Skip to content

Update file-integrity-monitoring-overview.md#138

Open
pixel559 wants to merge 1 commit into
MicrosoftDocs:mainfrom
pixel559:patch-1
Open

Update file-integrity-monitoring-overview.md#138
pixel559 wants to merge 1 commit into
MicrosoftDocs:mainfrom
pixel559:patch-1

Conversation

@pixel559
Copy link
Copy Markdown

@pixel559 pixel559 commented May 5, 2026

https://learn.microsoft.com/en-us/azure/defender-for-cloud/file-integrity-monitoring-enable-defender-endpoint#prerequisites

"You must enable agentless machine scanning on your subscription to gain extra coverage and the ability to monitor custom paths."

From the principle of how the Agentless scanning works, this will not work for ARC servers that are on-prem or in 3rd party cloud resources which are not onboarded via the connector

https://learn.microsoft.com/en-us/azure/defender-for-cloud/file-integrity-monitoring-enable-defender-endpoint#prerequisites

"You must enable agentless machine scanning on your subscription to gain extra coverage and the ability to monitor custom paths."

From the principle of how the Agentless scanning works, this will not work for ARC servers that are on-prem or in 3rd party cloud resources which are not onboarded via the connector
@prmerger-automator
Copy link
Copy Markdown
Contributor

@pixel559 : Thanks for your contribution! The author(s) and reviewer(s) have been notified to review your proposed change.

@learn-build-service-prod
Copy link
Copy Markdown
Contributor

Learn Build status updates of commit e29a4e3:

✅ Validation status: passed

File Status Preview URL Details
articles/defender-for-cloud/file-integrity-monitoring-overview.md ✅Succeeded

For more details, please refer to the build report.

@v-dirichards v-dirichards requested a review from Copilot May 5, 2026 20:43
@v-dirichards
Copy link
Copy Markdown
Contributor

@ElazarK

Can you review the proposed changes?

Important: When the changes are ready for publication, adding a #sign-off comment is the best way to signal that the PR is ready for the review team to merge.

#label:"aq-pr-triaged"
@MicrosoftDocs/public-repo-pr-review-team

Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Note

Copilot was unable to run its full agentic suite in this review.

Updates File Integrity Monitoring guidance to clarify that custom path monitoring requires agentless machine scanning coverage.

Changes:

  • Adds a note to the “custom folder path” bullet indicating custom path monitoring is only supported for machines covered by agentless scanning, with a link to enable it.

Comment thread articles/defender-for-cloud/file-integrity-monitoring-overview.md
Comment on lines +65 to 66
- Monitor any file located in a folder `/folder/path/*`. (Custom path monitoring is supported only for machines covered with agentless scanning [Enable agentless machine scanning](enable-agentless-scanning-vms.md))

- Monitor files that you don’t expect to change without planning.
- Select files that applications or the operating system frequently change (such as log files and text files) creates noise and makes it hard to identify an attack.
- Monitor any file located in a folder `/folder/path/*`.
- Monitor any file located in a folder `/folder/path/*`. (Custom path monitoring is supported only for machines covered with agentless scanning [Enable agentless machine scanning](enable-agentless-scanning-vms.md))
@pixel559
Copy link
Copy Markdown
Author

Hello @ElazarK ,
Please let me know if you had a chance to review this documentation update.
Thanks!

@ElazarK
Copy link
Copy Markdown
Contributor

ElazarK commented May 17, 2026

#assign-reviewer:DebLanger

@prmerger-automator prmerger-automator Bot requested a review from DebLanger May 17, 2026 07:11
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants