Deploy a host-based intrusion detection solution on enterprise assets, where appropriate and/or supported.