System Integrity Monitoring allows tracking changes in the operating system in real time. You can track changes that may indicate security breaches on the computer. The component allows blocking these changes or merely logging change events.
For System Integrity Monitoring to work, you must add at least one rule. A System Integrity Monitoring rule is a set of criteria that define the access of users to files and the registry. System Integrity Monitoring detects changes in the files and the registry within the specified monitoring scope. The monitoring scope is one of the criteria of a System Integrity Monitoring rule.
How to enable and configure Real-Time System Integrity Monitoring in the Application Console
System Integrity Monitoring rules settings
Parameter |
Description |
|---|---|
Monitor file operations for the scope |
The scope to which you want to apply File Integrity Monitoring. This field is mandatory. Use masks: Kaspersky Industrial CyberSecurity for Nodes supports environment variables and the The Two consecutive The |
Monitored objects |
Here you can specify the name or value of a registry key. Use masks: Kaspersky Industrial CyberSecurity for Nodes supports the |
Operations with files |
|
Trusted users and / or user groups |
A trusted user is a user that is allowed to perform actions with files and registry keys in the monitoring scope. If Kaspersky Industrial CyberSecurity for Nodes detects an action performed by a trusted user, System Integrity Monitoring generates an Informational event. You can select users in Active Directory, in the list of accounts in Kaspersky Security Center, or by entering a local user name manually. |
File operation markers / Actions |
Markers characterizing the action with files or registry keys that the application will monitor. |
Detect file operations based on all recognized markers / Detect registry operations based on all recognized markers |
By default, Kaspersky Industrial CyberSecurity for Nodes detects all file / registry operation markers. |
Detect file operations based on the following markers / Detect registry operations based on the following markers |
In the list of available file / registry operations select the check boxes next to the operations you want to monitor. |
Calculate a checksum after a file operation, if possible. The checksum will be indicated in the task log |
If the check box is selected, Kaspersky Industrial CyberSecurity for Nodes calculates the checksum of the modified file, if a file operation with at least one selected marker was detected. If the file operation is detected by several markers, only the checksum of the final file after all modifications is calculated. If the check box is cleared, Kaspersky Industrial CyberSecurity for Nodes does not calculate the checksum of modified files. No checksum calculation is performed in the following cases:
By default, the check box is cleared. |
Checksum computing algorithm |
Select one of the checksum calculation algorithms from the drop-down list:
|
Exclusions |
On the Exclusions tab, you can add objects that you want to exclude from the monitoring scope:
Use masks: Files List of files and folders monitored by the component. Kaspersky Industrial CyberSecurity for Nodes supports environment variables and the The Two consecutive The Registry Kaspersky Industrial CyberSecurity for Nodes supports the |
Event severity level |
Kaspersky Industrial CyberSecurity for Nodes logs file modification events whenever a file or registry key in the monitoring scope is modified. The following event severity levels are available: Informational, Warning, Critical. |