
Summary
The ESXi External Root Login Activity rule is designed to detect anomalous login behavior on VMware ESXi hosts, specifically focusing on instances where the ESXi user interface (UI) is accessed using the root account. This is critical because using the root account for access circumvents role-based access controls and auditing mechanisms in place, potentially exposing the system to unauthorized access, misconfigurations, and risky behaviors indicative of compromised credentials. The rule analyzes VMWare ESXi syslogs to identify login attempts with the root account, excluding local or private IP address logins that are less suspicious. By leveraging both regular expressions and filtering, the rule extracts source and destination IP addresses and counts occurrences of such logins, providing vital information about potential unauthorized access attempts.
Categories
- Infrastructure
- Cloud
- Endpoint
Data Sources
- Pod
- Application Log
- Network Traffic
ATT&CK Techniques
- T1078
Created: 2025-05-13