File integrity monitoring (FIM) is an internal control or process that performs the act of validating the integrity of operating system and application software files using a verification method between the current file state and a known, good baseline. This comparison method often involves calculating a known cryptographic checksum of the file's original baseline and comparing with the calculated checksum of the current state of the file.[1] Other file attributes can also be used to monitor integrity.[2]
Generally, the act of performing file integrity monitoring is automated using internal controls such as an application or process. Such monitoring can be performed randomly, at a defined polling interval, or in real-time.
^"Verisys - How it Works". Ionx. Retrieved 2012-09-21.
^"File Integrity Monitoring". nCircle. Archived from the original on 2012-04-10. Retrieved 2012-04-18.
and 25 Related for: File integrity monitoring information
Fileintegritymonitoring (FIM) is an internal control or process that performs the act of validating the integrity of operating system and application...
detection system (HIDS). It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based alerting, and active...
techniques are used together to ensure various degrees of data integrity. For example, a computer file system may be configured on a fault-tolerant RAID array...
microscope, used to image the arrangement of atoms Fileintegritymonitoring, used to validate software files Fim switch, in E. coli Flood Inundation Map Flow-following...
measures to provide end-to-end data integrity, or lack of errors. In general, when data corruption occurs, a file containing that data will produce unexpected...
supports encryption, snapshots, and increased data integrity, among other capabilities. Apple File System was announced at Apple's developers’ conference...
McAfee Change Control is a commercial fileintegritymonitoring solution for Windows- and Linux-based systems developed by McAfee. McAfee PCI Security...
Tripwire is a free software security and data integrity tool for monitoring and alerting on specific file change(s) on a range of systems originally developed...
infrastructures and provides fileintegritymonitoring (FIM) while also administering firewall automation, vulnerability monitoring, network access control...
systems. FileIntegrity and Change Monitoring (FIM) is the process of monitoring the files on your system. Unexpected changes in your system files will trigger...
based. System Integrity Protection comprises the following mechanisms: Protection of contents and file-system permissions of system files and directories;...
In computing, a file system or filesystem (often abbreviated to FS or fs) governs file organization and access. A local file system is a capability of...
(for example, a file), the Security Reference Monitor compares the integrity level in the subject's access token against the integrity level in the object's...
databases IIS metabase Specific file types monitored The list of file types and directories to be included or excluded from monitoring by System Restore can be...
Integrity Management Plan (part of an asset integrity management system) is a documented and systematic approach to ensure the long-term integrity of an...
The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer...
an audit of a computer system from SAP to check its security and data integrity. SAP is the acronym for Systems Applications Products. It is a system...
blocks containing the list of phone numbers being monitored, along with the rootkit and illicit monitoring software. Modern rootkits do not elevate access...
Contextual integrity is a theory of privacy developed by Helen Nissenbaum and presented in her book Privacy In Context: Technology, Policy, and the Integrity of...
continuous controls monitoring (CCM), and continuous risk monitoring and assessment (CRMA). Continuous data assurance verifies the integrity of data flowing...
FileVault is a disk encryption program in Mac OS X 10.3 Panther (2003) and later. It performs on-the-fly encryption with volumes on Mac computers. FileVault...
per-file "integrity stream" that internally stores a checksum per cluster. Those per cluster checksums are not accessible so it is actually a per file feature...