End point and network protection tools to monitor end-user behavior for dangerous activity shall be implemented.
End point and network protection tools that monitor end-user behavior for dangerous activity shall be managed.
Software usage and installation restrictions shall be enforced.