heroui logo

Logging Configuration Changes on Linux Host

Sigma Rules

View Source
Summary
This rule enables detection of unauthorized changes to the configuration files of syslog daemons on Linux hosts. By monitoring specific paths associated with syslog configurations, the rule captures events related to alterations in logs that may indicate an attacker's attempt to cover their tracks or manipulate logging behaviors. The key files monitored include '/etc/syslog.conf', '/etc/rsyslog.conf', and '/etc/syslog-ng/syslog-ng.conf'. The detection mechanism operates by utilizing the 'auditd' service to generate events when the specified configuration files are modified. This rule is essential for maintaining the integrity of logging configurations, which are critical for forensic investigations and compliance monitoring.
Categories
  • Linux
  • Endpoint
Data Sources
  • File
  • Logon Session
  • Process
Created: 2019-10-25