Verisys - How it Works

File Integrity Monitoring

A baseline snapshot of the current system state is taken and according to your configuration Verisys will automatically compare the system against this baseline to detect any changes. Using the console, you can also start an integrity check manually at any time.

If files are altered in any way, Verisys will detect it

Rather than simply check basic object properties, Verisys performs a complex cryptographic hashing algorithm on the actual data contained within each file - if files are altered in any way, Verisys will detect it. The Verisys agent examines a number of properties and attributes of each file to ascertain whether any changes have been made:

  • Object Name
  • Creation Time
  • Last Modified Time
  • Last Accessed Time
  • Index Node
  • Size
  • Flags
  • CRC-32
  • SHA-256 Hash
  • Symlink Target
  • Owner
  • Primary Group
  • Permissions
  • Audit Rules
  • Extended Attributes
Configuration

Using the Verisys console, agents can be configured to monitor specific files or groups of files using wildcards, and can recurse through a directory structure. You may have different monitoring requirements for some objects (for example you may wish log files to be able to grow but want to detect any alterations to previously logged data). Verisys accordingly allows to you configure different monitoring levels to give you control over what properties are observed.

Process overview

In your environment some system objects may be more critical than others, so Verisys allows you to set a priority for each monitoring rule, enabling different actions to be taken automatically. To find out more about Verisys reporting and alerting capabilities, click here.

Operating system and application templates for common system configurations are included to help you get started:

Templates for Rapid Deployment

  • Microsoft Windows Server 2016
  • Microsoft Windows Server 2012
  • Microsoft Windows Server 2008
  • Microsoft Windows Server 2003
  • Microsoft Windows 10
  • Microsoft Windows 8.1
  • Microsoft Windows 7
  • Microsoft Windows Vista
  • Microsoft Windows XP
  • Linux
  • Microsoft SQL Server 2012
  • Microsoft SQL Server 2008
  • Microsoft SQL Server 2000
  • Microsoft SQL Server 2005
  • Microsoft IIS 8
  • Microsoft IIS 7
  • Microsoft IIS 6
  • Microsoft IIS 5
  • Apache HTTP Server 2.4
  • Apache HTTP Server 2.2
  • Apache HTTP Server 2.0
  • Cisco IOS
  • Cisco IOS-XR
  • Cisco ASA
  • Juniper Junos
  • Palo Alto PAN-OS
  • F5 BIG-IP LTM TMOS

Ready to start?

Download your free 30-day evaluation now