☂︎ Monitors the Security Event Log for authentication failures
☂︎ Blocks attackers using a blacklist filter in IP Security Policies
The command line options can also be triggered manually while the application
is running: press ~
to enable the debug console or F1
for help.
CMD | gips [WAiIanh?EDsfbc][…] | CMD | Description |
---|---|---|---|
W | Write initial IPsec policy | E | Erase gIPS IPsec policy |
A | Activate gIPS IPsec policy | D | Deactivate gIPS IPsec policy |
i | Service install | U | Deactivate gIPS IPsec policy |
I | Service install interactive | s | Service start |
u | Service uninstall | q | Service stop |
a | Show whitelisted addresses | r | Service resume |
n | Show whitelisted user names | p | Service pause |
a | Autopause enable | f | Log to file |
d | Autopause disable | b | Show blocked hosts |
h | Show help | c | Open config path in regedit |
? | Show help F1 | ~ | Debug console |
"C:\Windows\gvalkov\gips.exe" WAis
These two registry locations are searched for configuration, the first found is used:
SYSTEM\ CurrentControlSet\ Services\ gvalkov. IPS\ Parameters SYSTEM\ CurrentControlSet\ services\ eventlog\ Application\ gvalkov. IPS
☂︎ Windows