Channels:

Security.
Event: 4624 (LogonType 10).

Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational.
Event: 1149.

Microsoft-Windows-TerminalServices-LocalSessionManager/Operational.
Events: 21, 22, 23, 25.

Microsoft-Windows-RemoteDesktopServices-RdpCoreTS/Operational.
Events: 131.

Overview

Channel Conditions Events
Security Default configuration.

Also logged for other logon types (Network, Console, Batch, Service, …).
Event 4624: An account was successfully logged on, with LogonType 10.
Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational Default configuration. Event 1149: Remote Desktop Services: User authentication succeeded.

Access to the Windows login screen, not necessarily a successful session opening. This event is however only generated upon successful authentication if Network Level Authentication (NLA) is required.
Microsoft-Windows-TerminalServices-LocalSessionManager/Operational Default configuration. Event 21: Remote Desktop Services: Session logon succeeded.
Microsoft-Windows-TerminalServices-LocalSessionManager/Operational Default configuration. Event 22: Remote Desktop Services: Shell start notification received
Microsoft-Windows-TerminalServices-LocalSessionManager/Operational Default configuration. Event 23: Remote Desktop Services: Session logoff succeeded
Microsoft-Windows-TerminalServices-LocalSessionManager/Operational Default configuration. Event 25: Remote Desktop Services: Session reconnection succeeded
Events with a source network address set to LOCAL can sometimes be generated for console, non Remote Desktop logins.
Microsoft-Windows-RemoteDesktopServices-RdpCoreTS/Operational Introduced in Windows Server 2012.

Default configuration.
Event 131: The server accepted a new TCP connection from client <IP>.

Only indicates a network access to the Remote Desktop service.

For the aforementioned events, a Source Network Address of ::%16777216 could indicate that a ngrok tunnel was used to make Remote Desktop access.

Tool(s)

The LogParser’s KAPE module LogParser_RDPUsageEvents can be used to parse EVTX files and extract the aforementioned Remote Desktop events into a CSV timeline.



View on GitHub