Synopsis
Description
An RDP session was established with uncommon parameters from a managed host.
Attacker's Goals
Adversaries may use RDP for initial access or lateral movement within a network.
Investigative actions
- Investigate the source and destination of the RDP communication.
- Check if this communication is legitimate and expected.
- Analyze the user and process that initiated the RDP connection.
Variations
An uncommon RDP session initiated by a chained RDP client
Synopsis
Description
An RDP session was established by a process that is itself an RDP client, which is uncommon behavior.
Attacker's Goals
Adversaries may use RDP for initial access or lateral movement within a network.
Investigative actions
- Investigate the source and destination of the RDP communication.
- Check if this communication is legitimate and expected.
- Analyze the user and process that initiated the RDP connection.
An uncommon RDP session initiated by a globally rare RDP client
Synopsis
Description
An RDP session was established by a process hash that has not been seen globally, which is uncommon.
Attacker's Goals
Adversaries may use RDP for initial access or lateral movement within a network.
Investigative actions
- Investigate the source and destination of the RDP communication.
- Check if this communication is legitimate and expected.
- Analyze the user and process that initiated the RDP connection.
An uncommon RDP session initiated by a rare RDP client
Synopsis
Description
An RDP session was established by a process hash that is rare in the environment.
Attacker's Goals
Adversaries may use RDP for initial access or lateral movement within a network.
Investigative actions
- Investigate the source and destination of the RDP communication.
- Check if this communication is legitimate and expected.
- Analyze the user and process that initiated the RDP connection.
An uncommon RDP session from a host that rarely initiates RDP
Synopsis
Description
An RDP session was initiated from a host that does not typically establish RDP connections.
Attacker's Goals
Adversaries may use RDP for initial access or lateral movement within a network.
Investigative actions
- Investigate the source and destination of the RDP communication.
- Check if this communication is legitimate and expected.
- Analyze the user and process that initiated the RDP connection.
An uncommon RDP session initiated by a process with rare causality
Synopsis
Description
An RDP session was established by a process with an uncommon parent process relationship.
Attacker's Goals
Adversaries may use RDP for initial access or lateral movement within a network.
Investigative actions
- Investigate the source and destination of the RDP communication.
- Check if this communication is legitimate and expected.
- Analyze the user and process that initiated the RDP connection.