Skip to content

FIM Custom rules for linux #100

@Calebasah

Description

@Calebasah

Description

We need to design and implement a robust set of File Integrity Monitoring (FIM) custom rules for Linux endpoints to enhance detection of unauthorized system changes, persistence mechanisms, and binary tampering.

Key Objectives

  • Detect unauthorized modifications to critical system files, configurations, and binaries.

  • Identify persistence mechanisms used by malware or attackers (e.g., startup scripts, cron jobs, systemd units).

  • Monitor sensitive directories for privilege escalation attempts.

Definition of Ready:

  • Target files identified.

  • False positive risk evaluated.

  • Agent test environment available.

Acceptance Criteria:

  • Changes to any of the files generate an alert in Wazuh.

  • Alerts contain username, file path, and timestamp.

Definition of Done:

  • Config pushed to repo.

  • Documentation updated.

Sub-issues

Metadata

Metadata

Labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions