13.2—Deploy a Host-Based Intrusion Detection Solution
IG2
IG3
Devices
Detect
>Control Description
Deploy a host-based intrusion detection solution on enterprise assets, where appropriate and/or supported.
>Cross-Framework Mappings
>Relevant Technologies
Technology-specific guidance with authoritative sources and verification commands.
Ask AI
Configure your API key to use AI features.