File Integrity Management Overview
File integrity monitoring (FIM) monitors key files on Linux servers in real time; records file addition, modification, and deletion; and reports alarms, helping you detect suspicious changes in a timely manner.
File Integrity Monitoring Principles
HSS checks for suspicious changes by comparing the previous and current statuses of a file.
File Integrity Monitoring Scope
Some file monitoring paths are preconfigured in HSS. For details, see Table 1.
To add or remove monitored files, you can modify parameters in the File Integrity area in the File Protection policy. For details, see Configuring Policies.
Constraints
- File integrity management is available in HSS professional, enterprise, premium, WTP, and container editions. For details about how to purchase and upgrade HSS, see Purchasing an HSS Quota and Upgrading a Protection Quota.
- File integrity management applies only to Linux servers.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot