![]() If you choose files that are frequently changed by applications or operating system (such as log files and text files) it'll create a lot of noise, making it difficult to identify an attack.ĭefender for Cloud provides the following list of recommended items to monitor based on known attack patterns. Monitor files that you don’t expect to change without planning. When choosing which files to monitor, consider the files that are critical for your system and applications. If you remove the Change Tracking resource, you will also disable the file integrity monitoring feature in Defender for Cloud.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |