heroui logo

Attempt to Disable Syslog Service

Elastic Detection Rules

View Source
Summary
The rule detects attempts by adversaries to disable the syslog service, a critical logging component in Linux systems, as part of evading detection and disrupting event logging. This is accomplished through EQL queries monitoring specific process actions (like 'exec', 'start', 'disable') that manipulate syslog services (e.g., syslog, rsyslog) identified by relevant arguments provided in the rule. The rule emphasizes the importance of maintaining functioning syslog services as they play a vital role in security vigilance. Effective detection is facilitated through integrations including Elastic Defend and Auditbeat, requiring proper setup and configuration to ensure relevant data is ingested for monitoring. Investigation steps encourage reviewing user account activity, examining correlated logs, and determining the context of processes in order to distinguish between routine maintenance and suspicious actions. The rule asserts the importance of immediate response actions, including isolating affected systems and reverting service disruptions to recover logging capabilities while enforcing robust access controls for critical services.
Categories
  • Endpoint
  • Linux
Data Sources
  • Container
  • User Account
  • Process
  • Web Credential
  • Application Log
ATT&CK Techniques
  • T1562
  • T1562.001
Created: 2020-04-27