Skip to content

Commit 15d12b8

Browse files
Update detections/network/windows_remote_desktop_network_bruteforce_attempt.yml
Co-authored-by: Nasreddine Bencherchali <[email protected]>
1 parent 8e0c230 commit 15d12b8

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

detections/network/windows_remote_desktop_network_bruteforce_attempt.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ version: 6
44
date: '2025-01-10'
55
author: Jose Hernandez, Bhavin Patel, Splunk
66
status: production
7-
type: TTP
7+
type: Anomaly
88
description: The following analytic identifies potential Remote Desktop Protocol (RDP) brute force attacks by monitoring network traffic for RDP application activity. This query detects potential RDP brute force attacks by identifying source IPs that have made more than 10 connection attempts to the same RDP port on a host within a one-hour window. The results are presented in a table that includes the source and destination IPs, destination port, number of attempts, and the times of the first and last connection attempts, helping to prioritize IPs based on the intensity of activity.
99
data_source:
1010
- Sysmon EventID 3

0 commit comments

Comments
 (0)