My team and me are working in a use case to detect the modification of the hosts file.
We have done a custom rule to detect this from the process event creation log. But when the user has a text editor previously open and decides to open the hosts file the alert doesnt trigger because there is no log of proccess start.
We thought about using Sysmon event 11 that logs the modification of files. But sadly the Agent doesnt work with events 11.
Anyone has thought about monitoring the modification of the hosts file?
This is currently a request for enhancement to our FIM functionality since our FIM for Windows only monitors files from a set list of extensions, and the hosts file has not extension so it is excluded.
As far as workarounds I’m not aware of anything outside of using some other tool to pull in the relevant event logs such as Nxlog
We are having the same issue. However a bit more detail here, what we can perfectly do is use a GPO and enable auditing on specific files (in this case host file). This is even written to the event viewer in the security log. So the agent would be able to pick this up. However the agent is simply ignoring this and there is no way to include this eventiID in the agent (very frustrating!).
We are now using auditing on shares and have created a query to monitor the host file through there. It’s not perfect and will only show up if an attacker edits the host file remotely. Disadvantage of this solution is a large intake of logs which are totally unnecessary if we could add the eventID as mentioned above.