LoFP LoFP / t1021.001

t1021.001

TitleTags
administrative activity
administrative activity using a remote port forwarding to a local port
administrator may allow inbound traffic in certain network or machine.
administrator may remote desktop a spe
although it is recommended to not have rdp exposed to the internet, verify that this is a) allowed b) the server has not already been compromised via some brute force or remote exploit since it has been exposed to the internet. work to secure the server if you are unable to remove it from being exposed to the internet.
false positives may be present based on administrators using rdp files for legitimate purposes. filter as needed.
false positives will be present, filter as needed or restrict to critical assets on the perimeter.
legitimate system administrators enabling rdp for remote support
legitimate use of rdp shares by users to transfer and execute files may trigger this detection. it is essential to review the context of the process execution to determine if it is authorized activity.
network admin may add/remove/modify public inbound firewall rule that may cause this rule to be triggered.
no false positives have been identified at this time.
programs that connect locally to the rdp port
remote desktop may be used legitimately by users on the network.
system configuration scripts during deployment
third party rdp tools
this detection can catch for third party application updates or installation. in this scenario false positive filter is needed.
this tool was designed for home usage and not commonly seen in production environment. filter as needed.
unknown
valid user was not added to rdp group
wsl (windows sub system for linux)