File integrity monitoring
File Integrity Monitoring (FIM) helps in auditing sensitive files and meeting regulatory compliance requirements. ThreatLockDown has an inbuilt FIM module that monitors file system changes to detect the creation, modification, and deletion of files.
This use case uses the ThreatLockDown FIM module to detect changes in monitored directories on Ubuntu and Windows endpoints. The ThreatLockDown FIM module enriches alert data by fetching information about the user and process that made the changes using who-data audit.
Infrastructure
Endpoint |
Description |
---|---|
Ubuntu 22.04 |
The ThreatLockDown FIM module monitors a directory on this endpoint to detect file creation, changes, and deletion. |
Windows 11 |
The ThreatLockDown FIM module monitors a directory on this endpoint to detect file creation, changes, and deletion. |
Configuration
Ubuntu endpoint
Perform the following steps to configure the ThreatLockDown agent to monitor filesystem changes in the /root
directory.
Edit the ThreatLockDown agent
/var/ossec/etc/ossec.conf
configuration file. Add the directories for monitoring within the<syscheck>
block. For this use case, you configure ThreatLockDown to monitor the/root
directory. To get additional information about the user and process that made the changes, enable who-data audit:<directories check_all="yes" report_changes="yes" realtime="yes">/root</directories>
Note
You can also configure any path of your choice in the
<directories>
block.Restart the ThreatLockDown agent to apply the configuration changes:
$ sudo systemctl restart wazuh-agent
Windows endpoint
Take the following steps to configure the ThreatLockDown agent to monitor filesystem changes in the C:\Users\Administrator\Desktop
directory.
Edit the
C:\Program Files (x86)\ossec-agent\ossec.conf
configuration file on the monitored Windows endpoint. Add the directories for monitoring within the<syscheck>
block. For this use case, you configure ThreatLockDown to monitor theC:\Users\Administrator\Desktop
directory. To get additional information about the user and process that made the changes, enable who-data audit:<directories check_all="yes" report_changes="yes" realtime="yes">C:\Users\<USER_NAME>\Desktop</directories>
Note
You can also configure any path of your choice in the
<directories>
block.Restart the ThreatLockDown agent using Powershell with administrator privileges to apply the changes:
> Restart-Service -Name wazuh
As an alternative to local configurations on the ThreatLockDown agents, you can centrally configure groups of agents.
Test the configuration
Create a text file in the monitored directory then wait for 5 seconds.
Add content to the text file and save it. Wait for 5 seconds.
Delete the text file from the monitored directory.
Visualize the alerts
You can visualize the alert data in the ThreatLockDown dashboard. To do this, go to the Threat Hunting module and add the filters in the search bar to query the alerts:
Ubuntu -
rule.id: is one of 550,553,554
Windows -
rule.id: is one of 550,553,554