Configuring System Integrity Check in the Administration Console

You can perform a system integrity check in the Administration Console, with the help of the System Integrity Check task.

You can create and run user system integrity check tasks. You can configure the scan settings by editing the settings of the tasks.

In the Settings section of the properties of the System Integrity Check task, you can edit the settings listed in the table below.

System Integrity Check task settings

Setting

Description

Rebuild baseline on each task start

This check box enables or disables the reestablishment of a system baseline upon every start of the System Integrity Check task.

This check box is cleared by default.

Check SHA256 hash

This check box enables or disables the use of the file hash as a criterion when comparing the current state of the file with its original state.

If this checkbox is cleared, the application compares only the file size (if the file size has not changed, then the modification time is not considered a critical parameter).

This check box is cleared by default.

Track directories in monitoring scopes

This check box enables or disables scanning of directories within the specified monitoring scopes during a system integrity check.

This check box is cleared by default.

Track the last time a file was accessed

This check box enables or disables tracking the file access time while the System Integrity monitoring runs.

This check box is cleared by default.

Monitoring scopes

The group of settings contains the Configure button. Clicking this button opens the Scan scopes window.

Under Exclusion scopes in the properties of the System Integrity Check, you can define monitoring exclusions and exclusions by mask.

Page top