
Summary
This detection rule monitors for potential tampering of Windows Remote Desktop Protocol (RDP) sensitive settings within the Windows registry. These settings control critical aspects of RDP, such as the openness to unsolicited connections and user authentication requirements. The rule specifically looks for modifications indicating that security settings have been relaxed to a state that grants unauthorized user access – notably focusing on keys such as 'fAllowUnsolicited' or 'fDenyTSConnections'. The rule targets instances where these specific registry settings are altered to a DWORD value of zero (0x00000000), which could signify an intentional bypass of security protocols meant to restrict access. Given its implications, such changes are significant and warrant immediate investigation, as they can facilitate unauthorized remote access and potentially lead to broader system compromises.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
Created: 2022-09-29