
Summary
The 'Cisco Configuration Archive Logging Analysis' detection rule focuses on monitoring and analyzing configuration changes on Cisco devices through their archive logs. It captures all modifications made to a device’s configuration, thereby creating a detailed audit trail essential for identifying potential malicious activity, such as unauthorized configuration changes that may allow for backdoor access, changes to SNMP community strings, or the setup of TFTP server configurations for data exfiltration. This rule utilizes a Splunk query that analyzes the Change data model for specific commands indicative of high-risk behavior and highlights suspicious configuration changes made by users on the devices. By employing this methodology, security teams can detect patterns commonly associated with attacks and enhance their response strategies to secure networked environments.
Categories
- Network
Data Sources
- Pod
- Network Traffic
- Application Log
- Process
ATT&CK Techniques
- T1562.001
- T1098
- T1505.003
- T1190
Created: 2025-08-21