Avoid brute force detection on wrong mail setup
Needs Review
As a system administrator, I want cpHulk to count the number of different incorrectly entered passwords. By counting and using the number of different incorrect passwords, cpHulk can continue to protect against brute force attacks and avoid blocking normal users.
A typical normal user by mistake enters the wrong password in the mail client. Pretty quickly, the mail client software has made several attempts to log into the mail server, and cpHulk then detects these actions as brute force attacks. By counting the number of different incorrect passwords used, this false detection of brute force attacks can be avoided.
Replies have been locked on this page!