STIG ID: WN22-00-000220 | SRG: SRG-OS-000363-GPOS-00150 | Severity: medium | CCI: | Vulnerability Id: V-254259
Monitoring system files for changes against a baseline on a regular basis may help detect the possible introduction of malicious code on a system.
Monitor the system for unauthorized changes to system files (e.g., *.exe, *.bat, *.com, *.cmd, and *.dll) against a baseline on a weekly basis. This can be done with the use of various monitoring tools.
Determine whether the system is monitored for unauthorized changes to system files (e.g., *.exe, *.bat, *.com, *.cmd, and *.dll) against a baseline on a weekly basis.
If system files are not monitored for unauthorized changes, this is a finding.
An approved and properly configured solution will contain both a list of baselines that includes all system file locations and a file comparison task that is scheduled to run at least weekly.