3.1. Preparation |
3.1.3. Deploy host-based intrusion detection and prevention systems, including file |
3.1.3. Deploy host-based intrusion detection and prevention systems, including file integrity checkers, to critical hosts.
Host-based IDPS software, particularly file integrity checkers, can detect signs of malicious code incidents, such as configuration changes and modifications to executables.