T1021.001

Remote Desktop Protocol

Adversaries may use Valid Accounts to log into a computer using the Remote Desktop Protocol (RDP). RDP is a common feature in Windows that allows interactive graphical sessions on remote systems. Threat actors including Kimsuky, INC Ransom, Volt Typhoon, Wizard Spider, BlackByte, Akira, and FIN7 have all leveraged RDP for lateral movement. Adversaries typically acquire credentials via Credential Access techniques, then use RDP to expand access to additional systems, deploy ransomware interactively, or establish persistence via Accessibility Features.

Microsoft Sentinel / Defender
kusto
// Detect suspicious RDP lateral movement patterns
let SensitiveHosts = dynamic(["dc", "domain-controller", "dc01", "pdc"]);
SecurityEvent
| where TimeGenerated > ago(24h)
| where EventID == 4624
| where LogonType == 10  // RemoteInteractive = RDP
| extend TargetHost = tostring(Computer)
| extend SourceIP = tostring(IpAddress)
| where SourceIP !startswith "127." and SourceIP != "-" and SourceIP != ""
// Flag logons to sensitive hosts or from unexpected sources
| extend ToSensitiveHost = TargetHost has_any (SensitiveHosts)
| extend IsPrivilegedAccount = TargetUserName has_any ("admin", "administrator", "svc", "service")
// Join with logon failures to identify brute-force followed by success
| project TimeGenerated, Computer, TargetUserName, TargetDomainName, SourceIP, LogonType, SubjectUserName, ToSensitiveHost, IsPrivilegedAccount
| sort by TimeGenerated desc
| union (
    SecurityEvent
    | where TimeGenerated > ago(24h)
    | where EventID == 4625
    | where LogonType == 10
    | where IpAddress !startswith "127." and IpAddress != "-"
    | summarize FailureCount=count(), Accounts=make_set(TargetUserName) by IpAddress, bin(TimeGenerated, 5m)
    | where FailureCount >= 5
    | extend AlertType = "RDP BruteForce", Computer = "", TargetUserName = tostring(Accounts), SourceIP = IpAddress
    | project TimeGenerated, Computer, TargetUserName, SourceIP, FailureCount, AlertType
)
high severity medium confidence

Data Sources

Logon Session: Logon Session Creation Network Traffic: Network Connection Creation Windows Security Event ID 4624 (Logon) Windows Security Event ID 4625 (Failed Logon)

Required Tables

SecurityEvent DeviceNetworkEvents

False Positives

  • IT administrators performing legitimate remote administration of servers and workstations via RDP
  • Help desk staff using RDP to support end users, especially from a central jump server or bastion host
  • Automated monitoring or patch management tools (e.g., SCCM) that connect via RDP for maintenance
  • VPN-connected remote workers whose source IP appears external to network monitoring systems
  • Vendor remote support sessions initiated under approved change tickets

Unlock Pro Content

Get the full detection package for T1021.001 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections