3.1.3.5 Ensure that 'File Integrity Monitoring' component status is set to 'On'

Information

File Integrity Monitoring (FIM) is a feature that monitors critical system files in Windows or Linux for potential signs of attack or compromise.

Rationale:

FIM provides a detection mechanism for compromised files. When FIM is enabled, critical system files are monitored for changes that might indicate a threat actor is attempting to modify system files for lateral compromise within a host operating system.

Impact:

File Integrity Monitoring requires licensing and is included in these plans:

Defender for Servers plan 2

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Audit from Azure Portal

From the Azure Portal Home page, select Microsoft Defender for Cloud

Under Management select Environment Settings

Select a subscription

Under Settings > Defender Plans, click Settings & monitoring

Under the Component column, locate the row for File Integrity Monitoring

Select On

Click Continue in the top left

Repeat the above for any additional subscriptions.

Default Value:

By default, File Integrity Monitoring is Off.

See Also

https://workbench.cisecurity.org/benchmarks/16820

Item Details

Category: RISK ASSESSMENT

References: 800-53|RA-5, CSCv7|3.1

Plugin: microsoft_azure

Control ID: 6599f91786f7e5ebc553514f116992d7c504faf503cb4103ad83d1a31f21ae0c