DEDICATED TO PROTECT YOUR SERVER FILES & DATA
Protects your server files and data from any unauthorised changes by monitoring and recovering immediately to its original data.
FILE AND DATA INTEGRITY MONITORING
WebALARM continuously monitors files and folders round the clock to detect any changes made to the monitored data. WebALARM scans each file to check for its existence, integrity and access permissions.
WebALARM will detect the following violation:
-
A monitored file or folder has been deleted
-
A new file or folder has been added to a monitored folder
-
The content of a monitored file has been altered
-
The access permissions of a monitored file or folder has been altered
AUTOMATIC RECOVERY
WebALARM will automatically take immediate action upon detection of a data integrity violation event. This is a built-in feature of WebALARM without requiring any additional scripting by the administrator.
The available options for automatic recovery include:
Automatic full recovery of file content from backup
Automatic recovery by replacement with a standard template file
Automatic launching of third party or custom programs (such as any proprietary recovery program, anti-virus, etc)
Automatic Recovery From Backup
Watch the video below where we demonstrate how WebALARM can prevent malicious scripts from being inserted to your website:
AUDIT & EVIDENCE
WebALARM provides full audit logging on all the data violation and update events within its scope of monitored data. The information provided in the log includes:
-
Date and time of event
-
Type of event
-
Full pathname of violated file
-
In addition, WebALARM also provides quarantine of modified file content for forensic inspection or analysis.
DATA VIOLATION ALERTS
WebALARM will issue alerts upon detection of any data integrity violation. The types of alerts include:
-
WebALARM Console alerts
-
Network management console alerts, via SNMP
-
Email alerts
DATA UPDATE MANAGEMENT
WebALARM allows continuous monitoring without interruption while some part of the data is being updated.
WebALARM provides two flexible methods for content owners to update the monitored data without trigger any false alarm.
Using update time scheduler
The WebALARM Console can be used to set WebALARM to update mode for a specified time period so that WebAlarm will learn any new changes within this allowed time period.
The update mode can be triggered on-demand as and when required, or it can be scheduled.
Using WebALARM Update Management Agent
For environments where staging servers or content management systems exist, the update method using WebALARM’s Update Management Agent (UMA) is preferred.
The UMA resides on the staging server and will detect any new authorised changes on the staging server and will deliver the updates securely to the WebALARM Agent in the production server. The production server will only accept authenticated updates from the UMA, without having any risk of time window exposure.
SUPPORTED PLATFORMS
AGENT (MONITORED SERVER) (WAA)
-
Windows Server 2016
-
Windows Server 2008, 2012 (32 or 64-bit)
-
*Red Hat Enterprise Linux v5, v6, v7 (i686 or x86_64)
-
*CentOS Linux v5, v6, v7 (i686 or x86_64)
-
*Ubuntu Linux 10.04 or newer (i686 or x86_64)
*requires the 32-bit glibc and libstdc++ libraries.
UPDATE MANAGEMENT AGENT (UMA)
-
Windows Server 2016
-
Windows Server 2008, 2012 (32 or 64-bit)
-
*Red Hat Enterprise Linux v5, v6, v7 (i686 or x86_64)
-
*CentOS Linux v5, v6, v7 (i686 or x86_64)
-
*Ubuntu Linux 10.04 or newer (i686 or x86_64)
*requires the 32-bit glibc and libstdc++ libraries.
CONSOLE (WAC & UMC)
-
Windows Server 2008, 2012 (32 or 64-bit)
-
Windows 7, 8, 10 (32 or 64-bit)