DET0062 Detection Strategy for Disable or Modify Linux Audit System
| Item |
Value |
| ID |
DET0062 |
| Version |
1.0 |
| Created |
21 October 2025 |
| Last Modified |
21 October 2025 |
Technique Detected: T1562.012 (Disable or Modify Linux Audit System)
Analytics
Linux
AN0171
Disabling or modifying the Linux Audit system through process termination (auditd killed), service management (systemctl stop auditd), or tampering with rule/configuration files (/etc/audit/audit.rules, audit.conf). Defender view: suspicious execution of auditctl/systemctl commands, file modifications to audit rules, or sudden absence of audit logs correlated with privileged execution.
Log Sources
Mutable Elements
| Field |
Description |
| ServiceWhitelist |
Exclude legitimate administrative service stops during system maintenance. |
| FilePathScope |
Specify monitored paths (/etc/audit/audit.rules, audit.conf) to avoid false positives from unrelated file writes. |
| TimeWindow |
Correlate suspicious commands, file modifications, and audit log gaps in short succession. |