An organization requires immediate notification of unauthorized alterations to their financial system's executable files to maintain the integrity of its processing environment. Which implementation will best meet this requirement?
Deploy a system that provides real-time alerts for modifications to sensitive files.
Schedule regular event log auditing to track user access and changes.
Enhance antivirus settings to perform hourly scans of financial data
Configure an intrusion detection system to scan for network breaches.