Skip to content

Commit 496cd61

Browse files
authored
Cleaned up code syntax (and resultant display)
Also changed a single step procedure to a bullet - not a numbered list. Ben, take a look at line 100 too - that old image syntax should be updated. ------- cc: @bmansheim
1 parent e1b627e commit 496cd61

File tree

1 file changed

+15
-24
lines changed

1 file changed

+15
-24
lines changed

articles/defender-for-cloud/file-integrity-monitoring-usage.md

Lines changed: 15 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ FIM baselines start by identifying characteristics of a known-good state for the
3434

3535

3636
|Policy Name | Registry Setting|
37-
|---------------------------------------|-------------|
37+
|----------------------------|-----------------|
3838
|Domain controller: Refuse machine account password changes| MACHINE\System\CurrentControlSet\Services \Netlogon\Parameters\RefusePasswordChange|
3939
|Domain member: Digitally encrypt or sign secure channel data (always)|MACHINE\System\CurrentControlSet\Services \Netlogon\Parameters\RequireSignOrSeal|
4040
|Domain member: Digitally encrypt secure channel data (when possible)|MACHINE\System\CurrentControlSet\Services \Netlogon\Parameters\SealSecureChannel|
@@ -51,7 +51,7 @@ FIM baselines start by identifying characteristics of a known-good state for the
5151
5252
To configure FIM to monitor registry baselines:
5353

54-
1. In the **Add Windows Registry for Change Tracking** window, in the **Windows Registry Key** text box, enter the following registry key:
54+
- In the **Add Windows Registry for Change Tracking** window, in the **Windows Registry Key** text box, enter the following registry key:
5555

5656
```
5757
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters
@@ -73,36 +73,27 @@ In the example in the following figure,
7373
File Integrity Monitoring data resides within the Azure Log Analytics / ConfigurationChange table set.
7474
7575
1. Set a time range to retrieve a summary of changes by resource.
76-
In the following example, we are retrieving all changes in the last fourteen days in the categories of registry and files:
7776
78-
<code>
77+
In the following example, we are retrieving all changes in the last fourteen days in the categories of registry and files:
7978
80-
> ConfigurationChange
81-
82-
> | where TimeGenerated > ago(14d)
83-
84-
> | where ConfigChangeType in ('Registry', 'Files')
85-
86-
> | summarize count() by Computer, ConfigChangeType
87-
88-
</code>
79+
```
80+
ConfigurationChange
81+
| where TimeGenerated > ago(14d)
82+
| where ConfigChangeType in ('Registry', 'Files')
83+
| summarize count() by Computer, ConfigChangeType
84+
```
8985
9086
1. To view details of the registry changes:
9187
9288
1. Remove **Files** from the **where** clause,
9389
1. Remove the summarization line and replace it with an ordering clause:
9490
95-
<code>
96-
97-
> ConfigurationChange
98-
99-
> | where TimeGenerated > ago(14d)
100-
101-
> | where ConfigChangeType in ('Registry')
102-
103-
> | order by Computer, RegistryKey
104-
105-
</code>
91+
```
92+
ConfigurationChange
93+
| where TimeGenerated > ago(14d)
94+
| where ConfigChangeType in ('Registry')
95+
| order by Computer, RegistryKey
96+
```
10697
10798
Reports can be exported to CSV for archival and/or channeled to a Power BI report.
10899

0 commit comments

Comments
 (0)