heroui logo

JAMF MDM Execution

Sigma Rules

View Source
Summary
This detection rule monitors the execution of the "jamf" binary on macOS systems, specifically focusing on command line activities associated with user account management and configuration changes. The rule captures processes that end with the name "jamf" and searches for specific command line arguments that can signify potential misuse of the binary, such as 'createAccount', 'manage', 'removeFramework', 'removeMdmProfile', 'resetPassword', and 'setComputerName'. These activities could be leveraged by malicious actors to bypass security protocols, create unauthorized user accounts, or otherwise manipulate the system's management framework. By monitoring these activities, organizations can gain visibility into unauthorized attempts to control or configure devices using JAMF software, hence providing an important line of defense against internal abuses or external breaches that exploit these administrative tools.
Categories
  • macOS
  • Endpoint
  • Infrastructure
Data Sources
  • Process
Created: 2023-08-22