A baseline snapshot of the current system state is taken and according to your configuration Verisys will automatically compare the system against this baseline to detect any changes. Using the console, you can also start an integrity check manually at any time.
If files are altered in any way, Verisys will detect it
Rather than simply check basic object properties, Verisys performs a complex cryptographic hashing algorithm on the actual data contained within each file - if files are altered in any way, Verisys will detect it. The Verisys agent examines a number of properties and attributes of each file to ascertain whether any changes have been made:
In your environment some system objects may be more critical than others, so Verisys allows you to set a priority for each monitoring rule, enabling different actions to be taken automatically. To find out more about Verisys reporting and alerting capabilities, click here.
Operating system and application templates for common system configurations are included to help you get started:
Download your free 30-day evaluation now