Skip to main content

vast limits GmbH and uberAgent are now part of Citrix, a business unit of Cloud Software Group. Learn more at Citrix.com.


Root CA certificate monitoring

The ESA Threat Detection rules for monitoring changes to root CA certificates are vast limits vendor rules.

The rules detect certificate chain cloning and cloned root trust attacks by monitoring writes to user and machine registry keys. For details, check the following rules:

  • Detect AuthRoot, CA and Root certificate changes per machine
  • Detect AuthRoot, CA and Root certificate changes per user

Comments

Your email address will not be published. Required fields are marked *