[Osquery_manager] RDP artifact saved query #17003
Open
+175
−2
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
RDP Authentication Events
Comprehensive Remote Desktop Protocol (RDP) authentication and session tracking query for Windows forensic analysis. This query provides complete visibility into RDP activity by monitoring four distinct Windows event log channels, enabling detection of lateral movement, unauthorized access attempts, and session hijacking.
Core Forensic Artifacts Coverage
Queries by Platform
🪟 Windows - RDP Authentication and Session Tracking
Description
Monitors Windows Event Logs across four channels to provide comprehensive RDP session visibility. Captures successful and failed authentication attempts, session connections/disconnections, and session lifecycle events critical for detecting lateral movement and unauthorized remote access.
Detection Focus:
Event Coverage:
Result
Query results include event timestamps, usernames, source IPs, logon types, and human-readable event descriptions (e.g.,
RDP_LOGON_SUCCESSFUL_NEW,SESSION_RECONNECTED,RDP_LOGON_FAILED) for rapid analyst triage.Platform
windowsInterval
3600seconds (1 hour)Query ID
rdp_authentication_windows_elasticECS Field Mappings
event.category→["authentication"](static)event.action→osquery.rdp_authentication(static)event.code→eventidevent.reason→event_descriptionhost.hostname→computer_nameuser.name→user_nameuser.domain→domain_namesource.ip→source_ipsource.port→source_portlog.level→levelprocess.pid→pidwinlog.channel→channelwinlog.logon.type→logon_typewinlog.logon.id→logon_idwinlog.event_data.WorkstationName→workstation_namewinlog.event_data.LogonProcessName→logon_processwinlog.event_data.AuthenticationPackageName→auth_packagewinlog.event_data.SubjectUserName→subject_userwinlog.event_data.SubjectDomainName→subject_domainwinlog.event_data.Status→status_codewinlog.event_data.SubStatus→sub_status_codewinlog.event_data.FailureReason→failure_reasontags→["osquery", "rdp", "authentication", "lateral_movement", "windows"](static)SQL Query