Detection rules › Splunk

Windows RDPClient Connection Sequence Events

Author
Michael Haag, Splunk
Source
upstream

This analytic monitors Windows RDP client connection sequence events (EventCode 1024) from the Microsoft-Windows-TerminalServices-RDPClient/Operational log. These events track when RDP ClientActiveX initiates connection attempts to remote servers. The connection sequence is a critical phase of RDP where the client and server exchange settings and establish common parameters for the session. Monitoring these events can help identify unusual RDP connection patterns, potential lateral movement attempts, unauthorized remote access activity, and RDP connection chains that may indicate compromised systems. NOTE the analytic was written for Multi-Line as XML was not properly parsed out.

MITRE ATT&CK coverage

TacticTechniques
Initial AccessT1133 External Remote Services
PersistenceT1133 External Remote Services

Event coverage

ProviderEvent IDTitle
TerminalServices-ClientActiveXCore1024RDP ClientActiveX is trying to connect to the server (Value).

Stages and Predicates

Stage 1: search

search EventCode=1024

Stage 2: rename

rename

Stage 3: stats

stats BY dest, source, LogName, EventCode, category

Stage 4: search

search

Stage 5: search

search

Stage 6: search

search `macro`

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
EventCodeeq
  • 1024