-
Couldn't load subscription status.
- Fork 1
Open
Labels
Description
Description:
This ticket implements a comprehensive File Integrity Monitoring (FIM) configuration for all managed Windows endpoints. The purpose is to enhance our security posture by proactively detecting and alerting on unauthorized changes to critical system files, directories, and registry keys, which are common targets for malware and threat actors.
Key Objectives:
- Detect Malware & Persistence: Monitor key persistence locations (e.g., Registry Run keys, Services, Scheduled Tasks, Startup folders) for unauthorized modifications indicative of malware installation or attacker footholds.
- Ensure System Integrity: Safeguard critical system binaries (
C:\Windows\System32,C:\Windows\SysWOW64), PowerShell environments, and other security-critical directories from tampering. - Protect Application Security: Monitor configuration and executable paths for key applications like web browsers, Microsoft Office, and other widely targeted software.
- Protect Sensitive Data: Implement
nodiffrules to prevent the exposure of cryptographic keys, passwords, and other secrets in alert logs, ensuring compliance with data protection standards. - Maintain System Performance: Utilize extensive ignore patterns for volatile files (logs, Pagefile, temporary directories) and highly frequented, low-risk system paths to minimize noise and resource overhead.