System Integrity Monitoring allows tracking changes in the operating system in real time. You can track changes that may indicate security breaches on the computer. The component allows blocking these changes or merely logging change events.
For System Integrity Monitoring to work, you must add at least one rule. A System Integrity Monitoring rule is a set of criteria that define the access of users to files and the registry. System Integrity Monitoring detects changes in the files and the registry within the specified monitoring scope. The monitoring scope is one of the criteria of a System Integrity Monitoring rule.
How to enable and configure Real-Time System Integrity Monitoring in the Application Console
System Integrity Monitoring rules settings
Parameter |
Description |
|---|---|
Monitor file operations for the scope |
The scope to which you want to apply File Integrity Monitoring. This field is mandatory. Use masks: Kaspersky Embedded Systems Security supports environment variables and the The Two consecutive The |
Monitored objects |
Here you can specify the name or value of a registry key. Use masks: Kaspersky Embedded Systems Security supports the |
Operations with files |
|
Trusted users and / or user groups |
A trusted user is a user that is allowed to perform actions with files and registry keys in the monitoring scope. If Kaspersky Embedded Systems Security detects an action performed by a trusted user, System Integrity Monitoring generates an Informational event. You can select users in Active Directory, in the list of accounts in Kaspersky Security Center, or by entering a local user name manually. |
File operation markers / Actions |
Markers characterizing the action with files or registry keys that the application will monitor. |
Detect file operations based on all recognized markers / Detect registry operations based on all recognized markers |
By default, Kaspersky Embedded Systems Security detects all file / registry operation markers. |
Detect file operations based on the following markers / Detect registry operations based on the following markers |
In the list of available file / registry operations select the check boxes next to the operations you want to monitor. |
Calculate a checksum after a file operation, if possible. The checksum will be indicated in the task log |
If the check box is selected, Kaspersky Embedded Systems Security calculates the checksum of the modified file, if a file operation with at least one selected marker was detected. If the file operation is detected by several markers, only the checksum of the final file after all modifications is calculated. If the check box is cleared, Kaspersky Embedded Systems Security does not calculate the checksum of modified files. No checksum calculation is performed in the following cases:
By default, the check box is cleared. |
Checksum computing algorithm |
Select one of the checksum calculation algorithms from the drop-down list:
|
Exclusions |
On the Exclusions tab, you can add objects that you want to exclude from the monitoring scope:
Use masks: Files List of files and folders monitored by the component. Kaspersky Embedded Systems Security supports environment variables and the The Two consecutive The Registry Kaspersky Embedded Systems Security supports the |
Event severity level |
Kaspersky Embedded Systems Security logs file modification events whenever a file or registry key in the monitoring scope is modified. The following event severity levels are available: Informational, Warning, Critical. |