June 21, 2023, 8:17 a.m. | Arslan Sabir

System Weakness - Medium systemweakness.com

In the previous blog we talked about the logging of RDP logs if you had not read the previous blog please find below link:

Windows RDP Event Logs: Identification, Tracking and Investigation Part-1

In this blog we will dive into a scenario involving the investigation of an RDP session. Remote Desktop Protocol (RDP) has become an essential tool for remote access and administration, but it also poses potential security risks. By investigating an RDP session scenario, we aim to uncover …

blog cybersecurity desktop dive event event logs find forensics identification investigation link log analysis logging logs protocol rdp remote desktop remote desktop protocol scenario session tracking windows

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Director, Cybersecurity - Governance, Risk and Compliance (GRC)

@ Stanley Black & Decker | New Britain CT USA - 1000 Stanley Dr

Information Security Risk Metrics Lead

@ Live Nation Entertainment | Work At Home-Connecticut

IT Product Owner - Enterprise DevSec Platform (d/f/m)

@ Airbus | Hamburg - Finkenwerder

Senior Information Security Specialist

@ Arthur Grand Technologies Inc | Arlington, VA, United States

Information Security Controls SME

@ Sword | Aberdeen, Scotland, United Kingdom