Monitor logs from several sources and execute actions based on some rules. Can be used to protecet against brute-force attacks.
luaspylog Execute actions based on log records
remote-desktop-access protection brute-force-protection bruteforce autoblock rdp-protection