3.1.3. Deploy host-based intrusion detection and prevention systems, including file




 

3.1.3. Deploy host-based intrusion detection and prevention systems, including file integrity checkers, to critical hosts.

Host-based IDPS software, particularly file integrity checkers, can detect signs of malicious code incidents, such as configuration changes and modifications to executables.