rdp_scanning_outside_to_inside
Explanation
This NDM was created by the Netography Threat Research team to detect Microsoft RDP scanning. It triggers when an external IP address attempts to scan the network for open RDP ports in an attempt to gain access to internal systems.
What to Look For
When this event is triggered, examine the IP address of the attacker and the targeted IP addresses to determine if any unauthorized RDP connections were made. It is recommended to immediately block the external IP address and review internal security policies and configurations to prevent future attacks.
Related MITRE ATT&CK Categories
Remote Services, Technique T1021 - Enterprise
System Owner/User Discovery, Technique T1033 - Enterprise
Brute Force, Technique T1110 - Enterprise
Updated 4 days ago