Description
File Integrity Monitoring (FIM) is a feature that monitors critical system files in Windows or Linux for potential signs of attack or compromise.
Rationaleβ
FIM provides a detection mechanism for compromised files. When FIM is enabled, critical system files are monitored for changes that might indicate a threat actor is attempting to modify system files for lateral compromise within a host operating system.
Impactβ
File Integrity Monitoring requires licensing and is included in these plans:
- Defender for Servers plan 2
Auditβ
From Azure Portalβ
- From the Azure Portal
Homepage, selectMicrosoft Defender for Cloud. - Under
ManagementselectEnvironment Settings. - Select a subscription.
- Under
Settings>Defender Plans, clickSettings & monitoring. - Under the Component column, locate the row for
File Integrity Monitoring. - Ensure that
Onis selected.
Repeat the above for any additional subscriptions.
Default Valueβ
By default, Agentless scanning for machines is off.
Referencesβ
- https://learn.microsoft.com/en-us/azure/defender-for-cloud/file-integrity-monitoring-overview
- https://learn.microsoft.com/en-us/security/benchmark/azure/mcsb-incident-response#ir-2-preparation---setup-incident-notification
- https://learn.microsoft.com/en-us/azure/defender-for-cloud/file-integrity-monitoring-enable-defender-endpoint