Rules file
Table of contents
File Integrity Monitor Ruleset
If you want to customize your installation and trigger custom events in addition to the given ones. It is required to edit the rules.yml
file located at C:\Program Files\File Integrity Monitor\rules.yml
(Windows systems) or /etc/fim/rules.yml
(Unix systems).
In the following sections, you could review each section and parameters to tune up your ruleset as you require.
Parameters
-
rules
Array
Defines an array of rules to trigger events.
Integer
A user defined integer to manage rules order and distinction. Unique value. Writing two rules with the same ID will produce unexpected results.
String
Path that links the rule to the events, this path must be exactly the same as set on audit or monitor configuration sections.
String
Defines the rule to trigger this rule event, Rust regex format.
It is sanitized from forbidden chars like
:
or|
.String
Message related to this rule event, it will be inside events.json schema.
Example configuration
FIM comes with a ready-to-use rules file. You can tune up as you wish. Here you can see an example configuration:
Windows systems:
rules:
- id: 1
path: C:\
rule: '\.ps1$'
message: "Powershell script present in root directory."
- id: 2
path: C:\tmp
rule: '\d'
message: "File with digits in temp folder."
Linux systems:
rules:
- id: 1
path: /etc
rule: '\.sh$'
message: "Shell script present in /etc folder."
- id: 2
path: /tmp
rule: '\d'
message: "File with digits in temp folder."
macOS systems:
rules:
- id: 1
path: /etc
rule: '\.sh$'
message: "Shell script present in /etc folder."
- id: 2
path: /tmp
rule: '\d'
message: "File with digits in temp folder."