Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

vCenter - Root impersonation

Back
Idf1fcb22c-b459-42f2-a7ee-7276b5f1309c
RulenamevCenter - Root impersonation
DescriptionDetects when root impersonation occurs.
SeverityMedium
TacticsPrivilegeEscalation
TechniquesT1078
Required data connectorsCustomLogsAma
KindScheduled
Query frequency1h
Query period1h
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VMware vCenter/Analytic Rules/vCenter-Root impersonation.yaml
Version1.0.2
Arm templatef1fcb22c-b459-42f2-a7ee-7276b5f1309c.json
Deploy To Azure
vCenter
 | where Message has_all ('ImpersonateUser', 'VcIntegrity', 'root')
 | extend user = 'root'
version: 1.0.2
id: f1fcb22c-b459-42f2-a7ee-7276b5f1309c
name: vCenter - Root impersonation
queryPeriod: 1h
requiredDataConnectors:
- connectorId: CustomLogsAma
  dataTypes:
  - vcenter_CL
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VMware vCenter/Analytic Rules/vCenter-Root impersonation.yaml
query: |
  vCenter
   | where Message has_all ('ImpersonateUser', 'VcIntegrity', 'root')
   | extend user = 'root'  
relevantTechniques:
- T1078
entityMappings:
- entityType: Account
  fieldMappings:
  - identifier: Name
    columnName: user
severity: Medium
kind: Scheduled
triggerThreshold: 0
triggerOperator: gt
tactics:
- PrivilegeEscalation
status: Available
queryFrequency: 1h
description: |
    'Detects when root impersonation occurs.'