T-Guard Official Documentation
  • Introduction
    • About T-Guard
    • Architecture
  • Installation
    • Prerequisites
    • Installation Steps
    • Integration Steps
    • Use Case
  • User Manual
    • Wazuh (SIEM)
      • Accessing Wazuh Dashboard
      • Deploying Wazuh Agents
      • Wazuh Fields Description
      • Decoders and Rulers
      • Threat Detection and Response
    • DFIR-IRIS
      • DFIR-IRIS (Digital Forensic Incident Response - IRIS)
      • Accessing DFIR-IRIS Dashboard
      • Using IRIS
  • Demo Testing
    • Brute-force Attacks
    • Malware Detection
    • File Integrity Monitoring
Powered by GitBook
On this page
  1. Demo Testing

File Integrity Monitoring

PreviousMalware Detection

Last updated 1 year ago

File Integrity Monitoring is a key feature of our security operations center (SOC) that allows us to monitor specific folders for any additions, deletions, or modifications to files. This feature also monitors Windows registry keys for changes, providing an additional layer of security.

By monitoring these changes, the File Integrity Monitoring can detect any malicious activity happening in the background and provide an alert to the SOC team. This feature plays a crucial role in detecting and preventing any unauthorized changes to the system, ensuring the integrity and security of the network.