heroui logo

ESXi Syslog Config Change

Splunk Security Content

View Source
Summary
This detection rule focuses on identifying changes made to the syslog configuration on VMware ESXi hosts through the `esxcli` command line tool. Such changes could indicate malicious attempts to disrupt log collection mechanisms, thus evading detection and making it more difficult to monitor activities on the ESXi host. By parsing syslog messages for specific patterns indicative of configuration changes, this rule alerts administrators when unauthorized adjustments are made, providing insights into potentially harmful behavior. With proper implementation, this rule ensures that any modifications to syslog settings are immediately highlighted for further investigation, thereby enhancing the security posture of ESXi environments.
Categories
  • Infrastructure
Data Sources
  • Volume
  • Process
ATT&CK Techniques
  • T1562.003
Created: 2025-05-13