File Integrity Monitoring (FIM) Software Tool
  • Call:  801-910-4256
  • Login

Corner Bowl File Integrity Monitor

Enterprise File Integrity Monitoring (FIM) Software Tool for IT Professionals

a sub-component of Server Manager and Disk Monitor

Start your Free File Integrity Monitor Trial with Support Now
Very easy to setup and use. Most products are overly complex and you don't use all/any of the features, but that is not the case with Corner Bowl. Price was also very good. Support response is excellent! Weekly reports give us a good idea of what is going on with the machines in the system and it hits all of the auditors check boxes.
Steve Connell
Team Lead
Interstates Control Systems
July 30, 2020

What is Corner Bowl File Integrity Monitor?

Continuously monitor operating system, application and mission critical data files for user access, changes made to file content, attributes and access permissions on both Windows and Linux/Unix servers.

How does Corner Bowl File Integrity Monitor work?

Baseline Scanning

Corner Bowl Software's File Integrity Monitor scans directories using Windows Shares and SSH/SFTP to create file access, file attribute and file content baselines then continually re-scans to let you know when a file is accessed, modified or deleted. Access Permissions are scanned on Windows Servers using WMI.

Real-Time Object Access Auditing

If you want to know the user that modified a file on a Windows Server, enable Object Access Auditing on your Windows Server and you will get notified in real-time the instant a user accesses a file along with the IP address the access was made from. Please note, Object Access Auditing monitoring requires either a Server Manager or an Event Log Manager license.

File Integrity Monitor Video Tutorial

Corner Bowl File Integrity Monitor Screenshots

File Integrity Monitor Detail

File Integrity Monitoring Options

AccessedNotifies you when a file is accessed.
ModifiedNotifies you when a file is modified.
CreatedValidates the file was not replaced with another file that contains a different creation time.
AttributesValidates file attributes such as Hidden and Read-Only have not changed.
Access PermissionsPerforms and exhaustive scan of file permissions then notifies you when any permissions have been added, modified or removed.
File Contents HashPerforms a hash using the file contents then notifies you when any bits have changed.
File ContentsBaselines the entire file contents then validates no bits have changed.
File SizeNotifies you when the file size changes.

Who Requires File Integrity Monitoring?

PCI DSSPayment Card Industry Data Security Standard (Requirement 11.5)[3]
SOXSarbanes-Oxley Act (Section 404)[4]
NERC CIPNERC CIP Standard (CIP-010-2)[5]
FISMAFederal Information Security Management Act (NIST SP800-53 Rev3)[6]
HIPAAHealth Insurance Portability and Accountability Act of 1996 (NIST Publication 800-66)[7]
SANSCritical Security Controls (Control 3)[8]

Source: Wikipedia

Corner Bowl System Component and Network Architecture

Available Notifications, Alerts and Actions

Send Emails
Send custom email alerts and notifications with optional log file attachment support.
Send Microsoft Teams Messages
Send alerts and notifications to Microsoft Teams Channels via Incoming Webhook Connector.
Send SMS Messages
Send text messages through various popular SMS providers such as Twilio.
Launch a Script
Remote launch your own custom Powershell scripts, batch files and executables.
Manage Windows Services
Remote stop, start and restart Windows Services.
Fire SNMP Traps
Need to integrate into your enterprise systems? Fire Simple Network Management Protocol (SNMP) traps when critical events are detected.
Write to File
Write, append and backup schedule reports to HTML, CSV, TXT and PDF file formats.
Write Event Log Entries
Write custom alert and notification messages to any Windows Event Log on any machine.
Send Syslog Messages
Send custom Syslog alerts and notifications. You can even relay Syslog messages to another server.
Display Desktop Notifications
Client/Server architecture enables you to receive real-time notifications on your personal desktop or laptop.

Constant Delivery Pipelines

Create

Automatically apply monitoring, notifications and reporting to new servers and workstations.


Runs scheduled scans on Active Directory or any Directory Service provider then applies configuration templates to discovered machines.

Update

Automatically update and re-apply configurations ensuring new and existing rules are rolled to target groups of machines.


Runs scheduled scans then applies new and updated configuration templates to existing machines.

Delete

Automatically remove hosts from the software when servers or workstations are decommissioned.


Runs scheduled scans then removes machines either not found or not passing custom filter criteria.

System Requirements

Supported Operating Systems
  • Windows Server 2019, 2016, 2012, 2008 R2
  • Windows 10, 8, 7 SP1
Supported Architecture - 64-Bit and 32-Bit

Disk Monitor can be installed on both 64-bit and 32-Bit Windows.

Memory

8 GBs of available memory, 16 GBs suggested when monitoring 100s of endpoints.

Microsoft .NET Framework 4.8

The installation detects if the .Net Framework 4.8 is already installed. If not, the framework is automatically downloaded from Microsoft and then installed. Please note the framework may take a significant amount of time to install. Please be patient while the installation completes.

Domain Administrator Account

To access and manage remote resources Log Manager requires domain administrator credentials. If off-domain, then local administrator credentials. The first time the application is run, the onboarding wizard will prompt you to assign then necessary credentials to the service.

Windows Management Instrumentation (client and server)

Many functions within Internet Server Monitor utilize Microsoft's Windows Management Instrumentation (WMI) API (e.g. Event Log management, CPU and memory monitoring). This software includes options to optimize WMI packet size and performance.

Licensing

Disk Monitor is a sub-component of both our software packages, Corner Bowl Server Manager and Corner Bowl Event Log Manager. To access Disk Monitor functionality either install Corner Bowl Server Manager or Corner Bowl Event Log Manager then apply either a purchased Server Manager or Disk Monitor license.

Corner Bowl Software is sold in node packs. Each unique IP address or hostname that is monitored, scanned or managed by the software is a node.

Corner Bowl Software can be installed on a single host or up to as many hosts as nodes purchased.

For example, a 100 node license would enable an IT professional to install the software on 3 servers with one installation monitoring 50 servers and the other two installations monitoring 25 workstations each for a total of 100 nodes.

After you purchase a license, you have the option through this website or your reseller to upgrade your existing license with more nodes.

Once you have purchased a license, a license key will be emailed to you. If you purchase through a reseller, a claim link will be emailed to you enabling you to retrieve your key from this website. Once you have your key you will register online through the software's management console. If you are installing this software on an Air-Gapped network, you will generate license key files through this website where you will also find detailed instructions on how to apply your Air-Gapped key files.

Start your Free Trial Now
Pricing

Last Updated: June 1st, 2021