Query Details
# Rule Documentation: Detection of rclone or Rsync Process Activity ## Description This detection rule identifies activity related to the execution of the rclone tool or processes associated with Rsync. Both rclone and Rsync are legitimate tools commonly used for file synchronization and transfer. However, their presence or activity may also indicate potential data exfiltration or unauthorized file transfers if used maliciously. ## Detection Logic - Monitors `DeviceProcessEvents` for processes where: - The `ProcessVersionInfoOriginalFileName` contains "rclone", or - The `FileName` contains "rclone", or - The `ProcessVersionInfoFileDescription` contains "Rsync". ## Tags - Execution - File Transfer - Data Exfiltration - Rsync - rclone - Suspicious Activity ## Search Query ```kql DeviceProcessEvents | where ProcessVersionInfoOriginalFileName contains "rclone" or FileName contains "rclone" or ProcessVersionInfoFileDescription contains "Rsync"
This query looks for activity related to the rclone tool or Rsync processes, which are commonly used for file synchronization. It monitors process events to detect any potential data exfiltration or unauthorized file transfers.

Ali Hussein
Released: May 23, 2024
Tables
Keywords
Operators