heroui logo

ESXi Audit Tampering

Splunk Security Content

View Source
Summary
This detection rule identifies potential tampering with audit records on VMware ESXi hosts by monitoring the usage of the 'esxcli system auditrecords' command. Such usage can be indicative of an attempt to evade detection or hinder forensic analysis, as it may prevent the recording of critical system-level audit events. The rule extracts relevant fields from the syslog data generated by the ESXi host to aggregate counts, occurrences, and the involved users and commands, facilitating the identification of suspicious activity related to audit tampering.
Categories
  • Infrastructure
  • Endpoint
  • On-Premise
  • Cloud
Data Sources
  • Pod
  • Service
  • File
  • Container
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1562.003
  • T1070
Created: 2025-07-01