
Summary
This detection rule monitors for changes made to the ESXi syslog configuration through the use of the ESXCLI command line interface. The rule specifically targets process creation events where the command executed ends with 'esxcli', and the command line arguments contain keywords related to the system's syslog configuration, specifically looking for operations that include 'set'. Changes to syslog configuration can indicate possible security misconfigurations or malicious intent, as attackers may attempt to alter logging settings to evade detection. Therefore, this rule forms an essential component of the monitoring strategy for maintaining the integrity and visibility of ESXi environments, particularly for identifying potential defense evasion tactics. The rule has a medium level of severity and may sometimes produce false positives during legitimate administrative tasks where configuration changes are being made.
Categories
- Infrastructure
- Cloud
Data Sources
- Process
Created: 2023-09-04