Mechanisms exist to utilize File Integrity Monitor (FIM) technology to detect and report unauthorized changes to system files and configurations.
Does the organization utilize File Integrity Monitor (FIM) technology to detect and report unauthorized changes to system files and configurations?