Root CA certificate monitoring
The ESA Threat Detection rules for monitoring changes to root CA certificates are vast limits vendor rules.
The rules detect certificate chain cloning and cloned root trust attacks by monitoring writes to user and machine registry keys. For details, check the following rules:
Detect AuthRoot, CA and Root certificate changes per machine
Detect AuthRoot, CA and Root certificate changes per user