@@ -17,7 +17,7 @@ search: '`linux_auditd` type=Path name="/proc/sysrq-trigger" OR name="/proc/sys/
17
17
| stats count min(_time) as firstTime max(_time) as lastTime by dest name
18
18
| `security_content_ctime(firstTime)`
19
19
| `security_content_ctime(lastTime)`
20
- | `linux_auditd_sysrq_abuse_filter `'
20
+ | `linux_macro_sysrq_abuse_filter `'
21
21
how_to_implement : |
22
22
To implement this detection, ensure auditd is configured to watch:
23
23
- /proc/sysrq-trigger
@@ -26,9 +26,8 @@ how_to_implement: |
26
26
with write and attribute changes (`-p wa`) and key `sysrq`.
27
27
Use the Splunk Add-on for Unix and Linux for proper ingestion and CIM normalization.
28
28
This enables effective monitoring of Linux endpoints for SysRq abuse.
29
- known_false_positives :
30
- - Legitimate administrative activity modifying SysRq for debugging or recovery.
31
- - Please update the filter macros to remove false positives.
29
+ known_false_positives : Legitimate administrative activity modifying SysRq for debugging or recovery.
30
+ Please update the filter macros to remove false positives.
32
31
references :
33
32
- https://www.kernel.org/doc/html/v4.10/_sources/admin-guide/sysrq.txt
34
33
- https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/4/html/reference_guide/s3-proc-sys-kernel
@@ -50,7 +49,7 @@ drilldown_searches:
50
49
earliest_offset : $info_min_time$
51
50
latest_offset : $info_max_time$
52
51
rba :
53
- message : A [$comm$] event was occurred on host - [$dest$] Used the Linux Magic SysRq mechanism.
52
+ message : Abuse of the Linux Magic System Request key detected on host - [$dest$]
54
53
risk_objects :
55
54
- field : dest
56
55
type : system
0 commit comments