Edit

Share via


Enable File Integrity Monitoring

In Defender for Servers Plan 2 in Microsoft Defender for Cloud, the File Integrity Monitoring feature helps to keep enterprise assets and resources secure. It scans and analyzes operating system files, Windows registries, application software, and Linux system files for changes that might indicate an attack.

After you enable Defender for Servers Plan 2, follow the instructions in this article to configure File Integrity Monitoring using the Microsoft Defender for Endpoint agent and agentless machine scanning to collect data.

Note

  • If you use a previous version of File Integrity Monitoring with the Log Analytics agent (Microsoft Monitoring agent (MMA)) or the Azure Monitor agent (AMA), you can migrate to the new File Integrity Monitoring experience.
  • From June 2025 onwards, File Integrity Monitoring powered by Microsoft Defender for Endpoint requires a minimum version. Update the agent as needed.
    • Windows: 10.8760 or later.
    • Linux: 30.124082 or later.

Prerequisites

  • You must enable Defender for Servers Plan 2 on your subscription.

  • You must install the Defender for Endpoint agent through the Defender for Servers extensions on machines you want to monitor.

  • You must connect Non-Azure machines with Azure Arc.

  • You must enable agentless machine scanning on your subscription to gain extra coverage and the ability to monitor custom paths.

  • You need Workspace owner and Security admin permissions to enable and disable File Integrity Monitoring. Security reader permissions can view results.

Verify Defender for Endpoint client version

Before you begin, verify that the Defender for Endpoint client version on your machines is at least the minimum version required for File Integrity Monitoring.

Enable File Integrity Monitoring

File Integrity Monitoring isn't enabled by default. You can enable it in the Microsoft Defender for Cloud portal.

  1. Sign in to the Azure portal.

  2. Navigate to Microsoft Defender for Cloud > Environment settings > relevant subscription.

  3. Locate the Defenders for Servers plan and select Settings.

  4. In the File Integrity Monitoring section, switch the toggle to On.

    Screenshot of how to enable File Integrity Monitoring.

  5. Select Edit configuration.

  6. Select a workspace to store the File Integrity Monitoring data. (Optional) Or, select Create new to create a new workspace.

    Screenshot of the File Integrity Monitoring configuration pane.

  7. Under the Recommended to monitor rule section, select Edit.

  8. Select the files and registries recommended for monitoring.

    Ensure the Status toggle is set to Enabled and select the Change types you want to monitor. By default, all entities recommended for monitoring are selected. You can remove entities from monitoring by selecting the three dot button next to the monitoring rule and then selecting Delete.

    Screenshot that shows the file registries that need to be corrected.

  9. Select Apply to save your changes.

    Screenshot that shows the edit rule screen.

  10. (Optional) Select + Add rule to create a custom rule.

    Screenshot that shows the Add a rule window.

    1. Under the Add new custom rule section, enter a Rule name and (Optional) a Rule description.

    2. Ensure Status toggle is set to Enabled.

    3. Select the Change types and define Entity type and Entity path for your custom rules.

    4. Select Apply to save your changes.

    5. (Optional) Select Delete rule to delete a rule configuration.

  11. Select Apply.

  12. Select Continue.

Review enablement status for File Integrity Monitoring

Review the File Integrity Monitoring enablement to ensure it's correct and all prerequisites are met.

  1. Go to Workload protection > File Integrity Monitoring.

    Screenshot of the File Integrity Monitoring status button.

  2. Select Settings.

    Screenshot of the File Integrity Monitoring page that shows where the settings button is located.

  3. Check for any missing prerequisites.

  4. Select a subscription and review corrective actions for the necessary workspace.

    Screenshot of the File Integrity Monitoring page that shows the missing prerequisites.

  5. Select the checkbox for any required fixes.

  6. Select Apply.

Disable File Integrity Monitoring

If you disable File Integrity Monitoring, no new events are collected. However, the data collected before the disablement, remains in the Log Analytics workspace, in accordance with the workspace retention policy.

Disable as follows:

  1. Sign in to the Azure portal.

  2. Navigate to Microsoft Defender for Cloud > Environment settings > relevant subscription.

  3. Locate the Defenders for Servers plan and select Settings.

  4. In the File Integrity Monitoring section, switch the toggle to Off.

    Screenshot of how to disable File Integrity Monitoring.

  5. Select Apply.

  6. Select Continue.

  7. Select Save.

Next step

  • Events collected for File Integrity Monitoring are included in the data types eligible for the 500-MB benefit for Defender for Servers Plan 2 customers. Learn more about the benefit.
  • Review changes in File Integrity Monitoring.