forked from splunk/security_content
-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathidentify_systems_creating_rdp_traffic.yml
More file actions
38 lines (38 loc) · 1.23 KB
/
identify_systems_creating_rdp_traffic.yml
File metadata and controls
38 lines (38 loc) · 1.23 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
baseline:
splunk:
schedule:
cron_schedule: ''
earliest_time: -30d@d
latest_time: -10m@m
search: '| tstats `security_content_summariesonly` count from datamodel=Network_Traffic where All_Traffic.dest_port=3389
by All_Traffic.src | `drop_dm_object_name("All_Traffic")` | sort - count'
creation_date: '2017-04-24'
data_metadata:
data_models:
- Network_Traffic
data_source:
- Network Communication
providing_technologies:
- Splunk Stream
- Bro
description: This search counts the numbers of times the system has generated remote
desktop traffic.
eli5: This search counts the numbers of times the system has tried to connect to another
system on TCP/3389, the default port used for RDP traffic.
how_to_implement: To successfully implement this search, you must ingest network traffic
and populate the Network_Traffic data model.
id: 5cdda34f-4caf-4128-a713-0837fc48b67a
known_false_positives: ''
maintainers:
- company: Splunk
email: davidd@splunk.com
name: David Dorsey
modification_date: '2017-09-15'
name: Identify Systems Creating Remote Desktop Traffic
original_authors:
- company: Splunk
email: davidd@splunk.com
name: David Dorsey
spec_version: 2
type: splunk
version: '1.0'