T1021.001
Remote Desktop Protocol
Adversaries may use Valid Accounts to log into a computer using the Remote Desktop Protocol (RDP). RDP is a common feature in Windows that allows interactive graphical sessions on remote systems. Threat actors including Kimsuky, INC Ransom, Volt Typhoon, Wizard Spider, BlackByte, Akira, and FIN7 have all leveraged RDP for lateral movement. Adversaries typically acquire credentials via Credential Access techniques, then use RDP to expand access to additional systems, deploy ransomware interactively, or establish persistence via Accessibility Features.
Microsoft Sentinel / Defender
kusto
// Detect suspicious RDP lateral movement patterns
let SensitiveHosts = dynamic(["dc", "domain-controller", "dc01", "pdc"]);
SecurityEvent
| where TimeGenerated > ago(24h)
| where EventID == 4624
| where LogonType == 10 // RemoteInteractive = RDP
| extend TargetHost = tostring(Computer)
| extend SourceIP = tostring(IpAddress)
| where SourceIP !startswith "127." and SourceIP != "-" and SourceIP != ""
// Flag logons to sensitive hosts or from unexpected sources
| extend ToSensitiveHost = TargetHost has_any (SensitiveHosts)
| extend IsPrivilegedAccount = TargetUserName has_any ("admin", "administrator", "svc", "service")
// Join with logon failures to identify brute-force followed by success
| project TimeGenerated, Computer, TargetUserName, TargetDomainName, SourceIP, LogonType, SubjectUserName, ToSensitiveHost, IsPrivilegedAccount
| sort by TimeGenerated desc
| union (
SecurityEvent
| where TimeGenerated > ago(24h)
| where EventID == 4625
| where LogonType == 10
| where IpAddress !startswith "127." and IpAddress != "-"
| summarize FailureCount=count(), Accounts=make_set(TargetUserName) by IpAddress, bin(TimeGenerated, 5m)
| where FailureCount >= 5
| extend AlertType = "RDP BruteForce", Computer = "", TargetUserName = tostring(Accounts), SourceIP = IpAddress
| project TimeGenerated, Computer, TargetUserName, SourceIP, FailureCount, AlertType
) high severity
medium confidence
Data Sources
Logon Session: Logon Session Creation Network Traffic: Network Connection Creation Windows Security Event ID 4624 (Logon) Windows Security Event ID 4625 (Failed Logon)
Required Tables
SecurityEvent DeviceNetworkEvents
False Positives
- IT administrators performing legitimate remote administration of servers and workstations via RDP
- Help desk staff using RDP to support end users, especially from a central jump server or bastion host
- Automated monitoring or patch management tools (e.g., SCCM) that connect via RDP for maintenance
- VPN-connected remote workers whose source IP appears external to network monitoring systems
- Vendor remote support sessions initiated under approved change tickets
Last updated: 2026-04-13 Research depth: deep
References (8)
- https://attack.mitre.org/techniques/T1021/001/
- https://technet.microsoft.com/en-us/windowsserver/ee236407.aspx
- https://learn.microsoft.com/en-us/defender-endpoint/advanced-hunting-securityevent-table
- https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4624
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1021.001/T1021.001.md
- https://www.crowdstrike.com/blog/adversary-tricks-crowdstrike-treats/
- https://www.mandiant.com/resources/blog/fin12-ransomware-intrusion-actor-partnering-trickbot
- https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-038a
Unlock Pro Content
Get the full detection package for T1021.001 including response playbook, investigation guide, and atomic red team tests.
Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance