{"id":13002,"date":"2025-08-07T16:49:49","date_gmt":"2025-08-07T16:49:49","guid":{"rendered":"https:\/\/www.itarian.com\/blog\/?p=13002"},"modified":"2025-08-07T16:49:49","modified_gmt":"2025-08-07T16:49:49","slug":"how-to-monitor-file-change-with-powershell-and-restart-application","status":"publish","type":"post","link":"https:\/\/www.itarian.com\/blog\/how-to-monitor-file-change-with-powershell-and-restart-application\/","title":{"rendered":"Monitor File Changes &#038; Restart App with PowerShell"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Have you ever needed to keep a critical application running based on file activity\u2014like when a config file gets updated, or a log changes state? Knowing <\/span><b>how to monitor file change with PowerShell and restart application<\/b><span style=\"font-weight: 400;\"> services or processes in real-time can be a game-changer for IT teams and cybersecurity professionals.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Whether you&#8217;re maintaining uptime, reacting to unauthorized file tampering, or automatically reloading services upon changes, PowerShell offers powerful tools to automate it all.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this guide, we&#8217;ll walk you through how to:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Detect file system changes using PowerShell<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Automatically restart services or apps when changes occur<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Implement security-focused monitoring<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Leverage scripts in production environments<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Let\u2019s dive in.<\/span><\/p>\n<h2><b>Why Monitor File Changes in the First Place?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Monitoring files for changes is essential in:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>DevOps pipelines<\/b><span style=\"font-weight: 400;\"> (e.g., auto-restart apps after config change)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Security monitoring<\/b><span style=\"font-weight: 400;\"> (e.g., detect tampering of log or config files)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>IT automation<\/b><span style=\"font-weight: 400;\"> (e.g., restart services after file updates)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Compliance audits<\/b><span style=\"font-weight: 400;\"> (e.g., alert on unauthorized modifications)<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">When combined with restart logic, this technique supports <\/span><b>self-healing systems, faster recovery<\/b><span style=\"font-weight: 400;\">, and <\/span><b>enhanced security postures<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2><b>Tools You\u2019ll Need<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">To implement this solution, you&#8217;ll need:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">PowerShell (preferably version 5.1+ or PowerShell Core 7+)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Administrator privileges (for restarting apps\/services)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Target application or service name<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">File path or folder to monitor<\/span><\/li>\n<\/ul>\n<h2><b>Step-by-Step: How to Monitor File Change with PowerShell<\/b><\/h2>\n<h3><b>Step 1: Use <\/b><b>Register-ObjectEvent<\/b><b> to Watch for File Changes<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">PowerShell\u2019s <\/span><span style=\"font-weight: 400;\">System.IO.FileSystemWatcher<\/span><span style=\"font-weight: 400;\"> lets you subscribe to file system events.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here\u2019s a basic setup:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">powershell<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CopyEdit<\/span><\/p>\n<p><span style=\"font-weight: 400;\">$watcher = New-Object System.IO.FileSystemWatcher<\/span><\/p>\n<p><span style=\"font-weight: 400;\">$watcher.Path = &#8220;C:\\Path\\To\\Monitor&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">$watcher.Filter = &#8220;settings.json&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">$watcher.NotifyFilter = [System.IO.NotifyFilters]::LastWrite<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Register-ObjectEvent $watcher Changed -Action {<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0Write-Host &#8220;File has changed. Restarting application&#8230;&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0Stop-Process -Name &#8220;YourAppName&#8221; -Force<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0Start-Process &#8220;C:\\Path\\To\\YourApp.exe&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">}<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">This script monitors <\/span><span style=\"font-weight: 400;\">settings.json<\/span><span style=\"font-weight: 400;\"> for write changes and restarts the specified application when detected.<\/span><\/p>\n<h3><b>Step 2: Keep the Script Running<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">PowerShell scripts with events must <\/span><b>stay alive<\/b><span style=\"font-weight: 400;\"> to catch events.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Add this loop at the end of your script:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">powershell<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CopyEdit<\/span><\/p>\n<p><span style=\"font-weight: 400;\">while ($true) {<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0Start-Sleep -Seconds 5<\/span><\/p>\n<p><span style=\"font-weight: 400;\">}<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Pro Tip: Use <\/span><span style=\"font-weight: 400;\">Start-Job<\/span><span style=\"font-weight: 400;\"> or run it as a background task with <\/span><b>Windows Task Scheduler<\/b><span style=\"font-weight: 400;\"> or <\/span><b>NSSM<\/b><span style=\"font-weight: 400;\"> (Non-Sucking Service Manager).<\/span><\/p>\n<h3><b>Step 3: Use Logging for Auditing<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Want to track each event for compliance?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Add this inside the <\/span><span style=\"font-weight: 400;\">-Action<\/span><span style=\"font-weight: 400;\"> block:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">powershell<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CopyEdit<\/span><\/p>\n<p><span style=\"font-weight: 400;\">$timestamp = Get-Date -Format &#8220;yyyy-MM-dd HH:mm:ss&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Add-Content &#8220;C:\\Logs\\FileWatcher.log&#8221; &#8220;$timestamp &#8211; File change detected. Restarting application.&#8221;<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Advanced Example: Monitor Multiple Files &amp; Restart IIS<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Need to monitor a web.config and restart IIS when it changes?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">powershell<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CopyEdit<\/span><\/p>\n<p><span style=\"font-weight: 400;\">$watcher = New-Object System.IO.FileSystemWatcher<\/span><\/p>\n<p><span style=\"font-weight: 400;\">$watcher.Path = &#8220;C:\\inetpub\\wwwroot\\myapp&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">$watcher.Filter = &#8220;web.config&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">$watcher.NotifyFilter = [System.IO.NotifyFilters]::LastWrite<\/span><\/p>\n<p><span style=\"font-weight: 400;\">$watcher.IncludeSubdirectories = $false<\/span><\/p>\n<p><span style=\"font-weight: 400;\">$watcher.EnableRaisingEvents = $true<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Register-ObjectEvent $watcher Changed -Action {<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0Write-Output &#8220;web.config changed. Restarting IIS.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0Restart-Service W3SVC<\/span><\/p>\n<p><span style=\"font-weight: 400;\">}<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">This can also be used for <\/span><b>security hardening<\/b><span style=\"font-weight: 400;\">. If someone modifies <\/span><span style=\"font-weight: 400;\">web.config<\/span><span style=\"font-weight: 400;\"> unexpectedly, you can trigger alerts and restarts instantly.<\/span><\/p>\n<h2><b>How to Restart an Application with PowerShell<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">There are multiple ways to restart apps. Choose based on context:<\/span><\/p>\n<h3><b>1. Restart a Service<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">powershell<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CopyEdit<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Restart-Service -Name &#8220;Spooler&#8221;<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>2. Kill and Start a Process<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">powershell<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CopyEdit<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Stop-Process -Name &#8220;notepad&#8221; -Force<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Start-Process &#8220;notepad.exe&#8221;<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>3. Use WMI for Remote Restarts<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">powershell<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CopyEdit<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Invoke-Command -ComputerName RemotePC -ScriptBlock {<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0Stop-Process -Name &#8220;AppName&#8221; -Force<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0Start-Process &#8220;C:\\App\\app.exe&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">}<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Combine these with <\/span><span style=\"font-weight: 400;\">FileSystemWatcher<\/span><span style=\"font-weight: 400;\"> to build a complete auto-recovery solution.<\/span><\/p>\n<h2><b>Security Use Case: Detect File Tampering and Trigger a Response<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Let\u2019s say you want to <\/span><b>monitor a log file<\/b><span style=\"font-weight: 400;\"> for unauthorized modification and:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Log the incident<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Alert an admin<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Restart a firewall or app<\/span><\/li>\n<\/ul>\n<h3><b>Example:<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">powershell<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CopyEdit<\/span><\/p>\n<p><span style=\"font-weight: 400;\">$watcher = New-Object System.IO.FileSystemWatcher<\/span><\/p>\n<p><span style=\"font-weight: 400;\">$watcher.Path = &#8220;C:\\Logs\\Security&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">$watcher.Filter = &#8220;firewall.log&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">$watcher.NotifyFilter = [System.IO.NotifyFilters]::LastWrite<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Register-ObjectEvent $watcher Changed -Action {<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0$time = Get-Date<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0Add-Content &#8220;C:\\Logs\\security_watch.log&#8221; &#8220;$time &#8211; Unauthorized change detected&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0Send-MailMessage -From alert@domain.com -To admin@domain.com -Subject &#8220;Log Modified!&#8221; -Body &#8220;Firewall log changed at $time&#8221; -SmtpServer smtp.domain.com<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0Restart-Service &#8220;Windows Defender Firewall&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">}<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">This adds a security automation layer using built-in PowerShell features.<\/span><\/p>\n<h2><b>Scheduling the Script to Run at Startup<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">To ensure your file watcher runs persistently:<\/span><\/p>\n<h3><b>Option 1: Task Scheduler<\/b><\/h3>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Open Task Scheduler<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Create a new task<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Trigger: At system startup<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Action: Start PowerShell with argument:<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">bash<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CopyEdit<\/span><\/p>\n<p><span style=\"font-weight: 400;\">powershell.exe -ExecutionPolicy Bypass -File &#8220;C:\\Scripts\\watcher.ps1&#8221;<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Option 2: Convert Script to a Windows Service<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Use tools like:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">NSSM (Non-Sucking Service Manager)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">PowerShell modules like <\/span><b>New-Service<\/b><span style=\"font-weight: 400;\"> for native services<\/span><\/li>\n<\/ul>\n<h2><b>Troubleshooting Common Issues<\/b><\/h2>\n<table>\n<tbody>\n<tr>\n<td><b>Issue<\/b><\/td>\n<td><b>Solution<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Script exits immediately<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Add a <\/span><span style=\"font-weight: 400;\">while ($true)<\/span><span style=\"font-weight: 400;\"> loop<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">No action on file change<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Ensure <\/span><span style=\"font-weight: 400;\">EnableRaisingEvents = $true<\/span><span style=\"font-weight: 400;\"> is set<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Process not restarting<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Verify file paths and app permissions<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Cannot access file<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Run PowerShell as Administrator<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">Always test your scripts in a controlled environment before deploying to production.<\/span><\/p>\n<h2><b>LSI and Secondary Keywords Naturally Included<\/b><\/h2>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">PowerShell file watcher<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Automatically restart app<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Monitor folder for changes<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">File system monitoring PowerShell<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">PowerShell script to restart service<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Detect file modification<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Automate application recovery<\/span><\/li>\n<\/ul>\n<h2><b>FAQs: Monitoring File Changes with PowerShell<\/b><\/h2>\n<h3><b>1. Can I monitor an entire folder instead of a single file?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Yes! Just change the filter:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">powershell<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CopyEdit<\/span><\/p>\n<p><span style=\"font-weight: 400;\">$watcher.Filter = &#8220;*.*&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">$watcher.IncludeSubdirectories = $true<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>2. How do I restart a Windows service automatically?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Use:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">powershell<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CopyEdit<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Restart-Service -Name &#8220;ServiceName&#8221;<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">This works well for IIS, SQL Server, or custom services.<\/span><\/p>\n<h3><b>3. What file system events can I monitor?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">You can monitor:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Changed<\/span><span style=\"font-weight: 400;\"> (file modified)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Created<\/span><span style=\"font-weight: 400;\"> (file added)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Deleted<\/span><span style=\"font-weight: 400;\"> (file removed)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Renamed<\/span><span style=\"font-weight: 400;\"> (file name changed)<\/span><\/li>\n<\/ul>\n<h3><b>4. Can I run the script as a background service?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Yes. Use <\/span><b>Task Scheduler<\/b><span style=\"font-weight: 400;\">, <\/span><b>NSSM<\/b><span style=\"font-weight: 400;\">, or create a custom Windows service using PowerShell or C#.<\/span><\/p>\n<h3><b>5. Is this solution secure for production environments?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">With proper permissions, logging, and alerts, this is a lightweight yet powerful method to automate file change monitoring with minimal attack surface.<\/span><\/p>\n<h2><b>Final Thoughts<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Mastering <\/span><b>how to monitor file change with PowerShell and restart application<\/b><span style=\"font-weight: 400;\"> empowers IT leaders to create <\/span><b>resilient, responsive, and secure systems<\/b><span style=\"font-weight: 400;\">. From restarting apps after config updates to detecting suspicious file activity, this strategy reduces downtime and accelerates response times.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This simple yet powerful approach supports:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Zero-touch automation<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Improved operational uptime<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Rapid security remediation<\/span><\/li>\n<\/ul>\n<h3><b>Ready to automate your IT infrastructure and secure endpoints with real-time monitoring?<\/b><\/h3>\n<p><a href=\"https:\/\/www.itarian.com\/signup\/\"><b>Start your FREE Itarian trial now<\/b><\/a><span style=\"font-weight: 400;\"> and gain access to robust automation, patching, and file integrity monitoring\u2014all in one cloud-native platform.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have you ever needed to keep a critical application running based on file activity\u2014like when a config file gets updated, or a log changes state? Knowing how to monitor file change with PowerShell and restart application services or processes in real-time can be a game-changer for IT teams and cybersecurity professionals. Whether you&#8217;re maintaining uptime,&hellip; <span class=\"readmore\"><\/span><\/p>\n","protected":false},"author":11,"featured_media":13012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-13002","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ticketing-system","entry"],"_links":{"self":[{"href":"https:\/\/www.itarian.com\/blog\/wp-json\/wp\/v2\/posts\/13002","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itarian.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itarian.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itarian.com\/blog\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itarian.com\/blog\/wp-json\/wp\/v2\/comments?post=13002"}],"version-history":[{"count":3,"href":"https:\/\/www.itarian.com\/blog\/wp-json\/wp\/v2\/posts\/13002\/revisions"}],"predecessor-version":[{"id":13142,"href":"https:\/\/www.itarian.com\/blog\/wp-json\/wp\/v2\/posts\/13002\/revisions\/13142"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itarian.com\/blog\/wp-json\/wp\/v2\/media\/13012"}],"wp:attachment":[{"href":"https:\/\/www.itarian.com\/blog\/wp-json\/wp\/v2\/media?parent=13002"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itarian.com\/blog\/wp-json\/wp\/v2\/categories?post=13002"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itarian.com\/blog\/wp-json\/wp\/v2\/tags?post=13002"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}