RDP Sensitive Settings Changed to Zero
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects tampering of RDP Terminal Service/Server sensitive settings. Such as allowing unauthorized users access to a system via the 'fAllowUnsolicited' or enabling RDP via 'fDenyTSConnections', etc.
Severity
Trouble
Rule Requirement
Criteria
Action1: actionname = "Registry value modified" AND OBJECTNAME endswith "\fDenyTSConnections,\fSingleSessionPerUser,\UserAuthentication" AND (INFORMATION = "DWORD (0x00000000)" OR (CHANGES = 0 AND NEWTYPE = "REG_DWORD")) select Action1.HOSTNAME,Action1.MESSAGE,Action1.OBJECTNAME,Action1.PROCESSNAME,Action1.PREVVAL,Action1.CHANGES
Detection
Execution Mode
realtime
Log Sources
Windows
Author
Samir Bousseaden, David ANDRE, Roberto Rodriguez @Cyb3rWard0g, Nasreddine Bencherchali


