Description
File Integrity Monitoring (FIM) is a feature that monitors critical system files in Windows or Linux for potential signs of attack or compromise.
Rationaleβ
FIM provides a detection mechanism for compromised files. When FIM is enabled, critical system files are monitored for changes that might indicate a threat actor is attempting to modify system files for lateral compromise within a host operating system.
Impactβ
File Integrity Monitoring requires licensing and is included in these plans:
- Defender for Servers plan 2
Auditβ
From Azure Portalβ
- From the Azure Portal
Home
page, selectMicrosoft Defender for Cloud
. - Under
Management
selectEnvironment Settings
. - Select a subscription.
- Under
Settings
>Defender Plans
, clickSettings & monitoring
. - Under the Component column, locate the row for
File Integrity Monitoring
. - Ensure that
On
is selected.
Repeat the above for any additional subscriptions.
Default Valueβ
By default, Agentless scanning for machines is off
.
Referencesβ
- https://learn.microsoft.com/en-us/azure/defender-for-cloud/file-integrity-monitoring-overview
- https://learn.microsoft.com/en-us/security/benchmark/azure/mcsb-incident-response#ir-2-preparation---setup-incident-notification
- https://learn.microsoft.com/en-us/azure/defender-for-cloud/file-integrity-monitoring-enable-defender-endpoint