This alert Detect Failed Login Attempts on Linux Machine
Critical
Alert Rule
title: Failed Login Attempted on Linux server
author: Admin
description: Detect Failed Login Attempts on Linux Machine
detection:
condition: ((selection1 and selection2) and selection3)
selection1:
event.action|contains: PAM:authentication
selection2:
event.category|contains: USER_AUTH
selection3:
event.outcome: failed
level: critical
logsource:
product: linux
service: security
logtype: linux
This alert Detects the use of the rm command to remove files on a Linux system.
High
Alert Rule
title: A User deleted a file using remove command
author: Admin
description: Detects the use of the rm command to remove files on a Linux system
detection:
condition: selection1 and selection2
selection1:
event.category|contains: fim
selection2:
process.name|contains: rm
level: High
logsource:
category: linux
product: linux
logtype: linux
This alert indicates that the Adversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems.
Medium
Alert Rule
title: Linux Server Shutdown/Reboot happened
author: Admin
description: Adversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems.
detection:
condition: selection
selection:
event.category|contains:
- SYSTEM_BOOT
- SYSTEM_SHUTDOWN
logsource:
product: linux
service: auditd
logtype: Linux
level: Medium
Provide a Dismiss Comment