Content

McAfee Integrity Monitor

McAfee Integrity Monitor product shot
Real-time file integrity monitoring (FIM)

FIM is the capability to monitor files and directories on a server for changes to content, permissions, or both. Introduced in 2005, our real-time file integrity monitoring goes beyond “periodic” or scan-based file integrity monitoring, to more effectively meet Payment Card Industry Data Security Standard (PCI DSS) compliance.

Tab Navigation

Benefits and Features

Benefits:

  • Avoid repeat scans with real-time file integrity monitoring
    Until now, meeting the file integrity monitoring (FIM) requirements of the PCI DSS has been difficult. Previous tools have merely provided “periodic” file integrity monitoring, using resource-intensive scans. McAfee Integrity Monitor eliminates this problem with real-time file integrity monitoring, which continuously detects all changes, with a very low impact on resources. Real-time FIM provides greater information about every change, including the user and program used to make the change. It also eliminates the need to perform scan after scan on servers, databases, and network devices. McAfee Integrity Monitor provides this level of monitoring across the broadest set of platforms.
  • Identify transient change violations
    When a file is changed inappropriately, and then changed back, it creates a transient compliance violation. Periodic FIM solutions are unable to detect this violation. Because McAfee Integrity Monitor is continuous, it captures every change, and alerts you if there is a transient violation—even if that change is subsequently reversed.
  • Capture a rich set of forensic data

    McAfee Integrity Monitor captures details about every change, including the exact time of the change, who was logged into the machine at the time, what processes (like editors) were running, and if the change was made manually or by an authorized program. This enables rapid investigation of change-related issues.

Features:

  • Comprehensive change detection
    Because McAfee Integrity Monitor delivers continuous monitoring, it captures every single change. This is important for sustaining compliance, because it allows you to see where your compliance policies are being challenged, and addresses inappropriate change at the source.
  • Very low overhead operation
    Periodic scans of the entire system can be expensive and resource-intensive because of the performance impact it can have on applications. By contrast, McAfee Integrity Monitor has negligible impact to applications, because the continuous approach to scanning only deals with the changes that are happening in real-time.
  • Network change and configuration monitoring
    McAfee Integrity Monitor allows organizations to establish configuration standards for network devices, and provides the capability to monitor the compliance of the devices in real-time. The software restores devices to known configurations, and provides detailed audit trails by user.  Devices can be manually added, or discovered using simple network management protocol (SNMP).
  • Endorsed by leading qualified security assessors (QSAs), auditors, and other experts
    Deployed in over 100 countries across 5 continents, McAfee’s real-time file integrity monitoring is the preferred solution for meeting PCI and operational control requirements

Description:

When it comes to IT infrastructure, a strong compliance posture requires two key components: trusted state and safe change actions. Payment Card Industry Data Security Standard (PCI DSS) compliance, in particular, highlights the need for safe change actions through the following requirements:

- PCI Control 10.5.5: Use file integrity monitoring and change detection software on logs to ensure that existing log data cannot be changed without generating alerts (although new data being added should not cause an alert)

- PCI Control 11.5: Deploy file integrity monitoring software to alert personnel to unauthorized modification of critical system or content files

Independent research indicates that these requirements are among the least satisfied, with almost 40% non-compliance. This is why many organizations facing PCI DSS compliance are looking at real-time file integrity monitoring solutions. Anyone evaluating FIM solutions should be aware that the technology in this area has evolved significantly, and a new breed of solution is now available. McAfee Integrity Monitor provides real-time file integrity monitoring that goes beyond “periodic” FIM tools, and eliminates the need to perform any repeat system scans.

System Requirements:

Supported Operating Systems (OS)

  • Windows NT
  • Windows 2000/2003/2008
  • Windows XP/Vista
  • Windows XPE
  • Windows XP/Vista (64-bit) 
  • Windows 2003/2008 (64-bit)
  • Red Hat Enterprise Linux 3/4/5
  • CentOS 4/5
  • SUSE Enterprise Linux 9/10
  • Oracle Enterprise Linux 5  
  • Solaris 8/9/10  
  • HP-UX 11.00/11.11/11.23/11.31  
  • AIX 5.2/5.3/6.1  
  • IBM i5/OS (AS400) V5R3/V5R4/V6R1  
  • IBM 4690 OS V5

Supported Databases

  • Oracle 8i/9i/10g
  • SQL Server 7/2000/2005
  • DB2 8.x/9.x
  • DB2 for iSeries V5R4

 

Supported VMware Hypervisors

  • ESX 3.0.x/3i/3.5
  • Virtual Center
  • VMware Server 2.0

 

Network Devices

 
Vendor Device Type Supported Model/Series
 
Cisco IOS Switch All models of Cisco IOS Switches
  IOS Router All models of Cisco IOS Routers
  Firewall All models of Cisco PIX firewalls & FWSM Modules
  IAD All models of Cisco IAD Devices
  Access Points All models of Cisco Aironet Access Points
  CatOS Switch All models of Cisco CatOS Switches
  Access Server All models of Cisco Access Server models
  Content Switch All models of Cisco Content Switches
  ASA All models of Cisco ASA SingleContext & Multiple Context Models
  Voice Gateway Devices All models of Cisco Voice Gateway Devices
  VPN Concentrators All models of Cisco VPN Concentrator Devices
  MDS Switch All models of Cisco MDS Devices

HP Procurve Switch Switches & Menu based 4000M & 8000M models
  Procurve Access Point All models of HP Procurve AccessPoints

Foundry Switch Foundry BigIron & FastIron Edge Switches

3Com Switch All models of 3Com menu based SuperStack switches

Fortinet FortiGate Firewall All models of FortiGate firewalls & FortiMail devices

Juniper Netscreen Firewall All models of Netscreen Firewalls
  J-Series Router All models of Juniper J-Series Routers

Enterasys Switch All models of Enterasys Matrix N Series Switches

ADTRAN LAN Switch All models of ADTRAN LAN Switches

Nortel Passport Switch All models of Nortel Passport 1600 Series, 8600 Series Switches
  BayStack Switch All models of Nortel BayStack Switches
  BayStack Business Policy Switch All models of Nortel BayStack Business Policy 2000 Series

Aruba WiFi Switch All models of Aruba WiFi Switches

Proxim Access Points All models of Proxim Access Points

Extreme Black Diamond Switch All models of Extreme Black Diamond Switches
  Summit Switch All models of Extreme Summit switches running with Extremeware & ExtremewareXOS

Force 10 Switch All models of Force10 E, S & C Series Switches

Netgear Switch Netgear Prosafe Switches

Dell Switch All models of Dell Power Connect Switches

SlimLine Appliance All models of SlimLine devices

DLink Switch DES 3010 , DES 3899 , DXS 3259

Blue Coat Proxy SG All BlueCoat ProxySG devices

Huawei Router All models of Huawei AR Routers