VMwareESXi
| where SyslogMessage has_all ("vim-cmd","hostsvc/enable_ssh")
| extend SrcUsername = extract(@'\[info\]\s+\[(.*?)\]', 1, SyslogMessage)
| extend DstHostname = extract(@'\[\d+\]\s+\[(.*?)\s+on', 1, SyslogMessage)
triggerOperator: gt
queryFrequency: 10m
requiredDataConnectors:
- connectorId: SyslogAma
datatypes:
- Syslog
relevantTechniques:
- T1021
entityMappings:
- entityType: Host
fieldMappings:
- identifier: FullName
columnName: DstHostname
- entityType: Account
fieldMappings:
- identifier: Name
columnName: SrcUsername
query: |
VMwareESXi
| where SyslogMessage has_all ("vim-cmd","hostsvc/enable_ssh")
| extend SrcUsername = extract(@'\[info\]\s+\[(.*?)\]', 1, SyslogMessage)
| extend DstHostname = extract(@'\[\d+\]\s+\[(.*?)\s+on', 1, SyslogMessage)
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VMWareESXi/Analytic Rules/ESXiSSHEnableOnHost.yaml
queryPeriod: 10m
name: VMware ESXi - SSH Enable on ESXi Host
status: Available
kind: Scheduled
description: |
'Detects when vim-cmd is used to enable SSH on an ESXi host'
id: 4f5b5d79-ff4e-4edd-ae3e-9e1187f0b924
version: 1.0.0
tactics:
- LateralMovement
severity: High