
Summary
The 'Auditd Login Attempt at Forbidden Time' rule is designed to detect unauthorized login attempts made during periods that are deemed suspicious or unusual. Utilizing the auditd module, it identifies events that indicate login attempts falling outside of permitted time windows. Such activity could signify potential unauthorized access attempts, with the rule specifically targeting scenarios where login activity occurs contrary to established time-based access controls. The detection works on data indexed under 'auditbeat-*' and leverages a query constructed in the 'kuery' language to filter relevant events based on specified conditions. The rule's risk score is set at 47, which indicates a medium level of risk associated with detected events, suggesting that potential breaches or unauthorized access should be investigated further. Links to relevant MITRE ATT&CK techniques are provided to facilitate understanding of the attack patterns that this detection relates to, specifically regarding valid account usage for initial access and persistence tactics. Overall, this rule offers significant value for enhancing host security, particularly on Linux systems in relation to access control policies.
Categories
- Endpoint
- Linux
- On-Premise
- Identity Management
- Application
Data Sources
- User Account
- Logon Session
- Process
ATT&CK Techniques
- T1078
Created: 2020-07-08