Azure File Integrity Monitoring Capability Group

All Mappings

Capability ID Capability Description Category Value ATT&CK ID ATT&CK Name Notes
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect minimal T1003 OS Credential Dumping
Comments
Most credential dumping operations do not require modifying resources that can be detected by this control (i.e. Registry and File system) and therefore its coverage is minimal.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect minimal T1098 Account Manipulation
Comments
This control can detect account manipulation.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect minimal T1137 Office Application Startup
Comments
This control can detect peristence via office application startup.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect minimal T1546.010 AppInit DLLs
Comments
The detection score for this group of sub-techniques is assessed as Minimal due to the accuracy component of the score. The registry keys which are modified as a result of these sub-techniques can change frequently or are too numerous to monitor and therefore can result in significant amount of false positives.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect minimal T1546.015 Component Object Model Hijacking
Comments
The detection score for this group of sub-techniques is assessed as Minimal due to the accuracy component of the score. The registry keys which are modified as a result of these sub-techniques can change frequently or are too numerous to monitor and therefore can result in significant amount of false positives.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect minimal T1548 Abuse Elevation Control Mechanism
Comments
This control can detect abuse of elevation control mechanisms.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect minimal T1548.002 Bypass User Account Control
Comments
Some UAC bypass methods rely on modifying specific, user-accessible Registry settings that can be monitored using this control. Overall, there are numerous other bypass methods that do not result in Registry modification that this control will not be effective in detection resulting in a low detection coverage factor.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect minimal T1562 Impair Defenses
Comments
Due to low detection coverage, this technique is scored as minimal.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect minimal T1562.001 Disable or Modify Tools
Comments
This control can be used to monitor Registry keys related to security software or event logging processes that can detect when an adversary attempts to disable these tools via modifying or deleting Registry keys. A majority of the cited procedure examples for this sub-technique are related to killing security processes rather than modifying the Registry, and therefore the detection coverage for this control is low.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect minimal T1562.004 Disable or Modify System Firewall
Comments
There are numerous ways depending on the operating system that these sub-techniques can be accomplished. Monitoring the Windows Registry is one way depending on the procedure chosen to implement the sub-technique and therefore the overall coverage is low.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect minimal T1562.006 Indicator Blocking
Comments
There are numerous ways depending on the operating system that these sub-techniques can be accomplished. Monitoring the Windows Registry is one way depending on the procedure chosen to implement the sub-technique and therefore the overall coverage is low.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect minimal T1574 Hijack Execution Flow
Comments
This control can detect hijacked execution flow.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1003.001 LSASS Memory
Comments
This control can be used to detect the Windows Security Support Provider (SSP) DLLs variation of this sub-technique by monitoring the Registry keys used to register these DLLs. These keys should change infrequently and therefore false positives should be minimal.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1036.007 Double File Extension
Comments
This control can detect when files with two file extensions are created.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1036.008 Masquerade File Type
Comments
This control can detect if files are created or edited where the header and extension do not match.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1037 Boot or Logon Initialization Scripts
Comments
This control can detect abuse of boot or logon initialization scripts.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1037.001 Logon Script (Windows)
Comments
This control may detect changes to the Windows registry upon creation or modification of logon scripts. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1037.003 Network Logon Script
Comments
This control may detect changes to the Windows registry upon creation or modification of logon scripts. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1053.001 At (Linux)
Comments
This control may detect changes to the Windows registry upon creation or modification of scheduled tasks. This control may also detect changes to files used by cron or systemd to create/modify scheduled tasks. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1053.002 At
Comments
This control may detect changes to the Windows registry upon creation or modification of scheduled tasks. This control may also detect changes to files used by cron or systemd to create/modify scheduled tasks. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1053.003 Cron
Comments
This control may detect changes to the Windows registry upon creation or modification of scheduled tasks. This control may also detect changes to files used by cron or systemd to create/modify scheduled tasks. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1053.005 Scheduled Task
Comments
This control may detect changes to the Windows registry upon creation or modification of scheduled tasks. This control may also detect changes to files used by cron or systemd to create/modify scheduled tasks. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1053.006 Systemd Timers
Comments
This control may detect changes to the Windows registry upon creation or modification of scheduled tasks. This control may also detect changes to files used by cron or systemd to create/modify scheduled tasks. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1070.007 Clear Network Connection History and Configurations
Comments
This control can detect changes to files associated with this technique.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1070.008 Clear Mailbox Data
Comments
This control can detect changes to files associated with this technique.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1070.009 Clear Persistence
Comments
This control can detect changes to files associated with this technique.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1070.010 Relocate Malware
Comments
This control can detect changes to files associated with this technique.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1098.004 SSH Authorized Keys
Comments
This control may detect changes to the SSH authorized keys file which may indicate establishment of persistence. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1137.002 Office Test
Comments
This control may detect changes to the Windows registry to establish persistence with the Office Test sub-technique. The specificity of registry keys involved may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1222 File and Directory Permissions Modification
Comments
This control can detect file and directory permissions modification.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1222.001 Windows File and Directory Permissions Modification
Comments
This control can detect changes to the permissions of Windows and Linux files and can be used to detect modifications to sensitive directories and files that shouldn't change frequently. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1222.002 Linux and Mac File and Directory Permissions Modification
Comments
This control can detect changes to the permissions of Windows and Linux files and can be used to detect modifications to sensitive directories and files that shouldn't change frequently. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1505.004 IIS Components
Comments
This control can detect when files associated with the technique are created or modified, such as %windir%\system32\inetsrv\config\applicationhost.config.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1505.005 Terminal Services DLL
Comments
This control can detect when files or registry keys associated with this technique are created or modified, such as termsrv.dll and ServiceDll.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1543 Create or Modify System Process
Comments
This control can detect creation or modification of system-level processes.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1543.002 Systemd Service
Comments
This control may detect changes to the Windows registry upon creation or modification of Windows services. This control may also detect changes to files used by systemd to create/modify systemd services. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1543.003 Windows Service
Comments
This control may detect changes to the Windows registry upon creation or modification of Windows services. This control may also detect changes to files used by systemd to create/modify systemd services. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1546 Event Triggered Execution
Comments
The detection score for this technique was assessed as Partial because it doesn't detect some of the sub-techniques of this technique such as Windows Management Instrumentation (WMI) Event Subscription and Trap sub-techniques. Additionally for some sub-techniques, this control can be noisy.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1546.001 Change Default File Association
Comments
This control may detect changes to the Windows registry or files that indicate event triggered execution. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1546.002 Screensaver
Comments
This control may detect changes to the Windows registry or files that indicate event triggered execution. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1546.004 Unix Shell Configuration Modification
Comments
This control may detect changes to the Windows registry or files that indicate event triggered execution. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1546.007 Netsh Helper DLL
Comments
This control may detect changes to the Windows registry or files that indicate event triggered execution. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1546.008 Accessibility Features
Comments
This control may detect changes to the Windows registry or files that indicate event triggered execution. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1546.009 AppCert DLLs
Comments
This control may detect changes to the Windows registry or files that indicate event triggered execution. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1546.011 Application Shimming
Comments
This control may detect changes to the Windows registry or files that indicate event triggered execution. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1546.012 Image File Execution Options Injection
Comments
This control may detect changes to the Windows registry or files that indicate event triggered execution. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1546.013 PowerShell Profile
Comments
This control may detect changes to the Windows registry or files that indicate event triggered execution. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1546.016 Installer Packages
Comments
This control can detect event triggered execution via installer packages.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1546.017 Udev Rules
Comments
This control can detect event triggered execution via udev rules.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1547 Boot or Logon Autostart Execution
Comments
This control can detect boot or logon autostart execution.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1547.001 Registry Run Keys / Startup Folder
Comments
This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1547.002 Authentication Package
Comments
This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1547.003 Time Providers
Comments
This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1547.004 Winlogon Helper DLL
Comments
This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1547.005 Security Support Provider
Comments
This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1547.006 Kernel Modules and Extensions
Comments
This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1547.008 LSASS Driver
Comments
This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1547.009 Shortcut Modification
Comments
This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1547.010 Port Monitors
Comments
This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1547.012 Print Processors
Comments
This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1547.014 Active Setup
Comments
This control can detect commands or registry key modifications associated with Active Setup such as HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1548.003 Sudo and Sudo Caching
Comments
This control may detect changes to the sudoers file which may indicate privilege escalation. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1553 Subvert Trust Controls
Comments
This control can be used to detect a subset of this technique's sub-techniques while minimizing the false positive rate.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1553.003 SIP and Trust Provider Hijacking
Comments
This control can detect modifications made to the Registry keys used to register Windows Subject Interface Packages (SIPs). Because this sub-technique can be accomplished without modifying the Registry via DLL Search Order Hijacking, it has been scored as Partial. The related Registry keys should not change often and therefore the false positive rate should be minimal. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1553.004 Install Root Certificate
Comments
This control can be used to detect when the system root certificates has changed by detecting the corresponding Registry or File system modifications that occur as a result. These root certificates should not change often and therefore the false positive rate is minimal. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1556 Modify Authentication Process
Comments
This control is effective for detecting the Registry and file system artifacts that are generated during the execution of some variations of this technique while minimizing false positives due to the locations being monitored changing infrequently (e.g. /etc/pam.d/).
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1556.002 Password Filter DLL
Comments
The Registry key used to register a Password Filter DLL can be monitored for changes using this control providing substantial coverage of this sub-technique. This key should not change often and therefore false positives should be minimal. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1556.003 Pluggable Authentication Modules
Comments
The PAM configuration and module paths (/etc/pam.d/) can be monitored for changes using this control. The files in this path should not change often and therefore false positives should be minimal. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1556.007 Hybrid Identity
Comments
This control can monitor for suspicious modification of files associated with hybrid identity authentication processes, such as configuration files.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1556.008 Network Provider DLL
Comments
This control can monitor for creation or changes to registry keys associated with network provider DLL such as HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\\NetworkProvider and HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\NetworkProvider\Order.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1564.008 Email Hiding Rules
Comments
This control can detect when files are modified related to email rules such as RulesActiveState.plist, SyncedRules.plist, UnsyncedRules.plist, and MessageRules.plist on MacOS.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1564.009 Resource Forking
Comments
This control can detect when files are created or modified related to resource forking.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1564.012 File/Path Exclusions
Comments
This control can detect when files are created in folders associated with or spoofing that of trusted applications.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1574.006 Dynamic Linker Hijacking
Comments
This control may detect changes to the ld.so.preload file which may indicate an attempt to hijack execution flow. This sub-technique may also be utilized through an environment variable which this control may not detect. This control at worst scans for changes on an hourly basis.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1574.007 Path Interception by PATH Environment Variable
Comments
This control can detect file changes on VMs indicative of Path Interception by PATH Environment Variable.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1574.008 Path Interception by Search Order Hijacking
Comments
This control can detect file changes on VMs indicative of Path Interception by Search Order Hijacking.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1574.009 Path Interception by Unquoted Path
Comments
This control can detect file changes on VMs indicative of Path Interception by Unquoted Path.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect partial T1574.014 AppDomainManager
Comments
This control can detect file changes on VMs indicative of hijacking of the AppDomainManager.
References
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring detect significant T1053 Scheduled Task/Job
Comments
This control can detect scheduled tasks/jobs.
References

Capabilities

Capability ID Capability Name Number of Mappings
file_integrity_monitoring Microsoft Defender for Cloud: File Integrity Monitoring 79