This event, logged to the TerminalServices-RDPClient/Operational channel, is logged when an RDP session is attempted to a remote endpoint. This event is unique as it is logged on the source endpoint.
- Behavioral - Lateral Movement (TA0008)
- Execution - Process Tree
- Account - Security Identifier (SID)
- Network - Evidence of Network Activity
- Network Activity - Destination Identification
- Windows 11
- Windows 10
- Windows 8
- Windows 7
- Windows Vista
%SystemRoot%\System32\Winevt\Logs\Microsoft-Windows-TerminalServices-RDPClient%4Operational.evtx
This artifact can provide the destination IP address of an attempted RDP session. It will also provide the SID of the user who initiated the attempted connection, as well as the ProcessID associated with this activity.
This event is logged regardless of success or failure of the RDP session, and must be cross-referenced with other events such as 4624: An account was successfully logged on on the destination host.
If available, a successful RDP authentication is indicated by the event ID TerminalServices-RDPClient/Operational/1027
. To correlate these two Event IDs, compare their Correlation ActivityID
field values.
When the RDP session is ended, either due to a failure to connect, a failure to successfully authenticate, or a manual close of the session, TerminalServices-RDPClient/Operational/1105
should be logged, and is likewise able to be correlated by its Correlation ActivityID
field. This allows for determining a time span during which an RDP session was in progress.