
Summary
This detection rule identifies when the 'AllowMultipleTSSessions' registry key is enabled on Windows systems. This setting, located at 'HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon', controls whether multiple Remote Desktop Protocol (RDP) sessions can be established by the same user without terminating existing sessions. Enabling this feature can be a security risk as it allows potential attackers to maintain persistence through multiple concurrent sessions, making it easier for them to access a system without necessarily disconnecting other users. This behavior is often exploited during post-compromise activity, allowing unauthorized users to remain connected even if a legitimate user is also accessing the system. The rule aims to alert security teams to potential misuse of the RDP functionality and flag any security incidents that may arise from this configuration change. Given its importance within the persistence and defense evasion tactics outlined in ATT&CK techniques T1112, organizations should consider reviewing alerts generated by this rule carefully.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
Created: 2022-09-09