Detections
- Home
- - Detections
- -DT121
- ID: DT121
- Created: 29th April 2025
- Updated: 29th April 2025
- Platform: Windows
- Contributor: The ITM Team
RDP Group Membership Changes
Monitor and alert when users are added to the local Remote Desktop Users
group on Windows systems. Unauthorized additions to this group provide remote logon privileges and may indicate preparatory insider activity.
Detection Methods
- Audit group membership changes using Windows Security Event ID 4732.
Track additions to theRemote Desktop Users
group (SID: S-1-5-32-555).
Correlate membership changes with user identity, prior privilege levels, and change management records.
Indicators
- Unauthorized or unexpected users added to the Remote Desktop Users group.
Membership changes performed outside approved IT operations or helpdesk interventions.
Additions correlated with accounts flagged for prior policy violations or behavioral risk indicators.
Sections
ID | Name | Description |
---|---|---|
PR026 | Remote Desktop (RDP) Access on Windows Systems | The subject initiates configuration changes to enable Remote Desktop Protocol (RDP) or Remote Assistance on a Windows system, typically through the System Properties dialog, registry modifications, or local group policy. This behavior may indicate preparatory actions to grant unauthorized remote access to the endpoint, whether to an external actor, co-conspirator, or secondary account.
CharacteristicsSubject opens the Remote tab within the System Properties dialog (
May configure additional RDP-related settings such as:
Often accompanied by:
In some cases, used to stage access prior to file exfiltration, remote control handoff, or backdoor persistence.
Example ScenarioA subject accesses the Remote tab via |