by Haja Mo March 21, 2024 Cybersecurity Where in the world is your attacker? Presenting a less-known but useful event to look for in your logs Previous Story Remote Desktop Protocol: Executing the 4624_4625 Login Query Next Story Remote Desktop Protocol: Queries for Investigation