VMware ESXi - Shared or stolen root account
| Id | 9c496d6c-42a3-4896-9b6c-00254386928f |
| Rulename | VMware ESXi - Shared or stolen root account |
| Description | Detects when shared or stolen root account. |
| Severity | High |
| Tactics | InitialAccess PrivilegeEscalation |
| Techniques | T1078 |
| Required data connectors | SyslogAma |
| Kind | Scheduled |
| Query frequency | 1h |
| Query period | 1h |
| Trigger threshold | 1 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VMWareESXi/Analytic Rules/ESXiSharedOrStolenRootAccount.yaml |
| Version | 1.0.3 |
| Arm template | 9c496d6c-42a3-4896-9b6c-00254386928f.json |
VMwareESXi
| where SyslogMessage has_all ('UserLoginSessionEvent', 'root', 'logged in')
| extend SrcIpAddr = extract(@'root@(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})', 1, SyslogMessage)
| summarize count() by SrcIpAddr, bin(TimeGenerated, 15m)
| where count_ > 1
| extend IPCustomEntity = SrcIpAddr
queryPeriod: 1h
query: |
VMwareESXi
| where SyslogMessage has_all ('UserLoginSessionEvent', 'root', 'logged in')
| extend SrcIpAddr = extract(@'root@(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})', 1, SyslogMessage)
| summarize count() by SrcIpAddr, bin(TimeGenerated, 15m)
| where count_ > 1
| extend IPCustomEntity = SrcIpAddr
name: VMware ESXi - Shared or stolen root account
entityMappings:
- fieldMappings:
- columnName: IPCustomEntity
identifier: Address
entityType: IP
queryFrequency: 1h
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VMWareESXi/Analytic Rules/ESXiSharedOrStolenRootAccount.yaml
requiredDataConnectors:
- connectorId: SyslogAma
datatypes:
- Syslog
description: |
'Detects when shared or stolen root account.'
kind: Scheduled
version: 1.0.3
status: Available
severity: High
relevantTechniques:
- T1078
triggerOperator: gt
triggerThreshold: 1
tactics:
- InitialAccess
- PrivilegeEscalation
id: 9c496d6c-42a3-4896-9b6c-00254386928f