Remote Desktop Network Traffic

Description

This search looks for network traffic on TCP/3389, the default port used by remote desktop. While remote desktop traffic is not uncommon on a network, it is usually associated with known hosts. This search allows for whitelisting both source and destination hosts to remove them from the output of the search so you can focus on the uncommon uses of remote desktop on your network.

Content Mapping

This content is not mapped to any local saved search. Add mapping


Use Case

Advanced Threat Detection

Category

Lateral Movement

Alert Volume

This search looks for network traffic on TCP/3389, the default port used by remote desktop. While remote desktop traffic is not uncommon on a network, it is usually associated with known hosts. This search allows for whitelisting both source and destination hosts to remove them from the output of the search so you can focus on the uncommon uses of remote desktop on your network.

SPL Difficulty

None

Journey

Stage 2

MITRE ATT&CK Tactics

Lateral Movement

MITRE ATT&CK Techniques

Remote Services

Remote Desktop Protocol

MITRE Threat Groups

APT1
APT3
APT39
APT41
Axiom
Blue Mockingbird
Chimera
Cobalt Group
Dragonfly 2.0
FIN10
FIN6
FIN8
Lazarus Group
Leviathan
OilRig
Patchwork
Silence
Stolen Pencil
TEMP.Veles
Wizard Spider
menuPass

Kill Chain Phases

Actions On Objectives

Data Sources

Network Communication

   Help

Remote Desktop Network Traffic Help

To successfully implement this search you need to identify systems that commonly originate remote desktop traffic and that commonly receive remote desktop traffic. You can use the included support search "Identify Systems Creating Remote Desktop Traffic" to identify systems that originate the traffic and the search "Identify Systems Receiving Remote Desktop Traffic" to identify systems that receive a lot of remote desktop traffic. After identifying these systems, you will need to add the "commonrdpsource" or "commonrdpdestination" category to that system depending on the usage, using the Enterprise Security Assets and Identities framework. This can be done by adding an entry in the assets.csv file located in SA-IdentityManagement/lookups.

   Search

Open in Search