# Security Analyst

**Scenario**

A security analyst wants to ensure the integrity of critical system files in a financial institution's server.

**Command**

Run regular scans using Four Clover's hash verification feature (`sha256` algorithm) to detect unauthorized modifications.

**Example Command**

```bash
fourclover snapshot mytargetdir -hashes sha256 -name "System Integrity Check"
```

**Outcome**

The scan report highlights any changes to system files, ensuring data integrity and aiding in identifying potential security breaches.
