File Integrity Monitoring Troubleshooting Guide
If you have configured File Integrity Monitoring (FIM) but are unable to view events that trigger alerts in F5 Distributed Cloud App Infrastructure Protection (AIP), consider these troubleshooting suggestions or contact aipsupport@f5.com.
- Ensure that your server is assigned a ruleset.
- Confirm that the specific rule is enabled.
- Confirm that the rule is monitoring the expected directory and event type.
- Confirm that no suppressions are preventing the alert from triggering.
- Confirm that the rule reached the Agent.
- Confirm that FIM events are appearing on the Events page.
- Ensure that the server does not run CentOS or RHEL 6.
You can ensure Distributed Cloud AIP is monitoring the right server.
- In the left navigation pane, click the Servers tab.
- Click on the server from the list.
- Verify the correct ruleset displays in the Summary pane.
Note
In this example, a Base Rule Set was assigned to the server named "instance-1".
Navigate to the ruleset and ensure the rule is enabled.
- In the left navigation pane, click the Rules tab.
Note
You can also navigate to the ruleset from the Servers page.
- Select a ruleset from the list.
Note
In this example, the Base Rule Set was selected.
- Click the Show More link to display additional rules.
- Select a rule from the list.
Note
In this example, the Files: Secret File Opens rule is selected.
- Confirm the rule is enabled.
Note
Disabled rules will be grayed out and listed at the bottom of the ruleset they belong to.
You can inspect the rule and confirm the rule monitors the expected directory and event type(s).
- In the left navigation pane, click the Rules tab.
Note
You can also navigate to the ruleset from the Servers page.
- Select a ruleset from the list.
Note
In this example, the Base Rule Set was selected.
- Click the Show More link to display additional rules.
- Select a rule from the list.
Note
In this example, the Files: Secret File Opens rule is selected.
- Click the File Paths link.
- In the right view pane, the File Paths to Monitor screen displays. Confirm the rule is monitoring the expected directory and event type(s) by reviewing the File Integrity Paths field and the Events To Monitor field.
There could be a suppression preventing an alert from displaying an event. You can confirm whether a suppression is enabled within a rule.
- In the left navigation pane, click the Rules tab.
Note
You can also navigate to the ruleset from the Servers page.
- Select a ruleset from the list.
Note
In this example, the Base Rule Set was selected.
- Click the Show More link to display additional rules.
- Select a rule from the list.
Note
In this example, the Files: Secret File Opens rule is selected.
- Click the Suppressions link.
- In the right view pane, the Suppressions screen displays. Review the related suppressions and confirm they do not interfere with your ability to generate an alert.
- Connect to your instance.
- Navigate to the following directory: /opt/threatstack/etc/.
- Open the tsfim.config.json file.
- Within this file, under the watcher’s key find the directories key.
- Its value should be a list of the monitored directories.
- Confirm your directory displays on this monitored list.
Note
If you choose to monitor an individual file instead, or in addition to a directory, then it will display in the files key instead of the directories key.
Example
The “Files: Secret File Opens" rule has Distributed Cloud AIP monitor the "/fimtesting/" and "/home/ubuntu/.aws/" directories. Distributed Cloud AIP does not monitor any individual files because the rule does not call for monitoring.
You can confirm whether the right events are searchable in Distributed Cloud AIP.
- In the left navigation pane, click the Events tab. The All Events page displays.
- In the Search field, enter the following:
event_type = "file"
Note
File refers to a FIM event in Distributed Cloud AIP.
- Click the Date and Time drop-down menu.
- The date and time dialog displays. Click the Quick Jump link.
- Select your desired time period from the available options.
Note
Selecting the time period triggers the search in Distributed Cloud AIP.
- A list of events displays.
Note
If no search results display, ensure there is no misspelling in your search criteria or select a different time frame.