
Summary
The detection rule aims to identify successful Remote Desktop Protocol (RDP) logons from public IP addresses, which indicates that the RDP port might be exposed to the internet. This raises security concerns as it may facilitate unauthorized access if not properly secured. The rule leverages Windows Security Event ID 4624, which logs successful logins, specifically filtering for Logon Type 10, which corresponds to remote interactive logons. The rule further narrows down the detection by excluding logons from common private IP address ranges and local addresses, thus focusing solely on potentially malicious public logins. A successful detection might suggest that an attacker is attempting to gain unauthorized access or is exploiting a misconfigured RDP service.
Categories
- Windows
- Network
Data Sources
- Windows Registry
- Logon Session
- Network Traffic
Created: 2023-01-19