Splunk Search

RDP Session Daisy Chain

srakiec
New Member

Hello,

I am trying to form a script that will parse information to detect RDP sessions that are Daisy Chained over our network.

Example:

src=* dest=* dest_port=3389 | transaction dest startswith=(src)

src=w.x.y.z. dest=1.2.3.4 dest_port-3389
scr=1.2.3.4 dest=a.b.c.d dest_port=3389

The problem is continuing the search to find multiple jumps and listing the multiple IPS.

0 Karma

micahkemp
Champion

You need duration or end time in addition to start time to consider doing this.

It's also going to be difficult to do this in a "normal" Splunk search. I did something somewhat similar with mail logs. Specifically I had to write a custom search command that followed tree-like data, which is what your use case really needs.

0 Karma
Get Updates on the Splunk Community!

From GPU to Application: Monitoring Cisco AI Infrastructure with Splunk Observability ...

AI workloads are different. They demand specialized infrastructure—powerful GPUs, enterprise-grade networking, ...

Application management with Targeted Application Install for Victoria Experience

  Experience a new era of flexibility in managing your Splunk Cloud Platform apps! With Targeted Application ...

Index This | What goes up and never comes down?

January 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...