
Summary
This analytical rule is designed to detect successful Remote Desktop Protocol (RDP) login sessions on Windows systems. It identifies instances of Event ID 4624 with Logon Type 10 in the Windows Security Event Log, which signifies that a user has successfully authenticated via RDP and initiated an interactive session. This event is critical as it confirms remote access to a system, distinguishing it from mere credential validation. Furthermore, the rule utilizes correlation with Event ID 1149 to enhance accuracy in monitoring remote session activity, ensuring that organizations are alerted to genuine successful RDP sessions—which are crucial for maintaining security in environments that utilize remote access. Implementing this detection requires the ingestion of Windows Event Logs and proper auditing configurations. False positives may arise during legitimate software updates or installations, indicating the need for additional filtering mechanisms in such cases.
Categories
- Endpoint
Data Sources
- Windows Registry
ATT&CK Techniques
- T1021.001
Created: 2025-07-31