sos5.0.0,
sos5.1.0
medium
This signature detects attempts to infect a Microsoft IIS Web
server with the Nimda worm. Nimda may infect other Web
servers by obtaining e-mail addresses and sending a copy
of itself in infected messages using its own SMTP or POP3
server; adding files to a system configured to allow Windows
file shares; or posting an infected HTML e-mail to the Web
server where it can be accessed via HTTP.
WORM:NIMDA:SCRIPTS-CMD
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to infect a Microsoft IIS Web
server with the Nimda worm. Nimda may infect other Web
servers by obtaining e-mail addresses and sending a copy
of itself in infected messages using its own SMTP or POP3
server; adding files to a system configured to allow Windows
file shares; or posting an infected HTML e-mail to the Web
server where it can be accessed via HTTP.
WORM:NIMDA:SCRIPTS-ROOT
sos5.1.0
medium
This signature detects the Santy.C worm attempting to find
targets by sending a search request to a Google or Yahoo
search engine.
WORM:PHPINCLUDE:SEARCH-REQ
sos5.1.0
medium
This signature detects a machine infected with the Santy
worm querying Google to locate new targets for infection.
The source IP of this log is likely infected with a variant of
Santy.
WORM:SANTY:GOOGLE-SEARCH
sos5.1.0
high
This signature detects a machine infected with the Santy
worm attempting to infect a new target host. The source IP
of this log is likely infected with a variant of Santy.
WORM:SANTY:INFECT-ATTEMPT
sos5.1.0
critical
This signature detects attempts to upload the deloder worm.
This signature also indicates that the worm has already
logged into the system; the deloder worm can upload itself
to the host only after successful login as Administrator
(deloder uses one of 50 default passwords to login).
WORM:SMB:DELODER
sos5.1.0
high
This signature detects SMB transmissions of the
W32/Slackor worm, which targets file shares. The worm
scans the /16 of the infected host for systems listening on
TCP/445; if a system is found, the worm uses
pre-programmed usernames and passwords to connect to
the $IPC share on the system, copies itself to the C:\sp
directory, and runs its payload.
WORM:SMB:W32-SLACKOR
Configuration Log Entries
The Configuration category contains the subcategories shown in Table 125 on page 949:
Table 125: Configuration Log Entries
ScreenOS Message ID
Configuration Log Entry Subcategories
Addresses > Notification >00001
Address
Admin > Notification > 00002
Admin
949
Copyright © 2010, Juniper Networks, Inc.
Appendix E: Log Entries
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...