Phil There is a command. I remember using it for just this reason. I know it is a tail.exe because its on my system, but I cant for the life of me remember where it came from. I thought it may have been part of the pstools suite from sysinternals but its not. I will try and dig it out and let you know. Greg Mulholland gmulholland@xxxxxxxxxxxxxxx http://www.isaserver.org <http://www.isaserver.org/> http://isatools.org <http://isatools.org/> http://www.google.com <http://www.google.com/> ________________________________ From: Phill Hardstaff [mailto:phillh@xxxxxxx] Sent: Thursday, November 20, 2003 3:58 PM To: [ISAserver.org Discussion List] Subject: [isalist] RE: Nachi http://www.ISAserver.org Jim, yep, I can confirm that http://support.microsoft.com/default.aspx?scid=283213 works great. But don't do the first one :) Also, once you have done this you can see in the logs very quickly which host the attack is coming from, just wish Windows had a tail command, I tried Wintail but it goes to 100% CPU, anyone know anything that works well, so you could watch the tail end of the packet log and see straight way what is happening, like 100 denies for ICMP from one internal host in under 1 second = Nachi (most likely). Cheers Phill -----Original Message----- From: Jim Harrison [mailto:jim@xxxxxxxxxxxx] Sent: Thursday, 20 November 2003 2:33 PM To: [ISAserver.org Discussion List] Subject: [isalist] RE: Nachi http://www.ISAserver.org Ok, kids; quicherbichin' or I'll turn this alias around and no one will get any McDonalds tonight..! Actually, you're both right: 1. DoS is exactly that; misuse a perfectly valid traffic profile to prevent use of the server; Nachi is built to do this and it succeeds in grand fashion because ISa is trying to process the traffic. 2. ISA has one big flaw that Nachi, Blaster and other viruses / worms have taken advantage of; it considers the internal network as fully trusted. This has been rethought for the future release, but it can't be changed for ISA2000. What's the right answer? Try this to help your ISA withstand the jackasses that can't keep their laptops clean: http://support.microsoft.com/default.aspx?scid=283213 Jim Harrison MCP(NT4, W2K), A+, Network+, PCG http://isaserver.org/Jim_Harrison/ http://isatools.org Read the help / books / articles! --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.542 / Virus Database: 336 - Release Date: 18/11/2003 ------------------------------------------------------ List Archives: http://www.webelists.com/cgi/lyris.pl?enter=isalist ISA Server Newsletter: http://www.isaserver.org/pages/newsletter.asp ISA Server FAQ: http://www.isaserver.org/pages/larticle.asp?type=FAQ ------------------------------------------------------ Other Internet Software Marketing Sites: Leading Network Software Directory: http://www.serverfiles.com No.1 Exchange Server Resource Site: http://www.msexchange.org Windows Security Resource Site: http://www.windowsecurity.com/ Network Security Library: http://www.secinf.net/ Windows 2000/NT Fax Solutions: http://www.ntfaxfaq.com ------------------------------------------------------ You are currently subscribed to this ISAserver.org Discussion List as: gmulholland@xxxxxxxxxxxxxxx To unsubscribe send a blank email to $subst('Email.Unsub')