Looking at host-based IDS after NIDS gives us the basis

Looking at host-based IDS after NIDS gives us the basis to begin to make some comparisons between the two. – find an example of a system (or type of system) that you would recommend protecting with host-based IDS. Post a topic describing the system and briefly explaining why HIDS would be appropriate to use as security measure.