Detection rules › Kusto Query Language
Remote Desktop Network Brute force (ASIM Network Session schema)
'This detection identifies RDP application network traffic and filters any source/destination pair generating more than 25 events hard threshold.'
MITRE ATT&CK coverage
| Tactic | Techniques |
|---|---|
| Credential Access | T1110 Brute Force |
Event coverage
Stages and Predicates
Stage 1: source
_Im_NetworkSession
Stage 2: where
and
not
macro "ipv4_is_private(SrcIpAddr)"
SrcIpAddr ne "DstIpAddr"
macro "(tostring(DstPortNumber) has_any \"3389\")"
Stage 3: summarize
Stage 4: where
Eventscount ge "25"
Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
Eventscount | ge |
|
SrcIpAddr | ne |
|