✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
A junior SOC analyst is configuring file integrity monitoring (FIM) on a Linux server using Wazuh. They want the system to detect unauthorized changes to sensitive files like `/etc/passwd` the moment they occur, instead of waiting for the next periodic scan. A senior engineer advises modifying the directory monitoring configuration to enable immediate detection of such events. Which of the following configuration options should the analyst include to achieve this behavior?