Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

vCenter - Root impersonation

Back
Idf1fcb22c-b459-42f2-a7ee-7276b5f1309c
RulenamevCenter - Root impersonation
DescriptionDetects when root impersonation occurs.
SeverityMedium
TacticsPrivilegeEscalation
TechniquesT1078
Required data connectorsCustomLogsAma
KindScheduled
Query frequency1h
Query period1h
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VMware vCenter/Analytic Rules/vCenter-Root impersonation.yaml
Version1.0.2
Arm templatef1fcb22c-b459-42f2-a7ee-7276b5f1309c.json
Deploy To Azure
vCenter
 | where Message has_all ('ImpersonateUser', 'VcIntegrity', 'root')
 | extend user = 'root'
queryPeriod: 1h
query: |
  vCenter
   | where Message has_all ('ImpersonateUser', 'VcIntegrity', 'root')
   | extend user = 'root'  
name: vCenter - Root impersonation
entityMappings:
- fieldMappings:
  - columnName: user
    identifier: Name
  entityType: Account
queryFrequency: 1h
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VMware vCenter/Analytic Rules/vCenter-Root impersonation.yaml
requiredDataConnectors:
- connectorId: CustomLogsAma
  dataTypes:
  - vcenter_CL
description: |
    'Detects when root impersonation occurs.'
kind: Scheduled
version: 1.0.2
status: Available
severity: Medium
relevantTechniques:
- T1078
triggerOperator: gt
triggerThreshold: 0
tactics:
- PrivilegeEscalation
id: f1fcb22c-b459-42f2-a7ee-7276b5f1309c