The Brute Force Attack use case uncovers and tracks, attempts, and confirmed attacks using a brute force technique on network assets and applications. This use case tracks the following user stories :

  • Successful Brute Force Attack
  • Attempted Brute Force Attack
  • A source Targeting Destinations
  • Exploit Attempts of User Accounts by Sources
  • Failed Login Counts by Days
  • Failed Login Counts by Weeks
  • Failed Login Counts by Destinations
  • Failed Login Counts by Sources
  • Failed Login Counts by User Accounts
  • Failed Login Statistics by a Destination
  • Failed Login Statistics by a Source
  • Failed Login Statistics by a User Account

Suggested apps

Suggested for you are based on app category, product compatibility, popularity, rating and newness. Some apps may not show based on entitlements. Learn more about entitlements.


319.9 KB
Aug 24, 2018
More info Less info
Product compatibility
Version 5.5
Version 6.0 · 6.1 · 6.2 · 6.3 · 6.4 · 6.5 · 6.6
Release notes

Rebranding from HPE to Microfocus


Unsubscribe from notifications

You are receiving release updates for this item because you have subscribed to the following products:
If you unsubscribe, you will no longer receive any notifications for these products.
Tip: to update your subscription preferences, go to Manage Subscriptions from your Dashboard, uncheck the products you no longer want to receive notifications for, and click 'Save'.

Marketplace Terms of Service

In order to continue, you must accept the updated Marketplace Terms of Service
Since you are downloading an app from the OpenText Marketplace, you need to accept the updated Marketplace Terms of Service before you can continue. Use the link to review the Marketplace Terms of Service. Once complete check the, "I accept the Marketplace Terms of Service" box below and click accept to continue your download.

Your download has begun...

Your download has begun

Related content and resources

Your browser is not supported!

Please upgrade to one of the following broswers: Internet Explorer 11 (or greater) or the latest version of Chrome or Firefox

release-rel-2024-1-1-5922 | Wed Jan 17 03:07:51 PST 2024