Hi Team,
While reviewing a Server File Integrity Monitoring (FIM) policy, I noticed that although FIM is enabled, no custom file paths have been specified under the included or excluded locations.
Based on my understanding, in such cases only the default system directories are being monitored. While Sophos FIM does offer OS-level monitoring for critical directories (e.g., system32, etc.), it does not automatically cover application-specific or business-critical directories unless these are explicitly defined is this understanding correct here ?
To improve coverage, I’m considering defining additional paths under included-locations such as:
-
Windows:
C:\Windows\System32\
,C:\inetpub\wwwroot\
, and custom application folders likeD:\FinanceApp\Config\
-
Linux:
/etc/
,/var/log/
,/usr/bin/
,/home/<app>
,/opt/<custom_app>/
Additionally, to reduce noise, I plan to define excluded-locations for directories where frequent benign changes are expected:
-
C:\Temp\
,C:\ProgramData\Cache\
,/var/tmp/
,/var/cache/
Could the community confirm if this is the right approach? Are there any best practices or gotchas when configuring FIM paths for both security effectiveness and operational efficiency?
Thanks in advance!