Configure FIM connectors to monitor files, directories, and registry settings

File integrity monitoring (FIM) monitors all file types for unauthorized changes. Using FIM, you can detect changes to critical files to ensure systems have not been compromised.

Please note that FIM does not support the monitoring of network shares. Only local drives are supported.

FIM can detect unauthorized modifications to configuration files, executables, log and audit files, content files, database files, web files, and so on. When FIM detects that a monitored file has changed, it logs an event. The event then prompts SEM to execute the configured action. You can build correlation rules to act as a second-level filter to send an alert if certain patterns of activity occur (not just single instances). When an alert is triggered, the data is in context with your network and other system log data.

Features of FIM

  • Monitor real-time access and identify users who change file and registry keys.
  • Configure file and directory logic and registry keys and values to monitor different types of access (create, write, delete, change permissions/metadata).
  • Standardize configurations across many systems.
  • Configure monitoring templates to monitor the basics and create and customize your own monitors.
  • Configure templates for rules, filters, and reports to assist in including FIM events.