{"id":5583,"date":"2019-08-19T22:17:15","date_gmt":"2019-08-19T21:17:15","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5583"},"modified":"2021-07-12T14:14:48","modified_gmt":"2021-07-12T13:14:48","slug":"file-integrity-monitoring-security","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/file-integrity-monitoring-security","title":{"rendered":"File Integrity Monitoring Tips"},"content":{"rendered":"<p>Malware threats are evolving and becoming ever more sophisticated, continuously using new and undetected methods to tamper with valuable files. In the midst of these malware attacks, everyday users constantly make modifications to operating system and application software files. How can you differentiate which of these changes are legitimate and which are the result of attacks?<\/p>\n<p>This is where file integrity monitoring (FIM) comes in. FIM security validates the integrity of system and program files, alerting system administrators to any suspicious changes.<\/p>\n<p><b>What is FIM security?<\/b><\/p>\n<p>In the course of business, users regularly modify system configurations, files, and file properties. The majority of system and file modifications are harmless, but others may be caused by malware. If these malware modifications aren\u2019t found and addressed immediately, they can wreak havoc on a network.<\/p>\n<p>The volume of file changes over the course of just one day is already far too large for a system administrator to keep track of manually. File integrity monitoring solutions, or FIM tools, were developed as an automated way to stay apprised of file modifications. FIM software runs continuously in the background, logging changes at set intervals or random times, and will alert administrators of any suspicious activity.<\/p>\n<p>File integrity monitoring tools are a crucial way to protect against hackers. Important system files are a rich target for damaging attacks. In the event of an attack, FIM software will raise a red flag so you can begin to fix the damage. It\u2019s also useful for auditing and breach reporting in the aftermath of an attack.<\/p>\n<p>FIM tools can also provide assistance in situations where malware and hackers aren\u2019t involved. Sometimes a well-meaning employee might make a file change that accidentally causes functionality or security issues. Integrity monitoring can catch these changes before they lead to problems. Some file integrity tools even have the built-in capability to automatically roll back the troublesome changes. In addition, FIM is useful for monitoring the status of system updates, as FIM tools can verify whether updates have been performed on all relevant files.<\/p>\n<p>FIM is a required component of many\u00a0regulatory compliance standards. The\u00a0Payment Card Industry Data Security Standard\u00a0(PCI DSS), Sarbanes-Oxley Act (SOA), Federal Information Security Management Act (FISMA), and the\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/hipaa-compliance-checklist\" target=\"_blank\" rel=\"noopener\">Health Insurance Portability and Accountability Act<\/a>\u00a0(HIPAA) all mandate file integrity monitoring. It\u2019s clear that FIM is an essential part of any organization\u2019s security suite.<\/p>\n<p><b>How does file integrity monitoring work?<\/b><\/p>\n<p>FIM software keeps track of both operating system and application software files. It monitors user credentials, privileges and security settings, file attributes and sizes, and configuration values. FIM works by comparing the current state of a file with a known baseline. If there\u2019s a discrepancy, the software will issue an alert.<\/p>\n<p>In its most basic implementations, FIM software checks simple file properties like time, date, and size against the baseline. However, these properties can be easily spoofed by hackers. That\u2019s why most FIM tools opt to use a more advanced checksum method instead. The software calculates a cryptographic checksum from the file\u2019s original baseline (often using the MD5 or SHA-2 hashing algorithms). The checksum is then compared with that of the current file, flagging any mismatches that may indicate a problem.<\/p>\n<p>For key system files, FIM may use real-time change notification rather than baseline comparison. This method sends an alert any time the file is accessed or modified. Real-time change notification is usually implemented as part of an operating system\u2019s kernel or as an extension to it.<\/p>\n<p>FIM is necessary in both Windows and Linux\/Unix environments, with different priorities in each. In Windows, the registry is used for most configuration changes, resulting in a more secure environment. Nevertheless, Windows file integrity monitoring needs to keep an eye on bootup and startup, password, Active Directory, Exchange, and operating system files. In Linux\/Unix, core configuration files are more exposed. Without robust file monitoring, they are vulnerable to hackers. Linux\/Unix FIM should track user profiles, kernel parameters, boot loaders, daemons and service, and run commands.<\/p>\n<p><b>FIM through SolarWinds<\/b><\/p>\n<p>By staying aware of changes in their environments, managed services providers (MSPs) can better protect their customers.\u00a0<a class=\"ext\" href=\"https:\/\/www.solarwinds.com\/security-event-manager\/use-cases\/file-integrity-monitoring-software\" target=\"_blank\" rel=\"noopener noreferrer\">File integrity monitoring<\/a>\u00a0is an integral part of SolarWinds<sup>\u00a0<\/sup>Security Event Manager (SEM). SEM tracks file and directory access, movement, and sharing to detect zero-day malware and advanced persistent threats, and includes integrated compliance reporting tools..<\/p>\n<p>With automated incident responses, SEM can block IP addresses, change privileges, disable accounts,\u00a0<a class=\"ext\" href=\"https:\/\/www.solarwinds.com\/security-event-manager\/use-cases\/usb-security-analyzer\" target=\"_blank\" rel=\"noopener noreferrer\">block USB devices<\/a>, and kill applications to help swiftly neutralize security threats. If an incident does take place, SEM\u2019s advanced search and forensic analysis can be used to help prove the limited impact of a breach, potentially saving your business from negative outcomes.<\/p>\n<p><b>For more advice on protecting your files, read through our\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/resources\/security\" target=\"_blank\" rel=\"noopener\">Security Resource Center<\/a>.<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malware threats are evolving and becoming ever more sophisticated, continuously using new and undetected methods to tamper with valuable files. In the midst of these malware attacks, everyday users constantly&#8230;<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5583","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>File Integrity Monitoring Tips - N-able<\/title>\n<meta name=\"description\" content=\"Read about file integrity monitoring best practices to ensure that your operating system and application software files are running efficiently and securely.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/file-integrity-monitoring-security\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"File Integrity Monitoring Tips - N-able\" \/>\n<meta property=\"og:description\" content=\"Read about file integrity monitoring best practices to ensure that your operating system and application software files are running efficiently and securely.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/file-integrity-monitoring-security\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-19T21:17:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-12T13:14:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/file-integrity-monitoring-security#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/file-integrity-monitoring-security\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"File Integrity Monitoring Tips\",\"datePublished\":\"2019-08-19T22:17:15+01:00\",\"dateModified\":\"2021-07-12T13:14:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/file-integrity-monitoring-security\"},\"wordCount\":805,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/file-integrity-monitoring-security\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/file-integrity-monitoring-security\",\"name\":\"File Integrity Monitoring Tips - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"datePublished\":\"2019-08-19T22:17:15+01:00\",\"dateModified\":\"2021-07-12T13:14:48+00:00\",\"description\":\"Read about file integrity monitoring best practices to ensure that your operating system and application software files are running efficiently and securely.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/file-integrity-monitoring-security#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/file-integrity-monitoring-security\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/file-integrity-monitoring-security#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/es\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"File Integrity Monitoring Tips\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"File Integrity Monitoring Tips - N-able","description":"Read about file integrity monitoring best practices to ensure that your operating system and application software files are running efficiently and securely.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/file-integrity-monitoring-security","og_locale":"es_ES","og_type":"article","og_title":"File Integrity Monitoring Tips - N-able","og_description":"Read about file integrity monitoring best practices to ensure that your operating system and application software files are running efficiently and securely.","og_url":"https:\/\/www.n-able.com\/es\/blog\/file-integrity-monitoring-security","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-08-19T21:17:15+00:00","article_modified_time":"2021-07-12T13:14:48+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/file-integrity-monitoring-security#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/file-integrity-monitoring-security"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"File Integrity Monitoring Tips","datePublished":"2019-08-19T22:17:15+01:00","dateModified":"2021-07-12T13:14:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/file-integrity-monitoring-security"},"wordCount":805,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"articleSection":["Security"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/file-integrity-monitoring-security","url":"https:\/\/www.n-able.com\/es\/blog\/file-integrity-monitoring-security","name":"File Integrity Monitoring Tips - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"datePublished":"2019-08-19T22:17:15+01:00","dateModified":"2021-07-12T13:14:48+00:00","description":"Read about file integrity monitoring best practices to ensure that your operating system and application software files are running efficiently and securely.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/es\/blog\/file-integrity-monitoring-security#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/file-integrity-monitoring-security"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/es\/blog\/file-integrity-monitoring-security#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/es\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"File Integrity Monitoring Tips"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/5583","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=5583"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/5583\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=5583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}