Skip to content

Hide Navigation Hide TOC

Syslog Clearing or Removal Via System Utilities (3fcc9b35-39e4-44c0-a2ad-9e82b6902b31)

Detects specific commands commonly used to remove or empty the syslog. Which is a technique often used by attacker as a method to hide their tracks

Cluster A Galaxy A Cluster B Galaxy B Level
Syslog Clearing or Removal Via System Utilities (3fcc9b35-39e4-44c0-a2ad-9e82b6902b31) Sigma-Rules Clear Linux or Mac System Logs - T1685.006 (5e29d64d-2b14-4f92-875e-4c9c498e213c) Attack Pattern 1
Disable or Modify Tools - T1685 (bbde9781-60aa-4b8a-a911-895b0c1b3872) Attack Pattern Clear Linux or Mac System Logs - T1685.006 (5e29d64d-2b14-4f92-875e-4c9c498e213c) Attack Pattern 2