You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/file-integrity-monitoring-enable-ama.md
+20-19Lines changed: 20 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,14 +4,12 @@ description: Learn how to enable File Integrity Monitor when you collect data wi
4
4
author: bmansheim
5
5
ms.author: benmansheim
6
6
ms.topic: how-to
7
-
ms.date: 09/04/2022
7
+
ms.date: 11/14/2022
8
8
---
9
9
# Enable File Integrity Monitoring when using the Azure Monitor Agent
10
10
11
11
To provide [File Integrity Monitoring (FIM)](file-integrity-monitoring-overview.md), the Azure Monitor Agent (AMA) collects data from machines according to [Data Collection Rules](../azure-monitor/essentials/data-collection-rule-overview.md). When the current state of your system files is compared with the state during the previous scan, FIM notifies you about suspicious modifications.
12
12
13
-
FIM uses the Azure Change Tracking solution to track and identify changes in your environment. When File Integrity Monitoring is enabled, you have a **Change Tracking** resource of type **Solution**. Learn about [data collection for Change Tracking](../automation/change-tracking/overview.md#change-tracking-and-inventory-data-collection).
14
-
15
13
File Integrity Monitoring with the Azure Monitor Agent offers:
16
14
17
15
-**Compatibility with the unified monitoring agent** - Compatible with the [Azure Monitor Agent](../azure-monitor/agents/agents-overview.md) that enhances security, reliability, and facilitates multi-homing experience to store data.
@@ -20,8 +18,11 @@ File Integrity Monitoring with the Azure Monitor Agent offers:
20
18
-**Multi-homing experience** – Provides standardization of management from one central workspace. You can [transition from Log Analytics (LA) to AMA](../azure-monitor/agents/azure-monitor-agent-migration.md) so that all VMs point to a single workspace for data collection and maintenance.
21
19
-**Rules management** – Uses [Data Collection Rules](https://azure.microsoft.com/updates/azure-monitor-agent-and-data-collection-rules-public-preview/) to configure or customize various aspects of data collection. For example, you can change the frequency of file collection.
22
20
23
-
> [!NOTE]
24
-
> If you [remove the **Change Tracking** resource](../automation/change-tracking/remove-feature.md#remove-changetracking-solution), you will also disable the File Integrity Monitoring in Defender for Cloud.
21
+
In this article you'll learn how to:
22
+
23
+
-[Enable File Integrity Monitoring with AMA](#enable-file-integrity-monitoring-with-ama)
24
+
-[Edit the list of tracked files and registry keys](#edit-the-list-of-tracked-files-and-registry-keys)
25
+
-[Exclude machines from File Integrity Monitoring](#exclude-machines-from-file-integrity-monitoring)
25
26
26
27
## Availability
27
28
@@ -42,22 +43,21 @@ To track changes to your files on machines with AMA:
42
43
43
44
## Enable File Integrity Monitoring with AMA
44
45
45
-
To enable File Integrity Monitoring (FIM):
46
-
47
-
1. Use the FIM recommendation to select machines for file integrity monitoring:
48
-
1. From Defender for Cloud's sidebar, open the **Recommendations** page.
49
-
1. Select the recommendation [File integrity monitoring should be enabled on machines](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/9b7d740f-c271-4bfd-88fb-515680c33440). Learn more about [Defender for Cloud recommendations](review-security-recommendations.md).
50
-
1. Select the machines that you want to use File Integrity Monitoring on, select **Fix**, and select **Fix X resources**.
51
-
52
-
The recommendation fix:
46
+
To enable File Integrity Monitoring (FIM), use the FIM recommendation to select machines for file integrity monitoring:
53
47
54
-
- Installs the `ChangeTracking-Windows` or `ChangeTracking-Linux` extension on the machines.
55
-
- Generates a data collection rule (DCR) for the subscription, named `Microsoft-ChangeTracking-[subscriptionId]-default-dcr`, that defines what files and registries should be monitored based on default settings. The fix attaches the DCR to all machines in the subscription that have AMA installed and FIM enabled.
56
-
- Creates a new Log Analytics workspace with the naming convention `defaultWorkspace-[subscriptionId]-fim` and with the default workspace settings.
48
+
1. From Defender for Cloud's sidebar, open the **Recommendations** page.
49
+
1. Select the recommendation [File integrity monitoring should be enabled on machines](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/9b7d740f-c271-4bfd-88fb-515680c33440). Learn more about [Defender for Cloud recommendations](review-security-recommendations.md).
50
+
1. Select the machines that you want to use File Integrity Monitoring on, select **Fix**, and select **Fix X resources**.
57
51
58
-
You can update the DCR and Log Analytics workspace settings later.
52
+
The recommendation fix:
59
53
60
-
1. From Defender for Cloud's sidebar, go to **Workload protections** > **File integrity monitoring**, and select the banner to show the results for machines with Azure Monitor Agent.
54
+
- Installs the `ChangeTracking-Windows` or `ChangeTracking-Linux` extension on the machines.
55
+
- Generates a data collection rule (DCR) for the subscription, named `Microsoft-ChangeTracking-[subscriptionId]-default-dcr`, that defines what files and registries should be monitored based on default settings. The fix attaches the DCR to all machines in the subscription that have AMA installed and FIM enabled.
56
+
- Creates a new Log Analytics workspace with the naming convention `defaultWorkspace-[subscriptionId]-fim` and with the default workspace settings.
57
+
58
+
You can update the DCR and Log Analytics workspace settings later.
59
+
60
+
1. From Defender for Cloud's sidebar, go to **Workload protections** > **File integrity monitoring**, and select the banner to show the results for machines with Azure Monitor Agent.
61
61
62
62
:::image type="content" source="media/file-integrity-monitoring-enable-ama/file-integrity-monitoring-azure-monitoring-agent-banner.png" alt-text="Screenshot of banner in File integrity monitoring to show the results for machines with Azure Monitor Agent.":::
63
63
@@ -95,7 +95,8 @@ Every machine in the subscription that is attached to the DCR is monitored. You
95
95
96
96
To exclude a machine from File Integrity Monitoring:
97
97
98
-
- In the list of monitored machines in the FIM results, select the menu (**...**) for the machine and select **Detach data collection rule**.
98
+
1. In the list of monitored machines in the FIM results, select the menu (**...**) for the machine
99
+
1. Select **Detach data collection rule**.
99
100
100
101
:::image type="content" source="media/file-integrity-monitoring-enable-ama/file-integrity-monitoring-azure-monitoring-agent-detach-rule.png" alt-text="Screenshot of the option to detach a machine from a data collection rule and exclude the machines from File Integrity Monitoring." lightbox="media/file-integrity-monitoring-enable-ama/file-integrity-monitoring-azure-monitoring-agent-detach-rule.png":::
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/file-integrity-monitoring-enable-log-analytics.md
+19-20Lines changed: 19 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,16 +4,18 @@ description: Learn how to enable File Integrity Monitoring when you collect data
4
4
author: bmansheim
5
5
ms.author: benmansheim
6
6
ms.topic: how-to
7
-
ms.date: 09/04/2022
7
+
ms.date: 11/14/2022
8
8
---
9
-
# Enable File Integrity Monitoring when using the Log Analytics agent
9
+
# File Integrity Monitoring using the Log Analytics agent
10
10
11
11
To provide [File Integrity Monitoring (FIM)](file-integrity-monitoring-overview.md), the Log Analytics agent uploads data to the Log Analytics workspace. By comparing the current state of these items with the state during the previous scan, FIM notifies you if suspicious modifications have been made.
12
12
13
-
FIM uses the Azure Change Tracking solution to track and identify changes in your environment. When File Integrity Monitoring is enabled, you have a **Change Tracking** resource of type **Solution**. For data collection frequency details, see [Change Tracking data collection details](../automation/change-tracking/overview.md#change-tracking-and-inventory-data-collection).
13
+
In this article, you'll learn how to:
14
14
15
-
> [!NOTE]
16
-
> If you remove the **Change Tracking** resource, you will also disable the File Integrity Monitoring feature in Defender for Cloud.
15
+
-[Enable File Integrity Monitoring with the Log Analytics agent](#enable-file-integrity-monitoring-with-the-log-analytics-agent)
-[Monitor workspaces, entities, and files](#monitor-workspaces-entities-and-files)
18
+
-[Compare baselines using File Integrity Monitoring](#compare-baselines-using-file-integrity-monitoring)
17
19
18
20
## Availability
19
21
@@ -26,15 +28,15 @@ FIM uses the Azure Change Tracking solution to track and identify changes in you
26
28
27
29
## Enable File Integrity Monitoring with the Log Analytics agent
28
30
29
-
FIM is only available from Defender for Cloud's pages in the Azure portal. There is currently no REST API for working with FIM.
31
+
FIM is only available from Defender for Cloud's pages in the Azure portal. There's currently no REST API for working with FIM.
30
32
31
33
1. From the **Workload protections** dashboard's **Advanced protection** area, select **File integrity monitoring**.
32
34
33
35
:::image type="content" source="./media/file-integrity-monitoring-overview/open-file-integrity-monitoring.png" alt-text="Screenshot of screenshot of opening the File Integrity Monitoring dashboard." lightbox="./media/file-integrity-monitoring-overview/open-file-integrity-monitoring.png":::
34
36
35
37
The following information is provided for each workspace:
36
38
37
-
- Total number of changes that occurred in the last week (you may see a dash "-“ if FIM is not enabled on the workspace)
39
+
- Total number of changes that occurred in the last week (you may see a dash "-“ if FIM isn't enabled on the workspace)
38
40
- Total number of computers and VMs reporting to the workspace
39
41
- Geographic location of the workspace
40
42
- Azure subscription that the workspace is under
@@ -45,25 +47,21 @@ FIM is only available from Defender for Cloud's pages in the Azure portal. There
45
47
46
48
-![Upgrade plan icon.][4] Upgrade the workspace to use enhanced security features. This icon indicates that the workspace or subscription isn't protected with Microsoft Defender for Servers. To use the FIM features, your subscription must be protected with this plan. For more information, see [Microsoft Defender for Cloud's enhanced security features](enhanced-security-features-overview.md).
47
49
48
-
-![Enable icon][3] Enable FIM on all machines under the workspace and configure the FIM options. This icon indicates that FIM is not enabled for the workspace.
50
+
-![Enable icon][3] Enable FIM on all machines under the workspace and configure the FIM options. This icon indicates that FIM isn't enabled for the workspace. If there's no enable or upgrade button, and the space is blank, it means that FIM is already enabled on the workspace.
49
51
50
52
:::image type="content" source="./media/file-integrity-monitoring-overview/workspace-list-fim.png" alt-text="Screenshot of enabling FIM for a specific workspace.":::
51
53
52
-
> [!TIP]
53
-
> If there's no enable or upgrade button, and the space is blank, it means that FIM is already enabled on the workspace.
54
-
55
54
1. Select **ENABLE**. The details of the workspace including the number of Windows and Linux machines under the workspace is shown.
56
55
57
56
:::image type="content" source="./media/file-integrity-monitoring-overview/workspace-fim-status.png" alt-text="Screenshot of FIM workspace details page.":::
58
57
59
58
The recommended settings for Windows and Linux are also listed. Expand **Windows files**, **Registry**, and **Linux files** to see the full list of recommended items.
60
59
61
-
1. Clear the checkboxes for any recommended entities you do not want to be monitored by FIM.
60
+
1. Clear the checkboxes for any recommended entities you don't want to be monitored by FIM.
62
61
63
62
1. Select **Apply file integrity monitoring** to enable FIM.
64
63
65
-
> [!NOTE]
66
-
> You can change the settings at any time. Learn more about [editing monitored entities](#edit-monitored-entities).
64
+
You can change the settings at any time. Learn more about [editing monitored entities](#edit-monitored-entities).
67
65
68
66
### Disable File Integrity Monitoring
69
67
@@ -151,7 +149,7 @@ The **Changes** tab (shown below) lists all changes for the workspace during the
151
149
152
150
The **Workspace Configuration** opens.
153
151
154
-
1.One the **Workspace Configuration**:
152
+
1.On the **Workspace Configuration**:
155
153
156
154
1. Select the tab for the type of entity that you want to add: Windows registry, Windows files, Linux Files, file content, or Windows services.
157
155
1. Select **Add**.
@@ -169,7 +167,7 @@ The **Changes** tab (shown below) lists all changes for the workspace during the
169
167
Use wildcards to simplify tracking across directories. The following rules apply when you configure folder monitoring using wildcards:
170
168
- Wildcards are required for tracking multiple files.
171
169
- Wildcards can only be used in the last segment of a path, such as C:\folder\file or /etc/*.conf
172
-
- If an environment variable includes a path that is not valid, validation will succeed but the path will fail when inventory runs.
170
+
- If an environment variable includes a path that isn't valid, validation will succeed but the path will fail when inventory runs.
173
171
- When setting the path, avoid general paths such as c:\*.* which will result in too many folders being traversed.
174
172
175
173
## Compare baselines using File Integrity Monitoring
@@ -187,7 +185,7 @@ The FIM registry hive defaults provide a convenient way to monitor recursive cha
187
185
188
186
### Add a custom registry check
189
187
190
-
FIM baselines start by identifying characteristics of a known-good state for the operating system and supporting application. For this example, we will focus on the password policy configurations for Windows Server 2008 and higher.
188
+
FIM baselines start by identifying characteristics of a known-good state for the operating system and supporting application. For this example, we'll focus on the password policy configurations for Windows Server 2008 and higher.
191
189
192
190
|Policy Name | Registry Setting|
193
191
|----------------------------|-----------------|
@@ -207,7 +205,8 @@ FIM baselines start by identifying characteristics of a known-good state for the
207
205
208
206
To configure FIM to monitor registry baselines:
209
207
210
-
- In the **Add Windows Registry for Change Tracking** window, in the **Windows Registry Key** text box, enter the following registry key:
208
+
1. In the **Add Windows Registry for Change Tracking** window, select the **Windows Registry Key** text box.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/file-integrity-monitoring-overview.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,11 +4,13 @@ description: Learn about tracking changes to system files and registry keys with
4
4
author: bmansheim
5
5
ms.author: benmansheim
6
6
ms.topic: how-to
7
-
ms.date: 09/04/2022
7
+
ms.date: 11/14/2022
8
8
---
9
9
# File Integrity Monitoring in Microsoft Defender for Cloud
10
10
11
-
File Integrity Monitoring (FIM) examines operating system files, Windows registries, application software, and Linux system files for changes that might indicate an attack. FIM lets you take advantage of [Change Tracking](../automation/change-tracking/overview.md) directly in Defender for Cloud.
11
+
File Integrity Monitoring (FIM) examines operating system files, Windows registries, application software, and Linux system files for changes that might indicate an attack.
12
+
13
+
FIM (file integrity monitoring) uses the Azure Change Tracking solution to track and identify changes in your environment. When FIM is enabled, you have a **Change Tracking** resource of type **Solution**. If you remove the **Change Tracking** resource, you'll also disable the File Integrity Monitoring feature in Defender for Cloud. FIM lets you take advantage of [Change Tracking](../automation/change-tracking/overview.md) directly in Defender for Cloud. For data collection frequency details, see [Change Tracking data collection details](../automation/change-tracking/overview.md#change-tracking-and-inventory-data-collection).
12
14
13
15
Defender for Cloud recommends entities to monitor with FIM, and you can also define your own FIM policies or entities to monitor. FIM informs you about suspicious activity such as:
0 commit comments