SSH Security Monitor (SSH-SMA) allows you to see when your macOS Workstation's/Server's Secure Shell (SSH/Remote Login) is accessed and by whom. It also tells you if access attempts were successful or if they failed. It logs all SSH access and attempted access and gives you the option of being immediately alerted visually and by sound when access is attempted or remain silent and just log the event. In addition, it allows you to Auto-Ban computers/networks after they exceed a variable number of failed login attempts or instantly using its Instaban feature; banned computer/networks are banned until you unban them. Thanks to our Auto-Ban feature you can literally set it and never have to worry about your SSH Remote Login being forcefully compromised again. Monitors your SSHD security settings and alerts you if unsecure or if they change. Breach detection heuristics that alert you if your SSHD system is breached. Auto-repairs itself from Apple system updates that remove SSH-SMA security settings.
Advanced TCP/IP Stream Heuristics Analysis
Unlike competitors we use heuristic analysis of the direct TCP/IP stream to identify threats instead of simply reading system logs. This gives the added benefit of being able to detect threats which are not logged. Since SSH-SMA works independently of the SSHD subsystem it will continue to protect you even if your SSHD installation is compromised by a virus, malicious hackers, or disgruntled staff. Heuristic analysis also is not limited to payload signatures or logging semantics which can change with software updates or new hacker protocol intrusion tools. Heuristics have an intelligence which can spot suspicious SEQ patterns and suspect packet metadata so SSH-SMA can immediately alert you or take action on your behalf.
Features/Benefits of SSH-SMA
For instructions on how to setup SSH/Remote Login on your Mac, so you can remotely login to your computer visit: Setup SSH/Remote Login Help