File Integrity Monitoring (FIM) Monitor Software Tool
  • Call:  801-910-4256
  • Login

Corner Bowl File Integrity Monitor 2022

Enterprise File Integrity Monitoring (FIM) Software Tool for IT Professionals

a sub-component of Server Manager and Disk Monitor

Start your Free File Integrity Monitor Trial with Support Now
The breadth of features is great. Server Manager is great because it allows me to automate some things that I otherwise would have to manually check each day. This is a great product.
Alan Jones
Chief Information Officer
Medical Assurance Company of Mississippi
July 28, 2020

What is Corner Bowl File Integrity Monitor?

Continuously monitor operating system, application and mission critical data files for user access, changes made to file content, attributes and access permissions on both Windows and Linux/Unix servers.

How does Corner Bowl File Integrity Monitor work?

Baseline Scanning

Corner Bowl Software's File Integrity Monitor scans directories using Windows Shares and SSH/SFTP to create file access, file attribute and file content baselines then continually re-scans to let you know when a file is accessed, modified or deleted. Access Permissions are scanned on Windows Servers using WMI.

Real-Time Object Access Auditing

If you want to know the user that modified a file on a Windows Server, enable Object Access Auditing on your Windows Server and you will get notified in real-time the instant a user accesses a file along with the IP address the access was made from. Please note, Object Access Auditing monitoring requires either a Server Manager or an Event Log Manager license.

File Integrity Monitor Video Tutorial

File Integrity Monitoring Options

AccessedNotifies you when a file is accessed.
ModifiedNotifies you when a file is modified.
CreatedValidates the file was not replaced with another file that contains a different creation time.
AttributesValidates file attributes such as Hidden and Read-Only have not changed.
Access PermissionsPerforms and exhaustive scan of file permissions then notifies you when any permissions have been added, modified or removed.
File Contents HashPerforms a hash using the file contents then notifies you when any bits have changed.
File ContentsBaselines the entire file contents then validates no bits have changed.
File SizeNotifies you when the file size changes.

Who Requires File Integrity Monitoring?

PCI DSSPayment Card Industry Data Security Standard (Requirement 11.5)[3]
SOXSarbanes-Oxley Act (Section 404)[4]
NERC CIPNERC CIP Standard (CIP-010-2)[5]
FISMAFederal Information Security Management Act (NIST SP800-53 Rev3)[6]
HIPAAHealth Insurance Portability and Accountability Act of 1996 (NIST Publication 800-66)[7]
SANSCritical Security Controls (Control 3)[8]

Source: Wikipedia

Last Updated: November 15th, 2021