Account breached; How to detect inbound connections made via RDP?

TedMacD
Conversationalist

Account breached; How to detect inbound connections made via RDP?

Hi All,

 

Is there a filter, in the Meraki event logs, which would identify any/all connections that have been made via RDP?  A computer on the network in question was running RDP on the standard port via port forwarding, and I'm trying to determine if/when anyone was connecting to it via that method because a user's Gmail account was breached and I'm trying to figure out how that occurred when 2FA is enabled on the account. 

 

Wondering if somebody lucked out and came across the IP and subsequently found the workstation in an unlocked state.  Seems unlikely, but I'd like to track who's been connecting in.

 

Thanks in advance...

2 Replies 2
TedMacD
Conversationalist

Meraki support advises me that RDP connections are not logged, which is unfortunate.

PhilipDAth
Kind of a big deal
Kind of a big deal

Get notified when there are additional replies to this discussion.
Welcome to the Meraki Community!
To start contributing, simply sign in with your Cisco account. If you don't yet have a Cisco account, you can sign up.
Labels