
Summary
The "WebServer Access Logs Deleted" detection rule identifies instances where access logs from web servers are deleted, which may indicate malicious activity such as an attempt to evict detection or destroy digital forensic evidence. The rule operates on a variety of operating systems including Windows, Linux, and macOS, by monitoring specific file paths that are traditionally utilized for web server access logs. The rule uses EQL (Event Query Language) to query the log files for deletion events, indicating potential attempts at covering tracks by adversaries. A risk score of 47 indicates a medium level of concern, prompting organizations to investigate such incidents carefully. The rule includes detailed guidance for setup, possible investigation steps, false positive analysis, and response recommendations to ensure clarity and efficient operations when such an event is detected. The key investigative steps may involve reviewing affected file paths, checking access logs for prior activity, and correlating deletion events with other anomalies to identify any malicious intents.
Categories
- Endpoint
- Web
- Linux
- Windows
- macOS
Data Sources
- File
- Logon Session
- Network Traffic
- Application Log
ATT&CK Techniques
- T1070
Created: 2020-11-03