host.os.type:linux and event.type:start and event.action:exec and process.parent.name:exim4 and
not process.name:(
exim4 or start-stop-daemon or run-parts or systemctl or update-exim4.conf or install or plymouth or
readlink or grep or stat or cmake or gcc or cppcheck or sort or sshd
)
Install detection rules in Elastic Security
Detect Unusual Exim4 Child Process in the Elastic Security detection engine by installing this rule into your Elastic Stack.
To setup this rule, check out the installation guide for Prebuilt Security Detection Rules(opens in a new tab or window).