Capabilities Overview: File Integrity Monitoring (FIM) and File Reputation Service

Despite every effort to maintain good access control, critical static files will change on endpoints in your environment. While some files will change simply as a part of using a desktop, laptop or server, core operating system and application files should never change unless they’re being patched or upgraded. If those files are compromised by malware or are replaced with older, deprecated versions, new threats and vulnerabilities can make their way onto your technology assets, and the results can be devastating. You need to know when files change, the contextual information to understand why, and most of all, the assurance that files are not compromised by rootkits, trojans or other malware.

  • Please enter your details to access our content.
  • The URL from which the user came to your site
  • This field is for validation purposes and should be left unchanged.