heroui logo

RDP Login from Localhost

Sigma Rules

View Source
Summary
This detection rule identifies Remote Desktop Protocol (RDP) login attempts originating from localhost IP addresses (127.0.0.1 or ::1). These types of logins, particularly those with LogonType 10 (RemoteInteractive), may indicate attempts to bypass network restrictions through tunneling methods, which pose a security risk. The rule leverages the Windows Security Event log, specifically monitoring for Event ID 4624, to detect successful logon events that match these criteria. Given that RDP is commonly used for remote access, detecting unusual patterns such as localhost logins can help detect lateral movement or malicious activity within a network.
Categories
  • Windows
  • Endpoint
  • Network
Data Sources
  • User Account
  • Windows Registry
  • Logon Session
  • Process
Created: 2019-01-28