heroui logo

Windows Remote Services Allow Rdp In Firewall

Splunk Security Content

View Source
Summary
The analytic detection rule identified as 'Windows Remote Services Allow Rdp In Firewall' is designed to monitor and detect unauthorized modifications to the Windows firewall settings that enable Remote Desktop Protocol (RDP) access on targeted systems. This rule focuses specifically on the execution of the 'netsh.exe' command-line tool, filtering for specific command-line arguments that indicate changes to the firewall configuration to allow TCP traffic through port 3389. Such modifications are often a sign of adversarial behavior aimed at achieving remote access to compromised hosts, which can facilitate lateral movement within networks. The rule utilizes data from multiple sources including Sysmon and Windows Event Logs to capture relevant process execution events, aggregating data to provide insight into potential threats. If this behavior is confirmed as malicious, it exposes systems to serious risks including unauthorized control and data exfiltration.
Categories
  • Endpoint
  • Windows
Data Sources
  • Pod
  • User Account
  • Process
  • Windows Registry
ATT&CK Techniques
  • T1021.001
  • T1021
Created: 2024-11-13