Skip to content

FIM configuration for Windows #105

@Calebasah

Description

@Calebasah

Description:

This ticket implements a comprehensive File Integrity Monitoring (FIM) configuration for all managed Windows endpoints. The purpose is to enhance our security posture by proactively detecting and alerting on unauthorized changes to critical system files, directories, and registry keys, which are common targets for malware and threat actors.

Key Objectives:

  • Detect Malware & Persistence: Monitor key persistence locations (e.g., Registry Run keys, Services, Scheduled Tasks, Startup folders) for unauthorized modifications indicative of malware installation or attacker footholds.
  • Ensure System Integrity: Safeguard critical system binaries (C:\Windows\System32, C:\Windows\SysWOW64), PowerShell environments, and other security-critical directories from tampering.
  • Protect Application Security: Monitor configuration and executable paths for key applications like web browsers, Microsoft Office, and other widely targeted software.
  • Protect Sensitive Data: Implement nodiff rules to prevent the exposure of cryptographic keys, passwords, and other secrets in alert logs, ensuring compliance with data protection standards.
  • Maintain System Performance: Utilize extensive ignore patterns for volatile files (logs, Pagefile, temporary directories) and highly frequented, low-risk system paths to minimize noise and resource overhead.

Metadata

Metadata

Labels

Type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions