Product
ESXi VIB Acceptance Level Tampering Detection
2 rulesThis detection identifies changes to the VIB (vSphere Installation Bundle) acceptance level on an ESXi host, potentially allowing the installation of unsigned or unverified software and lowering the system's integrity enforcement.
ESXi Syslog Configuration Changes via esxcli
2 rules 1 TTPDetection of ESXi syslog configuration changes via esxcli command, potentially indicating an attempt to disrupt logging and evade detection.
ESXi Firewall Disabled Detection
2 rulesThis detection identifies when the ESXi firewall is disabled or set to permissive mode, potentially exposing the host to unauthorized access and network-based attacks, often preceding lateral movement, data exfiltration, or malware installation.
ESXi Encryption Settings Modification
2 rulesDetection of modifications to ESXi host encryption settings, such as disabling secure boot or executable verification, which may indicate attempts to weaken hypervisor integrity and allow unauthorized code execution.
ESXi Download Error Detection
2 rules 2 TTPsDetection of failed file download attempts on ESXi hosts, potentially indicating unauthorized or malicious activity such as installing or updating components, including VIBs or scripts.
ESXi Audit Tampering Detection
2 rules 1 TTPDetection identifies the use of the esxcli system auditrecords commands to tamper with logging on an ESXi host, potentially evading detection and hindering forensic analysis.
ESXi Loghost Configuration Tampering
2 rules 1 TTPAn attacker modifies the ESXi host's syslog configuration to disrupt log forwarding, potentially evading detection and hindering incident response.
ESXi Lockdown Mode Disabled
2 rulesThe disabling of Lockdown Mode on an ESXi host may indicate a threat actor attempting to weaken host security controls to enable broader remote access for data exfiltration, lateral movement, or VM tampering.