Channels:
Security
Event: 4624 (LogonType 10).
Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational
Event: 1149.
Microsoft-Windows-TerminalServices-LocalSessionManager/Operational
Events: 21, 22, 23, 24, 25.
Microsoft-Windows-TerminalServices-RemoteConnectionManager/Admin
Event: 1158.
Microsoft-Windows-RemoteDesktopServices-RdpCoreTS/Operational
Event: 131.
Security
Event: 4624 (LogonType 10).
Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational
Event: 1149.
Microsoft-Windows-TerminalServices-LocalSessionManager/Operational
Events: 21, 22, 23, 24, 25.
Microsoft-Windows-TerminalServices-RemoteConnectionManager/Admin
Event: 1158.
Microsoft-Windows-RemoteDesktopServices-RdpCoreTS/Operational
Event: 131.
Overview
| Channel | Conditions | Events |
|---|---|---|
Security |
Default configuration. Also logged for other logon types ( Network, Console, Batch, Service, …). |
Event 4624: An account was successfully logged on, with LogonType 10. |
Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational |
Default configuration. | Event 1149: Remote Desktop Services: User authentication succeeded. Access to the Windows login screen, not necessarily a successful session opening. This event is however only generated upon successful authentication if Network Level Authentication (NLA) is required. |
Microsoft-Windows-TerminalServices-LocalSessionManager/Operational |
Default configuration. | Event 21: Remote Desktop Services: Session logon succeeded. Information of interest: user logging in, source network address, and RDP session ID. |
Microsoft-Windows-TerminalServices-LocalSessionManager/Operational |
Default configuration. | Event 22: Remote Desktop Services: Shell start notification received. Information of interest: user logging in, source network address, and RDP session ID. |
Microsoft-Windows-TerminalServices-LocalSessionManager/Operational |
Default configuration. | Event 23: Remote Desktop Services: Session logoff succeeded. Information of interest: user logging in and RDP session ID. |
Microsoft-Windows-TerminalServices-LocalSessionManager/Operational |
Default configuration. | Event 24: Remote Desktop Services: Session has been disconnected. If no event 23 (session logoff succeeded) is associated with this event, the session was simply “disconnected”. In case of a session disconnect (triggered by closing the RDP client window or using the “Disconnect” sign-out option), running processes and opened windows are preserved. Information of interest: user logging in, source network address, and RDP session ID. |
Microsoft-Windows-TerminalServices-LocalSessionManager/Operational |
Default configuration. | Event 25: Remote Desktop Services: Session reconnection succeeded. Logged upon reconnection of a disconnected session. Could indicate that a malicious actor got access to running processes / programs state started legitimately by a user. Information of interest: user logging in, source network address, and RDP session ID. Events with a source network address set to LOCAL can sometimes be generated for console, non Remote Desktop logins. |
Microsoft-Windows-RemoteDesktopServices-RdpCoreTS/Operational |
Introduced in Windows Server 2012. Default configuration. |
Event 131: The server accepted a new TCP connection from client <IP>. Only indicates a network access to the Remote Desktop service. Information of interest: source network address. |
Microsoft-Windows-TerminalServices-RemoteConnectionManager/Admin |
Default configuration. | Event 1158: Remote Desktop Services accepted a connection from IP address <IP>. Only indicates a network access to the Remote Desktop service. Information of interest: source network address. |
ngrok tunnel - 16777216
A Source Network Address of ::%16777216 in the Microsoft-Windows-TerminalServices-LocalSessionManager and Microsoft-Windows-TerminalServices-RemoteConnectionManager events could
indicate that a ngrok tunnel was used to make Remote Desktop access.
Tool(s)
The LogParser’s KAPE module LogParser_RDPUsageEvents
can be used to parse EVTX files and extract the aforementioned Remote Desktop
events into a CSV timeline.
References
View on GitHub