
Summary
The Windows Remote Desktop Network Bruteforce Attempt detection rule identifies potential brute force attacks targeting Remote Desktop Protocol (RDP) connections by analyzing network traffic data. It focuses on identifying source IP addresses that exceed ten connection attempts to an RDP port (commonly port 3389) on a target within a one-hour timeframe. The detection utilizes the Sysmon EventID 3 data source, leveraging the Network_Traffic data model in Splunk. Through statistical evaluation, the rule compiles information about the source and destination IPs involved, the destination port, the count of connection attempts, and timestamps of the initial and final connection attempts. The outcome is presented in a structured format, which allows cybersecurity teams to prioritize potential threats based on the intensity of activities being monitored. The detection can be adjusted by modifying the thresholds for count and duration, making it flexible to different environments.
Categories
- Network
- Endpoint
- Windows
Data Sources
- Network Traffic
ATT&CK Techniques
- T1110.001
- T1110
Created: 2025-01-10