heroui logo

Windows RDP Client Launched with Admin Session

Splunk Security Content

View Source
Summary
This detection rule identifies the launch of the Windows Remote Desktop Client (mstsc.exe) with specific command line arguments: "/v" and "/admin". The "/v" argument specifies the remote host to connect to, while the "/admin" flag allows the user to connect to the console session of the target system. This functionality can be exploited by attackers for privileged remote access to a system, often without leaving signs of typical login activity associated with non-admin sessions. While legitimate for system administrators, such usage is atypical for standard user behavior. Thus, this rule can help in detecting potentially malicious activity during lateral movement in a network, especially aiming at high-value systems.
Categories
  • Network
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1021.001
Created: 2025-08-01