In the Application Console tree, expand the System Inspection node.
Select the File Integrity Monitor child node.
Click the File operations monitoring rules link in the details pane of the File Integrity Monitor node.
The File operations monitoring window opens.
Add a monitoring scope in one of the following ways:
If you want to select folders through the standard Microsoft Windows dialog:
On the left side of the window, click the Browse button.
The standard Microsoft Windows Browse For Folder window opens.
In the window that opens, select the folder for which you want to monitor operations, and click the OK button.
Click the Add button to have Kaspersky Security for Windows Server start monitoring file operations in the indicated monitoring scope.
If you want to specify a monitoring scope manually, add a path using a supported mask:
<*.ext> - all files with the extension <ext>, regardless of their location;
<*\name.ext> - all files with name <name> and extension <ext>, regardless of their location;
<\dir\*> - all files in folder <\dir>;
<\dir\*\name.ext> - all files with the name <name> and extension <ext> in folder <\dir> and all of its child folders.
When specifying a monitoring scope manually, be sure that the path is in the following format: <volume letter>:\<mask>. If the volume letter is missing, Kaspersky Security for Windows Server will not add the specified monitoring scope.
On the right side of the window, the Rule description tab displays the trusted users and file operation markers selected for this monitoring scope.
In the list of added monitoring scopes, select the scope whose settings you want to configure.
Select the Trusted users tab.
Click the Add button.
The standard Microsoft Windows Select Users or Groups window opens.
Select the users or groups of users that Kaspersky Security for Windows Server will consider trusted for the selected monitoring scope.
If required, perform the following actions to select several markers:
Select the Detect file operations basing on the following markers option.
In the list of available file operations select the check boxes next to the operations you want to monitor.
By default, Kaspersky Security for Windows Server detects all file operation markers, i.e. the Detect file operations basing on all recognizable markers option is selected.
If you want Kaspersky Security for Windows Server to calculate a file checksum after an operation is performed, do the following:
If the check box is selected, Kaspersky Security for Windows Server calculates the checksum of the modified file, if a file operation with at least one selected marker was detected.
If the file operation is detected by several markers, Kaspersky Security for Windows Server calculates only the checksum of the final file after all modifications.
If the check box is cleared, Kaspersky Security for Windows Server does not calculate the checksum of modified files.
No checksum calculation is performed in the following cases:
If the file has become unavailable (for example, due to a change of access permissions).
If the file operation was detected in a file that was subsequently removed.
The check box is cleared by default.
In the Calculate the checksum using the algorithm drop down list select one of the options:
MD5 hash.
SHA256 hash.
If necessary, add excluded monitoring scopes by performing the following steps:
The check box disables use of exclusions for folders where file operations do not need to be monitored.
If the check box is selected, Kaspersky Security for Windows Server skips the monitoring scopes specified in the exclusions list when the File Integrity Monitor task is run.
If the check box is cleared, Kaspersky Security for Windows Server logs events for all specified monitoring scopes.
By default, the check box is cleared and the exclusion list is empty.
Click the Browse button.
The standard Microsoft Windows Browse For Folder window opens.
In the window that opens, specify the folder that you want to exclude from the monitoring scope.
Click OK.
Click the Add button.
The specified folder is added to the list of excluded scopes.
You can also add excluded monitoring scopes manually using the same masks that are used to specify monitoring scopes.
Click the Save button to apply the new rule configuration.