3.1.7. Configure intrusion detection software to alert on attempts to




 

3.1.7. Configure intrusion detection software to alert on attempts to gain unauthorized access.

Network and host-based intrusion detection software (including file integrity checking software) is valuable for detecting attempts to gain unauthorized access. Each type of software may detect incidents that the other types of software cannot, so the use of multiple types of computer security software is highly recommended.