System File Analysis

Monitoring system files such as authentication databases, configuration files, system logs, and system executables for modification or tampering.

ID: D3-SFA
Subclasses:  D3-SBV
Tactic: