Capabilities Overview: File Integrity Monitoring (FIM) and File Reputation Service
Despite every effort to maintain good access control, critical static files will change on endpoints in your environment. While some files will change simply as a part of using a desktop, laptop or server, core operating system and application files should never change unless they’re being patched or upgraded. If those files are compromised by malware or are replaced with older, deprecated versions, new threats and vulnerabilities can make their way onto your technology assets, and the results can be devastating. You need to know when files change, the contextual information to understand why, and most of all, the assurance that files are not compromised by rootkits, trojans or other malware.