System Integrity Monitoring

System Integrity Monitoring is designed to track the actions performed on files and directories in the monitoring scope specified in the component operation settings. You can use System Integrity Monitoring to track the file changes that may indicate a security breach on a protected device.

To use the component, a license that includes the corresponding function is required.

This feature is not supported in the KESL container.

System Integrity Monitoring settings

Setting

Description

Enable System Integrity Monitoring

This check box enables or disables System Integrity Monitoring.

This check box is cleared by default.

Monitoring scopes

The group of settings contains the Configure button. Clicking this button opens the Scan scopes window.

Monitoring exclusions

This group of settings contains the Configure button. Clicking this button opens the Exclusion scopes window.

Exclusions by mask

This group of settings contains the Configure button, which opens the Exclusions by mask window.

Page top