Integrity
  • 12 Feb 2024
  • 1 Minute to read
  • Contributors
  • Dark
    Light
  This documentation version is deprecated, please click here for the latest version.

Integrity

  • Dark
    Light

Article summary

The Integrity extension helps you manage all aspects of File or Registry Integrity Monitoring (FIM and RIM, respectively). This extension automates integrity checks of file system and registry values through pattern-based rules.

Enabling the Integrity Extension

To enable the Integrity extension, navigate to the Integrity extension page in the marketplace. Select the organization you wish to enable the extension for, and select Subscribe.

After clicking Subscribe, the Infrastructure extension should be available almost immediately.

Using the Integrity Extension

Once enabled, you will see an File/Reg Integrity option under Automation within the LimaCharlie web UI.

Selecting this option allows you to customize File & Registry Integrity Monitoring rules, as seen in the screenshot below.

Selecting Add Monitoring Rule will allow you to create a FIM or RIM rule, specifying a platform, tag(s), and pattern(s).

Patterns are file or registry patterns and support wildcards (*, ?, +). Windows directory separators (backslash, ”\”) must be escape with a double-slash ”\\”. Some examples of rule patterns include:

?:\\Windows\\System32\\drivers
hklm\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\*
hklm\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\\*
/root/.ssh/authorized_keys
/home/*/.ssh/*
/Users/*/Library/Keychains/*
/Library/Keychains

When a FIM or RIM rule is tripped, you will see a FIM_HIT event in the Sensor(s) timeline.

Linux Support

FIM is supported on Linux systems, however, support may vary based on Linux distribution and software.

Linux with eBPF Support

Linux hosts capable of running with eBPF have file notification and FIM capabilities on par with Windows and macOS.

Legacy Support

FIM is partially supported on systems without eBPF. Specified file expressions are actively monitored via inotify (as opposed to macOS and Windows, which utilize passive kernel monitoring). Due to inotify limitations, paths with wildcards are less efficient and only support monitoring up to 20 sub-directories covered by the wildcard. In addition to this, the path expressions should specify a final wildcard of when all files under a directory need to be monitored. Omitting the final * will result in only the top-level directory being monitoring.

Actions via REST API

The following REST API actions can be sent to interact with the Integrity extension:

List Rules

{
  "action": "list_rules"
}

Add Rule

{
  "action": "add_rule",
  "name": "linux-root-ssh-configs",
  "patterns": [
    "/root/.ssh/*"
  ],
  "tags": [
    "vip",
    "workstation"
  ],
  "platforms": [
    "linux"
  ]
}

Remove Rule

{
  "action": "remove_rule",
  "name": "linux-ssh-configs"
}


Was this article helpful?

What's Next