RDP Sensitive Settings Changed to Zero
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects tampering of RDP Terminal Service/Server sensitive settings. Such as allowing unauthorized users access to a system via the 'fAllowUnsolicited' or enabling RDP via 'fDenyTSConnections', etc.
Severity
Trouble
Rule Requirement
Criteria
Action1:
actionname = "Registry value modified" AND OBJECTNAME endswith "\fDenyTSConnections,\fSingleSessionPerUser,\UserAuthentication" AND (INFORMATION = "DWORD (0x00000000)" OR (CHANGES = 0 AND NEWTYPE = "REG_DWORD"))
select Action1.HOSTNAME,Action1.MESSAGE,Action1.OBJECTNAME,Action1.PROCESSNAME,Action1.PREVVAL,Action1.CHANGES,Action1.USERNAME,Action1.DOMAIN,Action1.NEWTYPE,Action1.OBJECTVALUENAME,Action1.OLDTYPE
Detection
Execution Mode
realtime
Log Sources
Windows
Author
Samir Bousseaden, David ANDRE, Roberto Rodriguez @Cyb3rWard0g, Nasreddine Bencherchali


