dfirhub

EventLogs-RDP

Author: Mark Hallman, esecrpm

description

Collect Win7+ RDP related Event logs

paths

12 paths
EventLogsEvent logs Win7+
C:\Windows\System32\winevt\logs\System.evtx
EventLogsEvent logs Win7+
C:\Windows.old\Windows\System32\winevt\logs\System.evtx
EventLogsEvent logs Win7+
C:\Windows\System32\winevt\logs\Security.evtx
EventLogsEvent logs Win7+
C:\Windows.old\Windows\System32\winevt\logs\Security.evtx
EventLogsEvent logs Win7+
C:\Windows\System32\winevt\Logs\Microsoft-Windows-TerminalServices-RDPClient%4Operational.evtx
EventLogsEvent logs Win7+
C:\Windows.old\Windows\System32\winevt\Logs\Microsoft-Windows-TerminalServices-RDPClient%4Operational.evtx
EventLogsEvent logs Win7+
C:\Windows\System32\winevt\Logs\Microsoft-Windows-RemoteDesktopServices-RdpCoreTS%4Operational.evtx
EventLogsEvent logs Win7+
C:\Windows.old\Windows\System32\winevt\Logs\Microsoft-Windows-RemoteDesktopServices-RdpCoreTS%4Operational.evtx
EventLogsEvent logs Win7+
C:\Windows\System32\winevt\Logs\Microsoft-Windows-TerminalServices-RemoteConnectionManager%4Operational.evtx
EventLogsEvent logs Win7+
C:\Windows.old\Windows\System32\winevt\Logs\Microsoft-Windows-TerminalServices-RemoteConnectionManager%4Operational.evtx
EventLogsEvent logs Win7+
C:\Windows\System32\winevt\Logs\Microsoft-Windows-TerminalServices-LocalSessionManager%4Operational.evtx
EventLogsEvent logs Win7+
C:\Windows.old\Windows\System32\winevt\Logs\Microsoft-Windows-TerminalServices-LocalSessionManager%4Operational.evtx
paths use Windows environment syntax

collection commands

# PowerShell Artifact Collection Script
# Target: EventLogs-RDP
# Run as Administrator

#Requires -RunAsAdministrator

$ErrorActionPreference = "SilentlyContinue"
$DestBase = "D:\Evidence"

# Function to handle directory creation and copying
function Collect-Artifact {
    param (
        [string]$SourcePath,
        [string]$FolderName
    )
    $FullDest = Join-Path -Path $DestBase -ChildPath $FolderName
    if (-not (Test-Path -Path $FullDest)) {
        New-Item -ItemType Directory -Path $FullDest -Force | Out-Null
    }
    Copy-Item -Path $SourcePath -Destination $FullDest -Recurse -Force
}

# 1. Event logs Win7+
Collect-Artifact -SourcePath "C:\Windows\System32\winevt\logs\\System.evtx" -FolderName "Event_logs_Win7_"

# 2. Event logs Win7+
Collect-Artifact -SourcePath "C:\Windows.old\Windows\System32\winevt\logs\\System.evtx" -FolderName "Event_logs_Win7_"

# 3. Event logs Win7+
Collect-Artifact -SourcePath "C:\Windows\System32\winevt\logs\\Security.evtx" -FolderName "Event_logs_Win7_"

# 4. Event logs Win7+
Collect-Artifact -SourcePath "C:\Windows.old\Windows\System32\winevt\logs\\Security.evtx" -FolderName "Event_logs_Win7_"

# 5. Event logs Win7+
Collect-Artifact -SourcePath "C:\Windows\System32\winevt\Logs\\Microsoft-Windows-TerminalServices-RDPClient%4Operational.evtx" -FolderName "Event_logs_Win7_"

# 6. Event logs Win7+
Collect-Artifact -SourcePath "C:\Windows.old\Windows\System32\winevt\Logs\\Microsoft-Windows-TerminalServices-RDPClient%4Operational.evtx" -FolderName "Event_logs_Win7_"

# 7. Event logs Win7+
Collect-Artifact -SourcePath "C:\Windows\System32\winevt\Logs\\Microsoft-Windows-RemoteDesktopServices-RdpCoreTS%4Operational.evtx" -FolderName "Event_logs_Win7_"

# 8. Event logs Win7+
Collect-Artifact -SourcePath "C:\Windows.old\Windows\System32\winevt\Logs\\Microsoft-Windows-RemoteDesktopServices-RdpCoreTS%4Operational.evtx" -FolderName "Event_logs_Win7_"

# 9. Event logs Win7+
Collect-Artifact -SourcePath "C:\Windows\System32\winevt\Logs\\Microsoft-Windows-TerminalServices-RemoteConnectionManager%4Operational.evtx" -FolderName "Event_logs_Win7_"

# 10. Event logs Win7+
Collect-Artifact -SourcePath "C:\Windows.old\Windows\System32\winevt\Logs\\Microsoft-Windows-TerminalServices-RemoteConnectionManager%4Operational.evtx" -FolderName "Event_logs_Win7_"

# 11. Event logs Win7+
Collect-Artifact -SourcePath "C:\Windows\System32\winevt\Logs\\Microsoft-Windows-TerminalServices-LocalSessionManager%4Operational.evtx" -FolderName "Event_logs_Win7_"

# 12. Event logs Win7+
Collect-Artifact -SourcePath "C:\Windows.old\Windows\System32\winevt\Logs\\Microsoft-Windows-TerminalServices-LocalSessionManager%4Operational.evtx" -FolderName "Event_logs_Win7_"

Write-Host "Collection complete!" -ForegroundColor Green

Save as .ps1 and run as Administrator. Use: powershell -ExecutionPolicy Bypass -File script.ps1

references