Muokkaa

Jaa


File integrity monitoring

The file integrity monitoring feature in Defender for Servers Plan 2 in Microsoft Defender for Cloud helps to keep enterprise assets and resources secure by scanning and analyzing operating system files, Windows registries, application software, and Linux system files for changes that might indicate an attack. File integrity monitoring helps you to:

  • Meet compliance requirements. File integrity monitoring is often required by regulatory compliance standards such as PCI-DSS and ISO 17799.
  • Improve posture and identify potential security issues by detecting suspicious changes to files.

Monitor suspicious activity

File integrity monitoring examines operating system files, Windows registries, application software, and Linux system files to detect suspicious activity such as:

  • File and registry key creation or deletion.
  • File modifications, such as changes in file size, access control lists, and hash of the content.
  • Registry modifications such as changes in size, access control lists, type, and content.

Data collection

File integrity monitoring uses the Microsoft Defender for Endpoint agent to collect data from machines.

  • The Defender for Endpoint agent collects data from machines in accordance with the files and resources defined for file integrity monitoring.
  • Data collected by the Defender for Endpoint agent is stored for access and analysis in a Log Analytics workspace.
  • Collected file integrity monitoring data is part of the 500 MB benefit included in Defender for Servers Plan 2.
  • File integrity monitoring provides information about file and resource changes, including the source of the change, account details, indication of who made the changes, and information about the initiating process.

Migrate to the new version

File integrity monitoring previously used the Log Analytics agent (also known as the Microsoft Monitoring agent (MMA)) or the Azure Monitor agent (AMA) to collect data. If you're using file integrity monitoring with one of these legacy methods, you can migrate file integrity monitoring to use Defender for Endpoint.

Configure file integrity monitoring

After enabling Defender for Servers Plan 2, you enable and configure file integrity monitoring. It isn't enabled by default.

  • You select a Log Analytics workspace in which to store change events for monitored files/resources. You can use an existing workspace, or define a new one.
  • Defender for Cloud recommends resources to monitor with file integrity monitoring.

Choose what to monitor

Defender for Cloud recommends entities to monitor with file integrity monitoring. You can choose items from the recommendations. When choosing which files to monitor:

  • Consider the files that are critical for your system and applications.
  • Monitor files that you don’t expect to change without planning.
  • If you choose files that are frequently changed by applications or operating system (such as log files and text files) it will create noise, making it difficult to identify an attack.

When using file integrity monitoring with the Defender for Endpoint agent, we recommend monitoring these items with based on known attack patterns.

Linux file Windows files Windows registry keys (HKEY_LOCAL_MACHINE)
/bin C:\config.sys HKLM\SOFTWARE\Microsoft\Cryptography\OID*
/bin/passwd C:\Windows\regedit.exe HKLM\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID*
/boot C:\Windows\System32\userinit.exe Key: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
Values: loadappinit_dlls, appinit_dlls, iconservicelib
/etc/*.conf C:\Windows\explorer.exe Key: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
Values: common startup, startup
/etc/cron.daily C:\autoexec.bat Key: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Values: common startup, startup
/etc/cron.hourly C:\boot.ini HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
/etc/cron.monthly C:\Windows\system.ini HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
/etc/cron.weekly C:\Windows\win.ini HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServicesOnce
/etc/crontab Key: HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\NT\CurrentVersion\Windows
Values: appinit_dlls, loadappinit_dlls
/etc/init.d Key: HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
Values: common startup, startup
/opt/sbin Key: HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Values: common startup, startup
/sbin HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
/usr/bin HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
/usr/local/bin HKLM\SECURITY\POLICY\SECRETS
/usr/local/sbin
/usr/sbin
/opt/bin

Next steps

Enable file integrity monitoring with Defender for Endpoint