File Integrity Monitoring (im_fim)
This module is capable of scanning files and directories and reporting detected changes and deletions. On the first scan, the checksum of each file is recorded. This checksum is then compared to the checksum value calculated during successive scans. The im_fim module works on the filesystem level, so it only has access to file information such as ownership and last modification date, and no information about which user made a change.
To examine the supported platforms, see the list of installer packages in the Available Modules chapter. |
Files are checked periodically, not in real-time. If there are multiple changes between two scans, only the cumulative effect is logged. For example, if one user modifies a file and another user reverts the changes before the next scan occurs, only the change in modification time is detected.
For real-time monitoring, auditing must be enabled on the host operating system. See the File Integrity Monitoring chapter in the User Guide for more information.
Configuration
The im_fim module accepts the following directives in addition to the common module directives. The File directive is required.
Required directives
The following directives are required for the module to start.
This mandatory directive specifies the name of the input file to scan. It must be a string type expression. See the im_file File directive for more details on how files can be specified. Wildcards are supported. More than one occurrence of the File directive can be used. |
Optional directives
This specifies the digest method (hash function) to be used to calculate the checksum.
The default is |
|||||||||||||||||||||
This boolean directive specifies whether the backslash ( |
|||||||||||||||||||||
This directive can specify a file or a set of files (using wildcards) to be excluded from the scan. More than one occurrence of the Exclude directive can be specified. |
|||||||||||||||||||||
This directive can be used to specify an upper file size limit, in bytes. The checksum calculation will be skipped for files that exceed this limit, and changes will only be reported based on the file name and attributes. |
|||||||||||||||||||||
|
|||||||||||||||||||||
If set to
|
|||||||||||||||||||||
This directive specifies whether the module should treat symlinked directories and files as regular directories and files.
If the directive is |
|||||||||||||||||||||
This directive specifies how long the module will wait between scans for modifications, in seconds.
The default is 86400 seconds (1 day).
The value of ScanInterval can be set to |
Functions
The following functions are exported by im_fim.
- boolean
is_scanning()
-
Returns TRUE if scanning is in progress.
Procedures
The following procedures are exported by im_fim.
start_scan();
-
Start the file integrity scan. This could be invoked from the Schedule block, for example.
Fields
The following fields are used by im_fim.
$raw_event
(type: string)-
A list of event fields in key-value pairs.
$Digest
(type: string)-
The calculated digest (checksum) value.
$DigestName
(type: string)-
The name of the digest used to calculate the checksum value (for example,
SHA1
).
$EventTime
(type: datetime)-
The time when the modification was detected.
$EventType
(type: string)-
One of the following values:
CHANGE
,DELETE
,RENAME
, orNEW
.
$FileName
(type: string)-
The name of the file that the changes were detected on.
$FileSize
(type: integer)-
The size of the file in bytes after the modification.
$Hostname
(type: string)-
The name of the originating computer.
$ModificationTime
(type: datetime)-
The modification time (mtime) of the file when the change is detected.
$Object
(type: string)-
One of the following values:
DIRECTORY
orFILE
.
$PrevDigest
(type: string)-
The calculated digest (checksum) value from the previous scan.
$PrevFileName
(type: string)-
The name of the file from the previous scan.
$PrevFileSize
(type: integer)-
The size of the file in bytes from the previous scan.
$PrevModificationTime
(type: datetime)-
The modification time (mtime) of the file from the previous scan.
$Severity
(type: string)-
The severity name:
WARNING
.
$SeverityValue
(type: integer)-
The WARNING severity level value:
3
.
Examples
With this configuration, the NXLog agent recursively monitors the specified directories and follows any symbolic links in the directories. Scans will occur every 3600 seconds (hourly).
<Input fim>
Module im_fim
File "/etc/*"
Exclude "/etc/mtab"
File "/bin/*"
File "/sbin/*"
File "/usr/bin/*"
File "/usr/sbin/*"
Recursive TRUE
ScanInterval 3600
FollowSymlinks TRUE
</Input>
The im_fim module provides a start_scan() procedure that can be called to invoke the scan. The following configuration sets ScanInterval to zero to disable periodic scanning and uses a Schedule block instead to trigger the scan every day at midnight.
<Input fim>
Module im_fim
File "/bin/*"
File "/sbin/*"
File "/usr/bin/*"
File "/usr/sbin/*"
Recursive TRUE
ScanInterval 0
<Schedule>
When @daily
Exec start_scan();
</Schedule>
</Input>