number of failed
logon attempts within a given amount of time. Alternatively, you can
enable this feature in logging-only mode to collect data concerning
possible brute-force password attacks being conducted against your
server.