heroui logo

Cisco SNMP Community String Configuration Changes

Splunk Security Content

View Source
Summary
This detection rule identifies changes to SNMP community strings on Cisco devices, which can indicate potential malicious activity, such as attackers trying to gain persistent access or exfiltrate sensitive information. Specifically, it looks for commands configuring SNMP community strings with read-write (rw) or read-only (ro) permissions, and changes to the SNMP host configurations. Given that attackers often modify these settings after gaining access to establish unauthorized monitoring capabilities, detecting such modifications is crucial for maintaining network security.
Categories
  • Network
Data Sources
  • Network Traffic
  • Application Log
ATT&CK Techniques
  • T1562.001
  • T1040
  • T1552
  • T1190
Created: 2025-08-21