SSH Security Monitor (SSH-SMA) allows you to see when your Mac OS X Workstation's/Server's Secure Shell (SSH/Remote Login) is accessed and by whom. It also tells you if access attempts were successful or if they failed. It logs all SSH access and attempted access and gives you the option of being immediately alerted visually and by sound when access is attempted or remain silent and just log the event. In addition, it allows you to Auto-Ban computers/networks after they exceed a variable number of failed login attempts; banned computer/networks are banned until you unban them. Thanks to our Auto-Ban feature you can literally set it and never have to worry about your SSH Remote Login being forcefully compromised again.
Advanced TCP/IP Stream Heuristics Analysis
Unlike competitors we use heuristic analysis of the direct TCP/IP stream to identify threats instead of simply reading system logs. This gives the added benefit of being able to detect threats which are not logged. Since SSH-SMA works independently of the SSHD subsystem it will continue to protect you even if your SSHD installation is compromised by a virus, malicious hackers, or disgruntled staff. Heuristic analysis also is not limited to payload signatures or logging semantics which can change with software updates or new hacker protocol intrusion tools. Heuristics have an intelligence which can spot suspicious SEQ patterns and suspect packet metadata so SSH-SMA can immediately alert you or take action on your behalf.
Features/Benefits of SSH-SMA
For instructions on how to setup SSH/Remote Login on your Mac, so you can remotely login to your computer visit: Setup SSH/Remote Login Help
SSH-SMA Activity Screen
SSH-SMA Configuration Screen
SSH-SMA Menu Item<
SSH-SMA Configuration Help Screen
SSH-SMA Password Help Screen
Tutorial not available on some mobile devices, if you do not see video player above this line, try accessing with desktop computer.
Available now for Mac OS X
Available on Digital River as digital download: Download Here