The table describes all available values and default values of all the settings that you can specify for the On-access File Integrity Monitoring task.
On-access File Integrity Monitoring task settings
Setting |
Description |
Values |
|---|---|---|
|
Enables or disables exclusion of objects specified by the The |
|
|
Specifies a list of masks that define objects to be excluded from the monitoring scope. Before specifying this setting, make sure the Masks are specified in command shell format. If you want to specify several masks, each mask must be specified on a new line with a new index ( |
The default value is not defined. |
The [ScanScope.item_#] section contains the monitoring scopes of the System Integrity Monitoring task. At least one monitoring scope must be specified for the task. You can define several [ScanScope.item_#] sections in any order in the configuration file. The application will process the scopes by index in ascending order. Each [ScanScope.item_#] section contains the following settings: |
||
|
Specifies the name of the monitoring scope. |
The default value is not defined. |
|
Enables or disables monitoring of the specified scope. |
|
|
Specifies the full path to the object or directories to be monitored. |
Default value: /opt/kaspersky/kics/ |
|
Specifies a command line shell mask that defines the objects to be monitored. You can specify several |
Default value: |
The [ExcludedFromScanScope.item_#] section contains the objects to be excluded from all [ScanScope.item_#] sections. The objects that match the rules of any [ExcludedFromScanScope.item_#] section will be excluded from monitoring. The format of the [ExcludedFromScanScope.item_#] section is similar to the format of the [ScanScope.item_#] section. You can define several [ExcludedFromScanScope.item_#] sections in any order in the configuration file. The application will process the scopes by index in ascending order. Each [ExcludedFromScanScope.item_#] section contains the following settings: |
||
|
Specifies the name of the scope to be excluded from monitoring. |
The default value is not defined. |
|
Specifies whether the specified scope will be excluded from monitoring. |
|
|
Specifies the path to the objects or directories to be excluded from monitoring. You can use masks to specify the path. |
The default value is not defined. |
|
Specifies a command line shell mask that defines the objects to be excluded from monitoring. You can specify several |
Default value: |