Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

VMware ESXi - Root password changed

Back
Id17b0ea43-5aeb-4dc4-ac3a-be84acb8d5b7
RulenameVMware ESXi - Root password changed
DescriptionDetects when root user password is changed.
SeverityHigh
TacticsInitialAccess
Persistence
DefenseEvasion
TechniquesT1078
T1098
T1556
Required data connectorsSyslogAma
KindScheduled
Query frequency10m
Query period10m
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VMWareESXi/Analytic Rules/ESXiRootPasswordChange.yaml
Version1.0.0
Arm template17b0ea43-5aeb-4dc4-ac3a-be84acb8d5b7.json
Deploy To Azure
VMwareESXi
| where SyslogMessage has_any ("password changed for root","Password was changed for account root")
| extend SrcIpAddr = extract(@'root@(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})', 1, SyslogMessage)
severity: High
triggerOperator: gt
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VMWareESXi/Analytic Rules/ESXiRootPasswordChange.yaml
id: 17b0ea43-5aeb-4dc4-ac3a-be84acb8d5b7
entityMappings:
- fieldMappings:
  - identifier: Address
    columnName: SrcIpAddr
  entityType: IP
kind: Scheduled
status: Available
tactics:
- InitialAccess
- Persistence
- DefenseEvasion
queryFrequency: 10m
requiredDataConnectors:
- connectorId: SyslogAma
  datatypes:
  - Syslog
relevantTechniques:
- T1078
- T1098
- T1556
version: 1.0.0
description: |
    'Detects when root user password is changed.'
triggerThreshold: 0
query: |
  VMwareESXi
  | where SyslogMessage has_any ("password changed for root","Password was changed for account root")
  | extend SrcIpAddr = extract(@'root@(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})', 1, SyslogMessage)  
queryPeriod: 10m
name: VMware ESXi - Root password changed