You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security-center/security-center-file-integrity-monitoring.md
+35-7Lines changed: 35 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,39 @@ FIM uses the Azure Change Tracking solution to track and identify changes in you
41
41
## Which files should I monitor?
42
42
You should think about the files that are critical for your system and applications when choosing which files to monitor. Consider choosing files that you don’t expect to change without planning. Choosing files that are frequently changed by applications or operating system (such as log files and text files) create a lot of noise which make it difficult to identify an attack.
43
43
44
-
Security Center recommends which files you should monitor as a default according to known attack patterns that include file and registry changes.
44
+
Security Center provides the following list of recommended items to monitor based on known attack patterns. These include files and Windows registry keys. All the keys are under HKEY_LOCAL_MACHINE ("HKLM" in the table.)
> You can change the settings at any time. See Edit monitored entities below to learn more.
84
-
>
85
-
>
116
+
86
117
87
118
## View the FIM dashboard
88
119
The **File integrity monitoring** dashboard displays for workspaces where FIM is enabled. The FIM dashboard opens after you enable FIM on a workspace or when you select a workspace in the **File Integrity Monitoring** window that already has FIM enabled.
@@ -199,9 +230,6 @@ In this article, you learned to use File Integrity Monitoring (FIM) in Security
199
230
200
231
*[Setting security policies](tutorial-security-policy.md) -- Learn how to configure security policies for your Azure subscriptions and resource groups.
201
232
*[Managing security recommendations](security-center-recommendations.md) -- Learn how recommendations help you protect your Azure resources.
202
-
*[Security health monitoring](security-center-monitoring.md)--Learn how to monitor the health of your Azure resources.
203
-
*[Managing and responding to security alerts](security-center-managing-and-responding-alerts.md)--Learn how to manage and respond to security alerts.
204
-
*[Monitoring partner solutions](security-center-partner-solutions.md) -- Learn how to monitor the health status of your partner solutions.
205
233
*[Azure Security blog](https://blogs.msdn.com/b/azuresecurity/)--Get the latest Azure security news and information.
206
234
207
235
<!--Image references-->
@@ -224,4 +252,4 @@ In this article, you learned to use File Integrity Monitoring (FIM) in Security
0 commit comments