RDP Sensitive Settings Changed to Zero

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects tampering of RDP Terminal Service/Server sensitive settings. Such as allowing unauthorized users access to a system via the 'fAllowUnsolicited' or enabling RDP via 'fDenyTSConnections', etc.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Registry value modified" AND OBJECTNAME endswith "\fDenyTSConnections,\fSingleSessionPerUser,\UserAuthentication" AND (INFORMATION = "DWORD (0x00000000)" OR (CHANGES = 0 AND NEWTYPE = "REG_DWORD")) select Action1.HOSTNAME,Action1.MESSAGE,Action1.OBJECTNAME,Action1.PROCESSNAME,Action1.PREVVAL,Action1.CHANGES

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Samir Bousseaden, David ANDRE, Roberto Rodriguez @Cyb3rWard0g, Nasreddine Bencherchali