Skip to content

Commit

Permalink
Merge pull request #3120 from splunk/intergration_linux_fixes
Browse files Browse the repository at this point in the history
linux auditd fixes
  • Loading branch information
patel-bhavin committed Sep 9, 2024
2 parents adb02e1 + 5ae9ace commit c80663d
Showing 1 changed file with 1 addition and 3 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -15,9 +15,7 @@ description: The following analytic detects suspicious access or modification of
data_source:
- Linux Auditd Path
search: '`linux_auditd` type=PATH name="/etc/ssh/ssh_config*" | rename host as dest
| stats count min(_time) as firstTime max(_time) as lastTime by name nametype OGID
dest | `security_content_ctime(firstTime)`| `security_content_ctime(lastTime)`|
`linux_auditd_possible_access_or_modification_of_sshd_config_file_filter`'
| stats count min(_time) as firstTime max(_time) as lastTime by name nametype OGID type dest | `security_content_ctime(firstTime)`| `security_content_ctime(lastTime)`| `linux_auditd_possible_access_or_modification_of_sshd_config_file_filter`'
how_to_implement: To implement this detection, the process begins by ingesting auditd
data, that consist SYSCALL, TYPE, EXECVE and PROCTITLE events, which captures command-line
executions and process details on Unix/Linux systems. These logs should be ingested
Expand Down

0 comments on commit c80663d

Please sign in to comment.