
Summary
MacOS Log Removal detects deletion or modification of log files on macOS by identifying executions of the rm command with command-line arguments referencing system.log or audit-related paths. It uses the osquery endpoint data model to surface process activity and filters for rm invocations or audit-related commands that target log files, such as system.log or audit trails. The underlying SPL/Datamodel query aggregates by destination, file name, and process metadata to surface occurrences where logs may be removed or altered, aligning with Indicator Removal on Host (MITRE ATT&CK T1070). False positives include legitimate log rotation or administrative cleanup. Implementation requires the TA-OSquery to be deployed across indexers and forwarders to populate macOS process data into the Splunk data models.
Categories
- macOS
- Endpoint
Data Sources
- User Account
- Windows Registry
- Process
- File
- Pod
- Container
- Script
- Image
- Logon Session
- Application Log
- Sensor Health
- Kernel
- Drive
- Network Traffic
- Domain Name
- Module
- WMI
- Active Directory
- Service
- Process
- Certificate
- Firewall
- Network Share
- Scheduled Job
- Volume
- Driver
- Kernel
- Module
- Network Share
- Network Traffic
- Cloud Service
- Cloud Storage
- Instance
- Snapshot
- File
- Domain Name
- Pod
- Container
- User Account
- Script
- Application Log
- Process
- Command
ATT&CK Techniques
- T1070
Created: 2026-02-27