Is this supposed to be triggered after you're logged in and then you get access, or simply execute a remote exploit to a server and you will, after executing, gain access?
I know this works with the RDP protocol itself, but I don't know if the authentication is made with the protocol.