File Integrity Monitoring for Windows and Linux. A Short List of Vulnerable Files
Security teams won’t be using file integrity monitoring (FIM) as their first line of defence for network protection. Tools like daily vulnerability audits and twice-yearly penetration testing will be the main border control assets that you employ. But just like a country can find it has leaky borders, it’s good practice to make sure that your IT assets don’t have any blackhat activities lurking within your network. And one of the final ways of checking every neighbourhood in your network is FIM.