Integrity Checking; Known Files List - F-SECURE LINUX SECURITY Manual

Table of Contents

Advertisement

4. Add network interfaces to the
a comma.
All traffic to trusted network interfaces is allowed.

Integrity Checking

Integrity Checking protects important system files against unauthorized modifications.
You can use Integrity Checking to block any modification attempts to protected files, regardless
of file system permissions.
Use Integrity Checking Wizards on the
baseline. The file system baseline guards your computer against unauthorized file changes. For
more integrity checking options, configure settings in the
Integrity Checking works by comparing files on the disk to the baseline, which is a
cryptographically signed list of file properties. Integrity Checking can be configured to send alerts
to the administrator about modification attempts of the monitored files.

Known Files List

The Known Files List contains all files that the product monitors and protects.
The baseline is created from the Known Files List by reading the properties of the files in the
list and cryptographically signing the result. Integrity Checking compares this result to real-time
file accesses.
Note: The Known Files List in the Web User Interface shows only the baseline status that
is currently stored in the product. To view the actual, up-to-date file system status, use the
Verify baseline operation in Web User Interface or run the fsic command line utility.
Using the Known Files List Search
Use search filters to select files you want to view in the Known Files List.
1. Select files you want to view in the known files list.
Select
Modified and new
baseline.
Select
Modified
Select
New
to display all files that have been added to the baseline.
Trusted network interfaces
I want to...
to display all files that have been modified or added to the
to display all files that have been modified.
F-Secure Linux Security | Using the Product | 57
list and separate each entry with
page to generate and verify the file system
Advanced
mode.

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the LINUX SECURITY and is the answer not in the manual?

Subscribe to Our Youtube Channel

This manual is also suitable for:

Linux security 7.02

Table of Contents