heroui logo

Denied Access To Remote Desktop

Sigma Rules

View Source
Summary
The 'Denied Access To Remote Desktop' rule tracks instances when authenticated users attempt to connect to a Windows machine via Remote Desktop Protocol (RDP), but do not possess the necessary permissions to do so. This event (Event ID 4825) is particularly significant as it could indicate an attacker's reconnaissance activity, seeking to exploit remote access capabilities within the network. Detecting such violations aids in the identification and prevention of unauthorized lateral movements or exploitation attempts by adversaries. The rule captures critical fields such as EventCode, AccountName, and ClientAddress to ensure comprehensive monitoring of unauthorized access attempts. False positives may occur if a legitimate user fails to be added to the RDP group, highlighting the need for careful configuration and management of user permissions.
Categories
  • Windows
  • Cloud
  • Endpoint
Data Sources
  • Windows Registry
  • User Account
  • Network Traffic
Created: 2020-06-27