Employ organization-defined tools to analyze the characteristics and behavior of malicious code.
No STIG checks reference this CCI.