Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

vCenter - Root impersonation

Back
Idf1fcb22c-b459-42f2-a7ee-7276b5f1309c
RulenamevCenter - Root impersonation
DescriptionDetects when root impersonation occurs.
SeverityMedium
TacticsPrivilegeEscalation
TechniquesT1078
Required data connectorsCustomLogsAma
KindScheduled
Query frequency1h
Query period1h
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VMware vCenter/Analytic Rules/vCenter-Root impersonation.yaml
Version1.0.2
Arm templatef1fcb22c-b459-42f2-a7ee-7276b5f1309c.json
Deploy To Azure
vCenter
 | where Message has_all ('ImpersonateUser', 'VcIntegrity', 'root')
 | extend user = 'root'
status: Available
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VMware vCenter/Analytic Rules/vCenter-Root impersonation.yaml
query: |
  vCenter
   | where Message has_all ('ImpersonateUser', 'VcIntegrity', 'root')
   | extend user = 'root'  
requiredDataConnectors:
- dataTypes:
  - vcenter_CL
  connectorId: CustomLogsAma
tactics:
- PrivilegeEscalation
name: vCenter - Root impersonation
relevantTechniques:
- T1078
severity: Medium
entityMappings:
- fieldMappings:
  - identifier: Name
    columnName: user
  entityType: Account
kind: Scheduled
queryFrequency: 1h
description: |
    'Detects when root impersonation occurs.'
triggerThreshold: 0
triggerOperator: gt
version: 1.0.2
queryPeriod: 1h
id: f1fcb22c-b459-42f2-a7ee-7276b5f1309c