For a list of operating systems where Integrity Monitoring is supported, see Supported features by platform.
The integrity monitoring module scans for unexpected changes to registry values, registry
               keys, services, processes, installed software, ports and files on agents. Using a
               baseline secure state as a reference, the integrity monitoring module performs scans
               on the above and logs an event (and an optional alert) if it detects any unexpected
               changes.
To enable and configure integrity monitoring, see Set up integrity monitoring.
For more information on creating integrity monitoring rules, see Create an integrity monitoring rule. You can create a rule from a file or registry monitoring template, or by using the
               Workload Security XML-based Integrity monitoring rules language.
 
		