Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

VMware ESXi - Root password changed

Back
Id17b0ea43-5aeb-4dc4-ac3a-be84acb8d5b7
RulenameVMware ESXi - Root password changed
DescriptionDetects when root user password is changed.
SeverityHigh
TacticsInitialAccess
Persistence
DefenseEvasion
TechniquesT1078
T1098
T1556
Required data connectorsSyslogAma
KindScheduled
Query frequency10m
Query period10m
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VMWareESXi/Analytic Rules/ESXiRootPasswordChange.yaml
Version1.0.0
Arm template17b0ea43-5aeb-4dc4-ac3a-be84acb8d5b7.json
Deploy To Azure
VMwareESXi
| where SyslogMessage has_any ("password changed for root","Password was changed for account root")
| extend SrcIpAddr = extract(@'root@(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})', 1, SyslogMessage)
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VMWareESXi/Analytic Rules/ESXiRootPasswordChange.yaml
queryPeriod: 10m
version: 1.0.0
entityMappings:
- fieldMappings:
  - identifier: Address
    columnName: SrcIpAddr
  entityType: IP
relevantTechniques:
- T1078
- T1098
- T1556
queryFrequency: 10m
triggerOperator: gt
kind: Scheduled
query: |
  VMwareESXi
  | where SyslogMessage has_any ("password changed for root","Password was changed for account root")
  | extend SrcIpAddr = extract(@'root@(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})', 1, SyslogMessage)  
id: 17b0ea43-5aeb-4dc4-ac3a-be84acb8d5b7
tactics:
- InitialAccess
- Persistence
- DefenseEvasion
status: Available
requiredDataConnectors:
- connectorId: SyslogAma
  datatypes:
  - Syslog
triggerThreshold: 0
name: VMware ESXi - Root password changed
severity: High
description: |
    'Detects when root user password is changed.'