Jump to content

Recommended Posts


My MWB management server has emailed over a notice about an exploit on a client.. but I can't see particularly what it was unhappy about.

The user was trying to use IE to navigate to a URL we use each month.. the user didn't log into the website behind the URL and closed the browser.

Could someone tell me what the anti-exploit took exception to? Below is message and attached are the MWB Server log for that client; certain details redacted..

Alert Time: 7/24/2017 12:27:14 PM

Server Hostname: SECURITY0

Server Domain/Workgroup: ******************

Server IP:

Notification Catalog: Client


Exploit threat detected, see details below:

7/24/2017 12:25:09 PM  MIR-HR  Exploit attempt blocked                BLOCK                   cmorley                Internet Explorer             C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE Attacked application: C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE; Parent process name: iexplore.exe; Layer: Application Hardening; API ID: 900; Address: ; Module: ; AddressType: ; StackTop: ; StackBottom: ; StackPointer: ; Extra:

Total count: 1.

SecurityLogs - MIR-HR.csv

Link to post
Share on other sites

  • Staff

Hello JBNippy57,


I do apologize about the delay in this. Unfortunately the block on the server side in particular does not give as much information. It looks like it is being blocked by one of our first layers of protection so it could be a few things causing it. We will unfortunately need the logs collected using these instructions:



Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.