Skip to content

A repository for tools and resources for detecting and managing RMM in enterprise environments.

License

Notifications You must be signed in to change notification settings

Arizona-Cyber-Threat-Response-Alliance/rmm-detection

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

LOLRMM Detection Resources

LOLRMM Dashboard

Overview

This repository serves as a comprehensive collection of resources for monitoring, detecting, and analyzing Remote Monitoring and Management (RMM) tools across enterprise environments. While RMM tools are essential for legitimate IT administration, they are increasingly being leveraged by threat actors as part of "Living Off the Land" (LOL) techniques, making their detection and monitoring crucial for security teams.

Currently, the repository focuses on Splunk-based detection and monitoring capabilities, but it is actively expanding to include:

  • Multi-SIEM detection rules and dashboards
  • API integration scripts for RMM platforms
  • Detection engineering guidance
  • Threat hunting playbooks
  • Incident response procedures

Note

All data is compiled and curated from: https://lolrmm.io

Important

This project aims to become a central hub for security practitioners dealing with RMM tool detection and analysis across different platforms and tools.

Components

  • Dashboard: Interactive visualization of RMM tool usage across your network
  • Scheduled Search: Creates and maintains a lookup table of RMM detections
  • Multiple Data Source Options: Flexibility to use Splunk Enterprise Security, PaloAlto firewalls, or custom data sources

Files

├── splunk/
│ ├── dashboards/
│ │ └── lolrmm_network_dashoard.xml # Main Splunk RMM monitoring dashboard
│ ├── searches/
│ │ ├── es-lolrmm_dns_cim_search.spl # Splunk ES-compatible DNS monitoring
│ │ ├── es-lolrmm_network_report.spl # Splunk ES network traffic analysis (powers KV Store)
│ │ ├── es-lolrrm_dns_search.spl # Splunk ES DNS detection search
│ │ └── non-es-lolrrm_dns_search.spl # Standard Splunk DNS detection
│ └── demo.csv # Sample Splunk data for testing
├── crowdstrike/
│ ├── RMM-Artifacts.csv # CrowdStrike Lookup: RMM process/file artifacts
│ ├── RMM_Domain_Artifacts.csv # CrowdStrike Lookup: RMM domain/network artifacts
│ └── RemoteManagementActivity.yaml # CrowdStrike Dashboard template

Instructions

This repository provides search and dashboard options for both Splunk Enterprise Security (ES) customers and non-ES Splunk customers.

Important

Search files are prefixed with either es- or non-es- to clearly indicate which environment they are designed for.

Splunk

This section details instructions for Splunk Enterprise or Splunk Cloud, with options for both Enterprise Security (ES) customers and non-ES customers.

Important

Splunk search files are prefixed with either es- or non-es- to clearly indicate which environment they are designed for.

For Splunk Enterprise Security (ES) Customers

ES customers can leverage the data model accelerations and additional context provided by Splunk Enterprise Security:

  1. Use the searches prefixed with es- which utilize the Network_Traffic data model
  2. The dashboard automatically detects if you're using ES and enables appropriate features
  3. ES-specific correlation searches can be scheduled to trigger notable events

For Non-ES Splunk Customers

If you don't have Splunk Enterprise Security, you can still use these resources:

  1. Use the searches prefixed with non-es- which are designed to work with standard Splunk indexes
  2. Configure the dashboard to use PaloAlto or raw network data sources
  3. Create scheduled searches to populate the lookup tables needed by the dashboard

Splunk Setup Instructions

Choose one of the following setup options for the Splunk dashboard:

Option 1: Scheduled Search with KV Store (Recommended for Large Enterprises)

Tip

This approach is ideal for large enterprises as it reduces query load during dashboard viewing, provides consistent historical data, and enables faster dashboard loading times.

  1. Install the search lolrm_network_report.spl as a scheduled search
  2. Configure the search to run at your preferred interval (e.g., daily)
  3. The search will output results to a KV store lookup table named lolrmm.csv
  4. Import the dashboard XML and select "LOLRMM Network Report" as the data source

Option 2: Direct PaloAlto Firewall Data

  1. Import the dashboard XML
  2. Select "PaloAlto Index" as the data source
  3. Ensure your PaloAlto logs are being ingested with the sourcetype pan:traffic

Option 3: Splunk Enterprise Security Data Model

  1. Import the dashboard XML
  2. Select "Splunk ES" as the data source
  3. Ensure your Network_Traffic data model is properly populated

Important

Custom macros detect_remote_access_software_usage_traffic_filter and remote_access_software_usage_exceptions must be configured for proper dashboard functionality.

Important

For the Splunk dashboard, custom macros detect_remote_access_software_usage_traffic_filter and remote_access_software_usage_exceptions must be configured for proper functionality, especially for filtering legitimate RMM tools specific to your environment.

Dashboard Features

  • Timeline View: Visualize RMM tool usage over time
  • Application Distribution: See which RMM tools are most prevalent
  • Geographic Map: View global distribution of RMM connections
  • Source Analysis: Identify hosts using RMM tools
  • Filtering Options: Drill down by tool type, category, time range, and more

Use Cases

  • Identify unauthorized RMM tool usage
  • Monitor legitimate RMM tool activity
  • Detect potential lateral movement or command and control activity
  • Validate security policies around remote access tools

Splunk Requirements

  • Splunk Enterprise or Splunk Cloud
  • For ES option: Network_Traffic data model
  • For PaloAlto option: PaloAlto firewall logs with sourcetype pan:traffic

CrowdStrike

This section details instructions for utilizing the CrowdStrike Falcon platform resources.

CrowdStrike Setup Instructions

  1. Upload Lookup Files:

    • Navigate to Next-Gen SIEM -> Log management -> Lookup files in your Falcon console.
    • Upload crowdstrike/RMM-Artifacts.csv.
    • Upload crowdstrike/RMM_Domain_Artifacts.csv.
  2. Import Dashboard:

    • Navigate to Next-Gen SIEM -> Log management -> Dashboards.
    • Click Create dashboard and select Import.
    • Upload the dashboard template file crowdstrike/RemoteManagementActivity.yaml
  3. Configure Dashboard Application Filter:

    • Once imported, open the newly created dashboard.
    • Click Edit (usually in the top right).
    • Locate the "Application Filter" parameter/input (top left).
    • Replace the default value with a pipe-separated (|) list of your approved RMM tools (e.g., ApprovedTool1|ApprovedTool2|ApprovedTool3). This helps filter out known legitimate activity from the main views. Note: Remote Desktop related terms will be filtered by default, review the dashboard query if needed.
    • Save the dashboard changes.

CrowdStrike Requirements

  • CrowdStrike Falcon Platform.
  • Access to Next-Gen SIEM / LogScale module.
  • Permissions to upload Lookup files and create/edit Dashboards.

General Considerations

Warning

RMM tools are frequently used in legitimate IT operations. Always investigate and verify findings before taking blocking or remediation actions to avoid disrupting critical business operations. Context is key.

Caution

These dashboards and searches identify network traffic, process executions, or other artifacts associated with RMM tools based on known indicators. They do not automatically distinguish between legitimate and malicious usage without proper tuning (like filtering approved tools) and investigation.

About

A repository for tools and resources for detecting and managing RMM in enterprise environments.

Topics

Resources

License

Stars

Watchers

Forks

Contributors 2

  •  
  •