SV-56535r4_rule
V-43714
AD.AU.0003
AD.AU.0003
CAT II
10
More advanced filtering is necessary to obtain the pertinent information than just looking for event IDs.
Search for the event IDs listed with the following additional attributes:
Logon Type = 10 (RemoteInteractive)
Authentication Package Name = Negotiate
Successful User Account Login (Subcategory: Logon)
4624 - An account was successfully logged on.
The "Remote Desktop Logon Detection" section of NSA's "Spotting the Adversary with Windows Event Log Monitoring" provides a sample query for filtering.
https://www.iad.gov/iad/library/reports/spotting-the-adversary-with-windows-event-log-monitoring.cfm.
Verify Remote Desktop logins are being monitored. Event monitoring may be implemented through various methods including log aggregation and the use of monitoring tools.
Monitor for the events listed below. If these events are not monitored, this is a finding.
More advanced filtering is necessary to obtain the pertinent information than just looking for event IDs.
Search for the event IDs listed with the following additional attributes:
Logon Type = 10 (RemoteInteractive)
Authentication Package Name = Negotiate
Successful User Account Login (Subcategory: Logon)
4624 - An account was successfully logged on.
V-43714
False
AD.AU.0003
Verify Remote Desktop logins are being monitored. Event monitoring may be implemented through various methods including log aggregation and the use of monitoring tools.
Monitor for the events listed below. If these events are not monitored, this is a finding.
More advanced filtering is necessary to obtain the pertinent information than just looking for event IDs.
Search for the event IDs listed with the following additional attributes:
Logon Type = 10 (RemoteInteractive)
Authentication Package Name = Negotiate
Successful User Account Login (Subcategory: Logon)
4624 - An account was successfully logged on.
M
870