Description: Unauthorized Changes refer to modifications made to a computer system without the proper authorization from the system administrators or owners. These alterations can include the installation of unapproved software, changes to security configurations, or alterations of critical data. The main characteristic of these changes is that they are carried out without the explicit consent of the responsible parties, which can lead to the introduction of significant vulnerabilities. These vulnerabilities can be exploited by external or internal attackers, compromising the integrity, confidentiality, and availability of information. Detecting unauthorized changes is crucial for information security, as it allows for the identification of security breaches and the prevention of potential attacks. In any environment, change management is an essential process that seeks to ensure that all modifications are documented and approved, thereby minimizing the risk of security incidents. The implementation of monitoring and auditing tools is fundamental to detect and respond to these unauthorized changes, ensuring that systems remain secure and operational.