Azure file_integrity_monitoring Mappings

File integrity monitoring (FIM), also known as change monitoring, examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. File Integrity Monitoring (FIM) informs you when changes occur to sensitive areas in your resources, so you can investigate and address unauthorized activity.

Mappings

Capability ID Capability Description Category Value ATT&CK ID ATT&CK Name Notes
file_integrity_monitoring File Integrity Monitoring detect significant T1053 Scheduled Task/Job
file_integrity_monitoring File Integrity Monitoring detect partial T1053.001 At (Linux)
Comments
This control may detect changes to the Windows registry upon creation or modification of scheduled tasks. This control may also detect changes to files used by cron or systemd to create/modify scheduled tasks. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
References
    file_integrity_monitoring File Integrity Monitoring detect partial T1053.002 At (Windows)
    Comments
    This control may detect changes to the Windows registry upon creation or modification of scheduled tasks. This control may also detect changes to files used by cron or systemd to create/modify scheduled tasks. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
    References
      file_integrity_monitoring File Integrity Monitoring detect partial T1053.003 Cron
      Comments
      This control may detect changes to the Windows registry upon creation or modification of scheduled tasks. This control may also detect changes to files used by cron or systemd to create/modify scheduled tasks. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
      References
        file_integrity_monitoring File Integrity Monitoring detect partial T1053.005 Scheduled Task
        Comments
        This control may detect changes to the Windows registry upon creation or modification of scheduled tasks. This control may also detect changes to files used by cron or systemd to create/modify scheduled tasks. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
        References
          file_integrity_monitoring File Integrity Monitoring detect partial T1053.006 Systemd Timers
          Comments
          This control may detect changes to the Windows registry upon creation or modification of scheduled tasks. This control may also detect changes to files used by cron or systemd to create/modify scheduled tasks. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
          References
            file_integrity_monitoring File Integrity Monitoring detect minimal T1098 Account Manipulation
            file_integrity_monitoring File Integrity Monitoring detect partial T1098.004 SSH Authorized Keys
            Comments
            This control may detect changes to the SSH authorized keys file which may indicate establishment of persistence. This control at worst scans for changes on an hourly basis.
            References
              file_integrity_monitoring File Integrity Monitoring detect partial T1547 Boot or Logon Autostart Execution
              file_integrity_monitoring File Integrity Monitoring detect partial T1547.001 Registry Run Keys / Startup Folder
              Comments
              This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
              References
                file_integrity_monitoring File Integrity Monitoring detect partial T1547.002 Authentication Package
                Comments
                This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
                References
                  file_integrity_monitoring File Integrity Monitoring detect partial T1547.003 Time Providers
                  Comments
                  This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
                  References
                    file_integrity_monitoring File Integrity Monitoring detect partial T1547.004 Winlogon Helper DLL
                    Comments
                    This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
                    References
                      file_integrity_monitoring File Integrity Monitoring detect partial T1547.005 Security Support Provider
                      Comments
                      This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
                      References
                        file_integrity_monitoring File Integrity Monitoring detect partial T1547.006 Kernel Modules and Extensions
                        Comments
                        This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
                        References
                          file_integrity_monitoring File Integrity Monitoring detect partial T1547.008 LSASS Driver
                          Comments
                          This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
                          References
                            file_integrity_monitoring File Integrity Monitoring detect partial T1547.009 Shortcut Modification
                            Comments
                            This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
                            References
                              file_integrity_monitoring File Integrity Monitoring detect partial T1547.010 Port Monitors
                              Comments
                              This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
                              References
                                file_integrity_monitoring File Integrity Monitoring detect partial T1547.012 Print Processors
                                Comments
                                This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
                                References
                                  file_integrity_monitoring File Integrity Monitoring detect partial T1037 Boot or Logon Initialization Scripts
                                  file_integrity_monitoring File Integrity Monitoring detect partial T1037.001 Logon Script (Windows)
                                  Comments
                                  This control may detect changes to the Windows registry upon creation or modification of logon scripts. This control at worst scans for changes on an hourly basis.
                                  References
                                    file_integrity_monitoring File Integrity Monitoring detect partial T1037.003 Network Logon Script
                                    Comments
                                    This control may detect changes to the Windows registry upon creation or modification of logon scripts. This control at worst scans for changes on an hourly basis.
                                    References
                                      file_integrity_monitoring File Integrity Monitoring detect partial T1543 Create or Modify System Process
                                      file_integrity_monitoring File Integrity Monitoring detect partial T1543.002 Systemd Service
                                      Comments
                                      This control may detect changes to the Windows registry upon creation or modification of Windows services. This control may also detect changes to files used by systemd to create/modify systemd services. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
                                      References
                                        file_integrity_monitoring File Integrity Monitoring detect partial T1543.003 Windows Service
                                        Comments
                                        This control may detect changes to the Windows registry upon creation or modification of Windows services. This control may also detect changes to files used by systemd to create/modify systemd services. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
                                        References
                                          file_integrity_monitoring File Integrity Monitoring detect partial T1546 Event Triggered Execution
                                          Comments
                                          The detection score for this technique was assessed as Partial because it doesn't detect some of the sub-techniques of this technique such as Windows Management Instrumentation (WMI) Event Subscription and Trap sub-techniques. Additionally for some sub-techniques, this control can be noisy.
                                          References
                                          file_integrity_monitoring File Integrity Monitoring detect partial T1546.001 Change Default File Association
                                          Comments
                                          This control may detect changes to the Windows registry or files that indicate event triggered execution. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
                                          References
                                            file_integrity_monitoring File Integrity Monitoring detect partial T1546.002 Screensaver
                                            Comments
                                            This control may detect changes to the Windows registry or files that indicate event triggered execution. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
                                            References
                                              file_integrity_monitoring File Integrity Monitoring detect partial T1546.004 .bash_profile and .bashrc
                                              Comments
                                              This control may detect changes to the Windows registry or files that indicate event triggered execution. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
                                              References
                                                file_integrity_monitoring File Integrity Monitoring detect partial T1546.007 Netsh Helper DLL
                                                Comments
                                                This control may detect changes to the Windows registry or files that indicate event triggered execution. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
                                                References
                                                  file_integrity_monitoring File Integrity Monitoring detect partial T1546.008 Accessibility Features
                                                  Comments
                                                  This control may detect changes to the Windows registry or files that indicate event triggered execution. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
                                                  References
                                                    file_integrity_monitoring File Integrity Monitoring detect partial T1546.009 AppCert DLLs
                                                    Comments
                                                    This control may detect changes to the Windows registry or files that indicate event triggered execution. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
                                                    References
                                                      file_integrity_monitoring File Integrity Monitoring detect partial T1546.011 Application Shimming
                                                      Comments
                                                      This control may detect changes to the Windows registry or files that indicate event triggered execution. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
                                                      References
                                                        file_integrity_monitoring File Integrity Monitoring detect partial T1546.012 Image File Execution Options Injection
                                                        Comments
                                                        This control may detect changes to the Windows registry or files that indicate event triggered execution. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
                                                        References
                                                          file_integrity_monitoring File Integrity Monitoring detect partial T1546.013 PowerShell Profile
                                                          Comments
                                                          This control may detect changes to the Windows registry or files that indicate event triggered execution. The specificity of registry keys and files used in creation or modification of these scheduled tasks may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
                                                          References
                                                            file_integrity_monitoring File Integrity Monitoring detect minimal T1546.010 AppInit DLLs
                                                            Comments
                                                            The detection score for this group of sub-techniques is assessed as Minimal due to the accuracy component of the score. The registry keys which are modified as a result of these sub-techniques can change frequently or are too numerous to monitor and therefore can result in significant amount of false positives.
                                                            References
                                                              file_integrity_monitoring File Integrity Monitoring detect minimal T1546.015 Component Object Model Hijacking
                                                              Comments
                                                              The detection score for this group of sub-techniques is assessed as Minimal due to the accuracy component of the score. The registry keys which are modified as a result of these sub-techniques can change frequently or are too numerous to monitor and therefore can result in significant amount of false positives.
                                                              References
                                                                file_integrity_monitoring File Integrity Monitoring detect minimal T1574 Hijack Execution Flow
                                                                file_integrity_monitoring File Integrity Monitoring detect partial T1574.006 LD_PRELOAD
                                                                Comments
                                                                This control may detect changes to the ld.so.preload file which may indicate an attempt to hijack execution flow. This sub-technique may also be utilized through an environment variable which this control may not detect. This control at worst scans for changes on an hourly basis.
                                                                References
                                                                  file_integrity_monitoring File Integrity Monitoring detect minimal T1137 Office Application Startup
                                                                  file_integrity_monitoring File Integrity Monitoring detect partial T1137.002 Office Test
                                                                  Comments
                                                                  This control may detect changes to the Windows registry to establish persistence with the Office Test sub-technique. The specificity of registry keys involved may reduce the false positive rate. This control at worst scans for changes on an hourly basis.
                                                                  References
                                                                    file_integrity_monitoring File Integrity Monitoring detect minimal T1548 Abuse Elevation Control Mechanism
                                                                    file_integrity_monitoring File Integrity Monitoring detect minimal T1548.002 Bypass User Account Control
                                                                    Comments
                                                                    Some UAC bypass methods rely on modifying specific, user-accessible Registry settings that can be monitored using this control. Overall, there are numerous other bypass methods that do not result in Registry modification that this control will not be effective in detection resulting in a low detection coverage factor.
                                                                    References
                                                                      file_integrity_monitoring File Integrity Monitoring detect partial T1548.003 Sudo and Sudo Caching
                                                                      Comments
                                                                      This control may detect changes to the sudoers file which may indicate privilege escalation. This control at worst scans for changes on an hourly basis.
                                                                      References
                                                                        file_integrity_monitoring File Integrity Monitoring detect partial T1556 Modify Authentication Process
                                                                        Comments
                                                                        This control is effective for detecting the Registry and file system artifacts that are generated during the execution of some variations of this technique while minimizing false positives due to the locations being monitored changing infrequently (e.g. /etc/pam.d/).
                                                                        References
                                                                        file_integrity_monitoring File Integrity Monitoring detect partial T1556.002 Password Filter DLL
                                                                        Comments
                                                                        The Registry key used to register a Password Filter DLL can be monitored for changes using this control providing substantial coverage of this sub-technique. This key should not change often and therefore false positives should be minimal. This control at worst scans for changes on an hourly basis.
                                                                        References
                                                                          file_integrity_monitoring File Integrity Monitoring detect partial T1556.003 Pluggable Authentication Modules
                                                                          Comments
                                                                          The PAM configuration and module paths (/etc/pam.d/) can be monitored for changes using this control. The files in this path should not change often and therefore false positives should be minimal. This control at worst scans for changes on an hourly basis.
                                                                          References
                                                                            file_integrity_monitoring File Integrity Monitoring detect minimal T1003 OS Credential Dumping
                                                                            Comments
                                                                            Most credential dumping operations do not require modifying resources that can be detected by this control (i.e. Registry and File system) and therefore its coverage is minimal.
                                                                            References
                                                                            file_integrity_monitoring File Integrity Monitoring detect partial T1003.001 LSASS Memory
                                                                            Comments
                                                                            This control can be used to detect the Windows Security Support Provider (SSP) DLLs variation of this sub-technique by monitoring the Registry keys used to register these DLLs. These keys should change infrequently and therefore false positives should be minimal.
                                                                            References
                                                                              file_integrity_monitoring File Integrity Monitoring detect partial T1222 File and Directory Permissions Modification
                                                                              file_integrity_monitoring File Integrity Monitoring detect partial T1222.001 Windows File and Directory Permissions Modification
                                                                              Comments
                                                                              This control can detect changes to the permissions of Windows and Linux files and can be used to detect modifications to sensitive directories and files that shouldn't change frequently. This control at worst scans for changes on an hourly basis.
                                                                              References
                                                                                file_integrity_monitoring File Integrity Monitoring detect partial T1222.002 Linux and Mac File and Directory Permissions Modification
                                                                                Comments
                                                                                This control can detect changes to the permissions of Windows and Linux files and can be used to detect modifications to sensitive directories and files that shouldn't change frequently. This control at worst scans for changes on an hourly basis.
                                                                                References
                                                                                  file_integrity_monitoring File Integrity Monitoring detect minimal T1562 Impair Defenses
                                                                                  Comments
                                                                                  Due to low detection coverage, this technique is scored as minimal.
                                                                                  References
                                                                                  file_integrity_monitoring File Integrity Monitoring detect minimal T1562.001 Disable or Modify Tools
                                                                                  Comments
                                                                                  This control can be used to monitor Registry keys related to security software or event logging processes that can detect when an adversary attempts to disable these tools via modifying or deleting Registry keys. A majority of the cited procedure examples for this sub-technique are related to killing security processes rather than modifying the Registry, and therefore the detection coverage for this control is low.
                                                                                  References
                                                                                    file_integrity_monitoring File Integrity Monitoring detect minimal T1562.004 Disable or Modify System Firewall
                                                                                    Comments
                                                                                    There are numerous ways depending on the operating system that these sub-techniques can be accomplished. Monitoring the Windows Registry is one way depending on the procedure chosen to implement the sub-technique and therefore the overall coverage is low.
                                                                                    References
                                                                                      file_integrity_monitoring File Integrity Monitoring detect minimal T1562.006 Indicator Blocking
                                                                                      Comments
                                                                                      There are numerous ways depending on the operating system that these sub-techniques can be accomplished. Monitoring the Windows Registry is one way depending on the procedure chosen to implement the sub-technique and therefore the overall coverage is low.
                                                                                      References
                                                                                        file_integrity_monitoring File Integrity Monitoring detect partial T1553 Subvert Trust Controls
                                                                                        Comments
                                                                                        This control can be used to detect a subset of this technique's sub-techniques while minimizing the false positive rate.
                                                                                        References
                                                                                        file_integrity_monitoring File Integrity Monitoring detect partial T1553.003 SIP and Trust Provider Hijacking
                                                                                        Comments
                                                                                        This control can detect modifications made to the Registry keys used to register Windows Subject Interface Packages (SIPs). Because this sub-technique can be accomplished without modifying the Registry via DLL Search Order Hijacking, it has been scored as Partial. The related Registry keys should not change often and therefore the false positive rate should be minimal. This control at worst scans for changes on an hourly basis.
                                                                                        References
                                                                                          file_integrity_monitoring File Integrity Monitoring detect partial T1553.004 Install Root Certificate
                                                                                          Comments
                                                                                          This control can be used to detect when the system root certificates has changed by detecting the corresponding Registry or File system modifications that occur as a result. These root certificates should not change often and therefore the false positive rate is minimal. This control at worst scans for changes on an hourly basis.
                                                                                          References