Skip to content

Commit 29dfffb

Browse files
authored
Merge pull request #218206 from AlizaBernstein/WI-2004383-enable-FIM
Wi 2004383 enable fim
2 parents 808ee8f + bd345f9 commit 29dfffb

File tree

3 files changed

+43
-41
lines changed

3 files changed

+43
-41
lines changed

articles/defender-for-cloud/file-integrity-monitoring-enable-ama.md

Lines changed: 20 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,12 @@ description: Learn how to enable File Integrity Monitor when you collect data wi
44
author: bmansheim
55
ms.author: benmansheim
66
ms.topic: how-to
7-
ms.date: 09/04/2022
7+
ms.date: 11/14/2022
88
---
99
# Enable File Integrity Monitoring when using the Azure Monitor Agent
1010

1111
To provide [File Integrity Monitoring (FIM)](file-integrity-monitoring-overview.md), the Azure Monitor Agent (AMA) collects data from machines according to [Data Collection Rules](../azure-monitor/essentials/data-collection-rule-overview.md). When the current state of your system files is compared with the state during the previous scan, FIM notifies you about suspicious modifications.
1212

13-
FIM uses the Azure Change Tracking solution to track and identify changes in your environment. When File Integrity Monitoring is enabled, you have a **Change Tracking** resource of type **Solution**. Learn about [data collection for Change Tracking](../automation/change-tracking/overview.md#change-tracking-and-inventory-data-collection).
14-
1513
File Integrity Monitoring with the Azure Monitor Agent offers:
1614

1715
- **Compatibility with the unified monitoring agent** - Compatible with the [Azure Monitor Agent](../azure-monitor/agents/agents-overview.md) that enhances security, reliability, and facilitates multi-homing experience to store data.
@@ -20,8 +18,11 @@ File Integrity Monitoring with the Azure Monitor Agent offers:
2018
- **Multi-homing experience** – Provides standardization of management from one central workspace. You can [transition from Log Analytics (LA) to AMA](../azure-monitor/agents/azure-monitor-agent-migration.md) so that all VMs point to a single workspace for data collection and maintenance.
2119
- **Rules management** – Uses [Data Collection Rules](https://azure.microsoft.com/updates/azure-monitor-agent-and-data-collection-rules-public-preview/) to configure or customize various aspects of data collection. For example, you can change the frequency of file collection.
2220

23-
> [!NOTE]
24-
> If you [remove the **Change Tracking** resource](../automation/change-tracking/remove-feature.md#remove-changetracking-solution), you will also disable the File Integrity Monitoring in Defender for Cloud.
21+
In this article you'll learn how to:
22+
23+
- [Enable File Integrity Monitoring with AMA](#enable-file-integrity-monitoring-with-ama)
24+
- [Edit the list of tracked files and registry keys](#edit-the-list-of-tracked-files-and-registry-keys)
25+
- [Exclude machines from File Integrity Monitoring](#exclude-machines-from-file-integrity-monitoring)
2526

2627
## Availability
2728

@@ -42,22 +43,21 @@ To track changes to your files on machines with AMA:
4243

4344
## Enable File Integrity Monitoring with AMA
4445

45-
To enable File Integrity Monitoring (FIM):
46-
47-
1. Use the FIM recommendation to select machines for file integrity monitoring:
48-
1. From Defender for Cloud's sidebar, open the **Recommendations** page.
49-
1. Select the recommendation [File integrity monitoring should be enabled on machines](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/9b7d740f-c271-4bfd-88fb-515680c33440). Learn more about [Defender for Cloud recommendations](review-security-recommendations.md).
50-
1. Select the machines that you want to use File Integrity Monitoring on, select **Fix**, and select **Fix X resources**.
51-
52-
The recommendation fix:
46+
To enable File Integrity Monitoring (FIM), use the FIM recommendation to select machines for file integrity monitoring:
5347

54-
- Installs the `ChangeTracking-Windows` or `ChangeTracking-Linux` extension on the machines.
55-
- Generates a data collection rule (DCR) for the subscription, named `Microsoft-ChangeTracking-[subscriptionId]-default-dcr`, that defines what files and registries should be monitored based on default settings. The fix attaches the DCR to all machines in the subscription that have AMA installed and FIM enabled.
56-
- Creates a new Log Analytics workspace with the naming convention `defaultWorkspace-[subscriptionId]-fim` and with the default workspace settings.
48+
1. From Defender for Cloud's sidebar, open the **Recommendations** page.
49+
1. Select the recommendation [File integrity monitoring should be enabled on machines](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/9b7d740f-c271-4bfd-88fb-515680c33440). Learn more about [Defender for Cloud recommendations](review-security-recommendations.md).
50+
1. Select the machines that you want to use File Integrity Monitoring on, select **Fix**, and select **Fix X resources**.
5751

58-
You can update the DCR and Log Analytics workspace settings later.
52+
The recommendation fix:
5953

60-
1. From Defender for Cloud's sidebar, go to **Workload protections** > **File integrity monitoring**, and select the banner to show the results for machines with Azure Monitor Agent.
54+
- Installs the `ChangeTracking-Windows` or `ChangeTracking-Linux` extension on the machines.
55+
- Generates a data collection rule (DCR) for the subscription, named `Microsoft-ChangeTracking-[subscriptionId]-default-dcr`, that defines what files and registries should be monitored based on default settings. The fix attaches the DCR to all machines in the subscription that have AMA installed and FIM enabled.
56+
- Creates a new Log Analytics workspace with the naming convention `defaultWorkspace-[subscriptionId]-fim` and with the default workspace settings.
57+
58+
You can update the DCR and Log Analytics workspace settings later.
59+
60+
1. From Defender for Cloud's sidebar, go to **Workload protections** > **File integrity monitoring**, and select the banner to show the results for machines with Azure Monitor Agent.
6161

6262
:::image type="content" source="media/file-integrity-monitoring-enable-ama/file-integrity-monitoring-azure-monitoring-agent-banner.png" alt-text="Screenshot of banner in File integrity monitoring to show the results for machines with Azure Monitor Agent.":::
6363

@@ -95,7 +95,8 @@ Every machine in the subscription that is attached to the DCR is monitored. You
9595

9696
To exclude a machine from File Integrity Monitoring:
9797

98-
- In the list of monitored machines in the FIM results, select the menu (**...**) for the machine and select **Detach data collection rule**.
98+
1. In the list of monitored machines in the FIM results, select the menu (**...**) for the machine
99+
1. Select **Detach data collection rule**.
99100

100101
:::image type="content" source="media/file-integrity-monitoring-enable-ama/file-integrity-monitoring-azure-monitoring-agent-detach-rule.png" alt-text="Screenshot of the option to detach a machine from a data collection rule and exclude the machines from File Integrity Monitoring." lightbox="media/file-integrity-monitoring-enable-ama/file-integrity-monitoring-azure-monitoring-agent-detach-rule.png":::
101102

articles/defender-for-cloud/file-integrity-monitoring-enable-log-analytics.md

Lines changed: 19 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -4,16 +4,18 @@ description: Learn how to enable File Integrity Monitoring when you collect data
44
author: bmansheim
55
ms.author: benmansheim
66
ms.topic: how-to
7-
ms.date: 09/04/2022
7+
ms.date: 11/14/2022
88
---
9-
# Enable File Integrity Monitoring when using the Log Analytics agent
9+
# File Integrity Monitoring using the Log Analytics agent
1010

1111
To provide [File Integrity Monitoring (FIM)](file-integrity-monitoring-overview.md), the Log Analytics agent uploads data to the Log Analytics workspace. By comparing the current state of these items with the state during the previous scan, FIM notifies you if suspicious modifications have been made.
1212

13-
FIM uses the Azure Change Tracking solution to track and identify changes in your environment. When File Integrity Monitoring is enabled, you have a **Change Tracking** resource of type **Solution**. For data collection frequency details, see [Change Tracking data collection details](../automation/change-tracking/overview.md#change-tracking-and-inventory-data-collection).
13+
In this article, you'll learn how to:
1414

15-
> [!NOTE]
16-
> If you remove the **Change Tracking** resource, you will also disable the File Integrity Monitoring feature in Defender for Cloud.
15+
- [Enable File Integrity Monitoring with the Log Analytics agent](#enable-file-integrity-monitoring-with-the-log-analytics-agent)
16+
- [Disable File Integrity Monitoring](#disable-file-integrity-monitoring)
17+
- [Monitor workspaces, entities, and files](#monitor-workspaces-entities-and-files)
18+
- [Compare baselines using File Integrity Monitoring](#compare-baselines-using-file-integrity-monitoring)
1719

1820
## Availability
1921

@@ -26,15 +28,15 @@ FIM uses the Azure Change Tracking solution to track and identify changes in you
2628

2729
## Enable File Integrity Monitoring with the Log Analytics agent
2830

29-
FIM is only available from Defender for Cloud's pages in the Azure portal. There is currently no REST API for working with FIM.
31+
FIM is only available from Defender for Cloud's pages in the Azure portal. There's currently no REST API for working with FIM.
3032

3133
1. From the **Workload protections** dashboard's **Advanced protection** area, select **File integrity monitoring**.
3234

3335
:::image type="content" source="./media/file-integrity-monitoring-overview/open-file-integrity-monitoring.png" alt-text="Screenshot of screenshot of opening the File Integrity Monitoring dashboard." lightbox="./media/file-integrity-monitoring-overview/open-file-integrity-monitoring.png":::
3436

3537
The following information is provided for each workspace:
3638

37-
- Total number of changes that occurred in the last week (you may see a dash "-“ if FIM is not enabled on the workspace)
39+
- Total number of changes that occurred in the last week (you may see a dash "-“ if FIM isn't enabled on the workspace)
3840
- Total number of computers and VMs reporting to the workspace
3941
- Geographic location of the workspace
4042
- Azure subscription that the workspace is under
@@ -45,25 +47,21 @@ FIM is only available from Defender for Cloud's pages in the Azure portal. There
4547

4648
- ![Upgrade plan icon.][4] Upgrade the workspace to use enhanced security features. This icon indicates that the workspace or subscription isn't protected with Microsoft Defender for Servers. To use the FIM features, your subscription must be protected with this plan. For more information, see [Microsoft Defender for Cloud's enhanced security features](enhanced-security-features-overview.md).
4749

48-
- ![Enable icon][3] Enable FIM on all machines under the workspace and configure the FIM options. This icon indicates that FIM is not enabled for the workspace.
50+
- ![Enable icon][3] Enable FIM on all machines under the workspace and configure the FIM options. This icon indicates that FIM isn't enabled for the workspace. If there's no enable or upgrade button, and the space is blank, it means that FIM is already enabled on the workspace.
4951

5052
:::image type="content" source="./media/file-integrity-monitoring-overview/workspace-list-fim.png" alt-text="Screenshot of enabling FIM for a specific workspace.":::
5153

52-
> [!TIP]
53-
> If there's no enable or upgrade button, and the space is blank, it means that FIM is already enabled on the workspace.
54-
5554
1. Select **ENABLE**. The details of the workspace including the number of Windows and Linux machines under the workspace is shown.
5655

5756
:::image type="content" source="./media/file-integrity-monitoring-overview/workspace-fim-status.png" alt-text="Screenshot of FIM workspace details page.":::
5857

5958
The recommended settings for Windows and Linux are also listed. Expand **Windows files**, **Registry**, and **Linux files** to see the full list of recommended items.
6059

61-
1. Clear the checkboxes for any recommended entities you do not want to be monitored by FIM.
60+
1. Clear the checkboxes for any recommended entities you don't want to be monitored by FIM.
6261

6362
1. Select **Apply file integrity monitoring** to enable FIM.
6463

65-
> [!NOTE]
66-
> You can change the settings at any time. Learn more about [editing monitored entities](#edit-monitored-entities).
64+
You can change the settings at any time. Learn more about [editing monitored entities](#edit-monitored-entities).
6765

6866
### Disable File Integrity Monitoring
6967

@@ -151,7 +149,7 @@ The **Changes** tab (shown below) lists all changes for the workspace during the
151149

152150
The **Workspace Configuration** opens.
153151

154-
1. One the **Workspace Configuration**:
152+
1. On the **Workspace Configuration**:
155153

156154
1. Select the tab for the type of entity that you want to add: Windows registry, Windows files, Linux Files, file content, or Windows services.
157155
1. Select **Add**.
@@ -169,7 +167,7 @@ The **Changes** tab (shown below) lists all changes for the workspace during the
169167
Use wildcards to simplify tracking across directories. The following rules apply when you configure folder monitoring using wildcards:
170168
- Wildcards are required for tracking multiple files.
171169
- Wildcards can only be used in the last segment of a path, such as C:\folder\file or /etc/*.conf
172-
- If an environment variable includes a path that is not valid, validation will succeed but the path will fail when inventory runs.
170+
- If an environment variable includes a path that isn't valid, validation will succeed but the path will fail when inventory runs.
173171
- When setting the path, avoid general paths such as c:\*.* which will result in too many folders being traversed.
174172

175173
## Compare baselines using File Integrity Monitoring
@@ -187,7 +185,7 @@ The FIM registry hive defaults provide a convenient way to monitor recursive cha
187185
188186
### Add a custom registry check
189187

190-
FIM baselines start by identifying characteristics of a known-good state for the operating system and supporting application. For this example, we will focus on the password policy configurations for Windows Server 2008 and higher.
188+
FIM baselines start by identifying characteristics of a known-good state for the operating system and supporting application. For this example, we'll focus on the password policy configurations for Windows Server 2008 and higher.
191189

192190
|Policy Name | Registry Setting|
193191
|----------------------------|-----------------|
@@ -207,7 +205,8 @@ FIM baselines start by identifying characteristics of a known-good state for the
207205
208206
To configure FIM to monitor registry baselines:
209207

210-
- In the **Add Windows Registry for Change Tracking** window, in the **Windows Registry Key** text box, enter the following registry key:
208+
1. In the **Add Windows Registry for Change Tracking** window, select the **Windows Registry Key** text box.
209+
1. Enter the following registry key:
211210

212211
```
213212
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters
@@ -230,7 +229,7 @@ File Integrity Monitoring data resides within the Azure Log Analytics/Configurat
230229
231230
1. Set a time range to retrieve a summary of changes by resource.
232231
233-
In the following example, we are retrieving all changes in the last fourteen days in the categories of registry and files:
232+
In the following example, we're retrieving all changes in the last 14 days in the categories of registry and files:
234233
235234
```
236235
ConfigurationChange
@@ -241,7 +240,7 @@ File Integrity Monitoring data resides within the Azure Log Analytics/Configurat
241240
242241
1. To view details of the registry changes:
243242
244-
1. Remove **Files** from the **where** clause,
243+
1. Remove **Files** from the **where** clause.
245244
1. Remove the summarization line and replace it with an ordering clause:
246245
247246
```

articles/defender-for-cloud/file-integrity-monitoring-overview.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,13 @@ description: Learn about tracking changes to system files and registry keys with
44
author: bmansheim
55
ms.author: benmansheim
66
ms.topic: how-to
7-
ms.date: 09/04/2022
7+
ms.date: 11/14/2022
88
---
99
# File Integrity Monitoring in Microsoft Defender for Cloud
1010

11-
File Integrity Monitoring (FIM) examines operating system files, Windows registries, application software, and Linux system files for changes that might indicate an attack. FIM lets you take advantage of [Change Tracking](../automation/change-tracking/overview.md) directly in Defender for Cloud.
11+
File Integrity Monitoring (FIM) examines operating system files, Windows registries, application software, and Linux system files for changes that might indicate an attack.
12+
13+
FIM (file integrity monitoring) uses the Azure Change Tracking solution to track and identify changes in your environment. When FIM is enabled, you have a **Change Tracking** resource of type **Solution**. If you remove the **Change Tracking** resource, you'll also disable the File Integrity Monitoring feature in Defender for Cloud. FIM lets you take advantage of [Change Tracking](../automation/change-tracking/overview.md) directly in Defender for Cloud. For data collection frequency details, see [Change Tracking data collection details](../automation/change-tracking/overview.md#change-tracking-and-inventory-data-collection).
1214

1315
Defender for Cloud recommends entities to monitor with FIM, and you can also define your own FIM policies or entities to monitor. FIM informs you about suspicious activity such as:
1416

0 commit comments

Comments
 (0)