VMwareESXi
| where SyslogMessage has_all ("vim-cmd","hostsvc/enable_ssh")
| extend SrcUsername = extract(@'\[info\]\s+\[(.*?)\]', 1, SyslogMessage)
| extend DstHostname = extract(@'\[\d+\]\s+\[(.*?)\s+on', 1, SyslogMessage)
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VMWareESXi/Analytic Rules/ESXiSSHEnableOnHost.yaml
query: |
VMwareESXi
| where SyslogMessage has_all ("vim-cmd","hostsvc/enable_ssh")
| extend SrcUsername = extract(@'\[info\]\s+\[(.*?)\]', 1, SyslogMessage)
| extend DstHostname = extract(@'\[\d+\]\s+\[(.*?)\s+on', 1, SyslogMessage)
version: 1.0.0
tactics:
- LateralMovement
triggerThreshold: 0
relevantTechniques:
- T1021
entityMappings:
- entityType: Host
fieldMappings:
- columnName: DstHostname
identifier: FullName
- entityType: Account
fieldMappings:
- columnName: SrcUsername
identifier: Name
kind: Scheduled
queryFrequency: 10m
name: VMware ESXi - SSH Enable on ESXi Host
description: |
'Detects when vim-cmd is used to enable SSH on an ESXi host'
queryPeriod: 10m
triggerOperator: gt
id: 4f5b5d79-ff4e-4edd-ae3e-9e1187f0b924
status: Available
severity: High
requiredDataConnectors:
- datatypes:
- Syslog
connectorId: SyslogAma