Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

VMware ESXi - Root password changed

Back
Id17b0ea43-5aeb-4dc4-ac3a-be84acb8d5b7
RulenameVMware ESXi - Root password changed
DescriptionDetects when root user password is changed.
SeverityHigh
TacticsInitialAccess
Persistence
DefenseEvasion
TechniquesT1078
T1098
T1556
Required data connectorsSyslogAma
KindScheduled
Query frequency10m
Query period10m
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VMWareESXi/Analytic Rules/ESXiRootPasswordChange.yaml
Version1.0.0
Arm template17b0ea43-5aeb-4dc4-ac3a-be84acb8d5b7.json
Deploy To Azure
VMwareESXi
| where SyslogMessage has_any ("password changed for root","Password was changed for account root")
| extend SrcIpAddr = extract(@'root@(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})', 1, SyslogMessage)
requiredDataConnectors:
- datatypes:
  - Syslog
  connectorId: SyslogAma
queryPeriod: 10m
triggerThreshold: 0
queryFrequency: 10m
version: 1.0.0
status: Available
severity: High
description: |
    'Detects when root user password is changed.'
name: VMware ESXi - Root password changed
entityMappings:
- fieldMappings:
  - identifier: Address
    columnName: SrcIpAddr
  entityType: IP
triggerOperator: gt
id: 17b0ea43-5aeb-4dc4-ac3a-be84acb8d5b7
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VMWareESXi/Analytic Rules/ESXiRootPasswordChange.yaml
tactics:
- InitialAccess
- Persistence
- DefenseEvasion
relevantTechniques:
- T1078
- T1098
- T1556
kind: Scheduled
query: |
  VMwareESXi
  | where SyslogMessage has_any ("password changed for root","Password was changed for account root")
  | extend SrcIpAddr = extract(@'root@(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})', 1, SyslogMessage)