- Print
- DarkLight
The Integrity Extension helps you manage all aspects of File or Registry Integrity Monitoring (FIM and RIM, respectively). This extension automates integrity checks of file system and registry values through pattern-based rules.
Enabling the Integrity Extension
To enable the Integrity extension, navigate to the Integrity extension page in the marketplace. Select the Organization you wish to enable the extension for, and select Subscribe.
After clicking Subscribe, the Infrastructure extension should be available almost immediately.
Using the Integrity Extension
Once enabled, you will see an File/Reg Integrity option under Automation within the LimaCharlie web UI.
Selecting this option allows you to customize File & Registry Integrity Monitoring rules, as seen in the screenshot below.
Selecting Add Monitoring Rule will allow you to create a FIM or RIM rule, specifying a platform, Tag(s), and pattern(s).
Patterns are file or registry patterns and support wildcards (*, ?, +). Windows directory separators (backslash, ”\”
) must be escape with a double-slash ”\\”
. Some examples of rule patterns include:
?:\\Windows\\System32\\drivers
hklm\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\*
hklm\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\\*
/root/.ssh/authorized_keys
/home/*/.ssh/*
/Users/*/Library/Keychains/*
/Library/Keychains
When a FIM or RIM rule is tripped, you will see a FIM_HIT
event in the Sensor(s) timeline.
Linux Support
FIM is supported on Linux systems, however, support may vary based on Linux distribution and software.
Linux with eBPF Support
Linux hosts capable of running with eBPF have file notification and FIM capabilities on par with Windows and macOS.
Legacy Support
FIM is partially supported on systems without eBPF. Specified file expressions are actively monitored via inotify
(as opposed to macOS and Windows, which utilize passive kernel monitoring). Due to inotify limitations, paths with wildcards are less efficient and only support monitoring up to 20 sub-directories covered by the wildcard. In addition to this, the path expressions should specify a final wildcard of when all files under a directory need to be monitored. Omitting the final *
will result in only the top-level directory being monitoring.
Actions via REST API
The following REST API actions can be sent to interact with the Integrity extension:
List Rules
{
"action": "list_rules"
}
Add Rule
{
"action": "add_rule",
"name": "linux-root-ssh-configs",
"patterns": [
"/root/.ssh/*"
],
"tags": [
"vip",
"workstation"
],
"platforms": [
"linux"
]
}
Remove Rule
{
"action": "remove_rule",
"name": "linux-ssh-configs"
}