From the course: CompTIA CySA+ (CS0-002) Cert Prep: 5 Security Operations and Monitoring

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

File system integrity monitoring

File system integrity monitoring

From the course: CompTIA CySA+ (CS0-002) Cert Prep: 5 Security Operations and Monitoring

Start my 1-month free trial

File system integrity monitoring

- [Instructor] File integrity monitoring is an important component of a defense in depth approach to information security. We have many different defenses designed to keep endpoints systems safe. Anti-viral software is designed to detect malicious files before they gain a foothold on endpoints. Centralized multi-factor authentication prevents attempts to compromise user accounts. Host intrusion detection and prevention systems alert us to potential compromises and block them. However the principle of defense in depth suggest that we should have controls in place that can help us detect an intrusion even when those other systems fail. File integrity monitoring is a great example of this type of control. File integrity monitoring systems watch the file system of an endpoint or server for any unexpected changes and then report those changes to an administrator for further investigation. They perform this function…

Contents