Skip to content

Latest commit

 

History

History
34 lines (25 loc) · 1.88 KB

evtx-1024-rdp-activex.md

File metadata and controls

34 lines (25 loc) · 1.88 KB

TerminalServices-RDPClient/Operational/1024

This event, logged to the TerminalServices-RDPClient/Operational channel, is logged when an RDP session is attempted to a remote endpoint. This event is unique as it is logged on the source endpoint.

Behavioral Indications

  • Behavioral - Lateral Movement (TA0008)

Analysis Value

  • Execution - Process Tree
  • Account - Security Identifier (SID)
  • Network - Evidence of Network Activity
  • Network Activity - Destination Identification

Operating System Availability

  • Windows 11
  • Windows 10
  • Windows 8
  • Windows 7
  • Windows Vista

Artifact Location(s)

  • %SystemRoot%\System32\Winevt\Logs\Microsoft-Windows-TerminalServices-RDPClient%4Operational.evtx

Artifact Interpretation

This artifact can provide the destination IP address of an attempted RDP session. It will also provide the SID of the user who initiated the attempted connection, as well as the ProcessID associated with this activity.

Caveats

This event is logged regardless of success or failure of the RDP session, and must be cross-referenced with other events such as 4624: An account was successfully logged on on the destination host.

If available, a successful RDP authentication is indicated by the event ID TerminalServices-RDPClient/Operational/1027. To correlate these two Event IDs, compare their Correlation ActivityID field values.

When the RDP session is ended, either due to a failure to connect, a failure to successfully authenticate, or a manual close of the session, TerminalServices-RDPClient/Operational/1105 should be logged, and is likewise able to be correlated by its Correlation ActivityID field. This allows for determining a time span during which an RDP session was in progress.

Example

Example Image