
Summary
This detection rule focuses on identifying unauthorized changes made to the syslog loghost configuration on VMware ESXi hosts. Such modifications may be indicative of an attacker's attempt to disrupt normal log forwarding capabilities, thereby masking their activities and evading detection mechanisms. The rule leverages syslog messages generated by the ESXi environment and uses specific search queries to pinpoint when certain syslog keys are altered. By monitoring these changes, organizations can be alerted to potential malicious actions occurring within their infrastructure. The detection is implemented through Splunk, requiring correct configuration of the ESXi logs to ensure they are properly forwarded and ingested for analysis. To effectively utilize this rule, relevant Splunk Technology Add-ons must be in place to handle the incoming log data. Additionally, the rule takes into account the potential for limited false positives, allowing users to fine-tune them as necessary based on their unique environments.
Categories
- Infrastructure
Data Sources
- Volume
ATT&CK Techniques
- T1562
- T1562.003
Created: 2025-05-13