
Summary
This detection rule monitors for attempts to forcefully stop the Uncomplicated Firewall (UFW) service in Linux systems. The rule is designed to capture command-line executions that involve the usage of 'ufw-init' with the argument 'force-stop' as well as any attempts to disable the UFW using the 'ufw disable' command. It employs a logic condition that triggers on the occurrence of any one of these specific command-line patterns. This rule is particularly significant for security teams, as the UFW is a crucial component for managing incoming and outgoing traffic and ensuring the integrity of the firewall settings. The detection of such actions may indicate unauthorized attempts to bypass security measures implemented on a Linux system. This rule is particularly valuable in environments where strict firewall controls are necessary to mitigate expose to threats. Network administrators may generate false positives due to their legitimate needs to configure firewall settings.
Categories
- Linux
- Endpoint
Data Sources
- Process
Created: 2023-01-18