File Integrity Monitoring Tutorial

File Integrity Monitoring Tutorial

June 1st, 2021

Hello this is Mike Janulaitis founder of Corner Bowl Software. In this article I am going to show you the File Integrity Monitor feature found in Corner Bowl Event Log Manager 2023.

Table of Contents


For those of you that are unfamiliar with File Integrity Monitoring or FIM, FIM is the process of validating file contents remain unchanged and if changed or deleted, who made the changes and from what IP did they make the changes. Corner Bowl offers two different methods to implement File Integrity Monitoring, baseline scanning and Object Access Auditing. Baseline scanning is supported on both Windows and Linux/Unix while Object Access Auditing is only available on Windows.


To access the File Integrity Monitoring functionality within Corner Bowl Event Log Manager you will need a Corner Bowl Server Manager license.

Object Access Auditing

Object Access Auditing enables you to know in real-time the instant a user accesses, modifies or deletes a file. First, we need to configure Object Access Auditing on the target server.

Configuring Object Access Auditing

Next, we need to configure the target folder.

  1. Open Explorer then navigate to the target folder, right click and select Properties.
  2. From the File Properties dialog select the Security tab then click the Advanced button.
    File Properties
    File Properties
  3. From the Advanced Security Settings dialog select the Auditing tab. If you are prompted to continue, click the Continue button. Next click the Add button.
    Advanced Security Settings
    Advanced Security Settings
  4. From the Auditing Entry dialog click the Select a principal link.
    Auditing Entry
    Auditing Entry
  5. From the Select User or Group dialog type EVERYONE then click OK.
    Select User
    Select User
  6. Back in the Auding Entry dialog check all of the options then click OK.
  7. Back in the Advanced Security Settings dialog verify the new entry was added then click OK.
  8. Finally, back in the File Properties dialog click OK.
  9. For more information see Microsoft's documentation.

Configuring Real-Time File System Auditing

By default, a Real-Time Audit File System template is pre-installed in the following location:

Templates/Sample Templates/Real-Time Monitors/Real-Time Audit File System

If the template cannot be found it is most likely because you already installed the software prior to the release of this template.

To create the template, from the menu bar select Tools | Create Default Objects.

Testing Real-Time File System Auditing

To test we can simply create a new text file in the target directory, open the file in a text editor, modify and save it, then finally delete the file. Once complete, you will see 4 messages in your email. One for the creation of the file, one for the update of the file contents and then Microsoft fires two absolutely identical Events for the delete operation which is unfortunate however the end result is the same, a notification is received.

Baseline Scanning

Baseline scanning enables you to create a snapshot of a file including metadata such as the last date accessed, last modified date, creation date, file attributes, permissions, contents hash and file size. Future scans check the current file against the baseline then trigger an alert is any of the metadata has changed.

Configuring Baseline Scanning

Next let's configure the baseline scanning File Integrity Monitor template. The File Integrity Monitor template can be used to track changes to the actual file. The software creates a baseline then polls the file system on either Windows, Linux or other Unix operating system. Once a change is detected the monitor triggers and an alert is sent.

  1. To create a new Template, from the menu bar select File | New | Template | File and Directory Monitors | File Integrity Monitor. The New File Integrity Monitor view displays.
  2. Specify a friendly name.
  3. Specify the frequency to poll the file for changes. You have the option to poll as fast as every second or as slow as weekly.
  4. Select the Directories tab, select the target host, then navigate to the target directory and click the Add button.
    Select Directories
    Select Directories
  5. Next select the Files and Sub-Directories tab.
  6. You have option to Monitor Sub-directories which sets the trigger status on each sub-directory rather than the target directory.
  7. You have the option to Recursively scan sub-directories.
  8. Then finally you can Exclude sub-directories, Target files that match masks and Ignore files that match masks.
    Select Files and Sub-Directories
    Select Files and Sub-Directories
  9. Next select the Options tab.
  10. Use this tab to choose the options to check.
    Please note the file attributes Read Only and Hidden along with Permissions are only supported when running against Windows Shares. All other options are supported by both Windows and Linux/Unix.
  11. Next select the Actions tab
  12. Under the On Trigger drop down select the email action.
  13. Finally, use the Hosts drop down to assign the target host then click Save.
    Actions and Host Assignment
    Actions and Host Assignment

Testing Baseline Scanning


That's File Integrity Monitoring with Corner Bowl Software. Thank you for reading. I hope this has helped you better understand the File Integrity Monitoring capabilities of Corner Bowl Software.

Last Updated: June 1st, 2021