Specifications include, but are not limited to: The STATE is soliciting proposals for an application whitelisting solution. This solution will be used by BND to prevent unauthorized programs, applications, and application components (libraries, configuration files, etc.) from executing or installing on a host. The purpose is primarily to protect computers and networks from harmful applications, and, to a lesser extent, to prevent unnecessary demand for resources. The solution should include malware incident tracking along with the ability to perform forensic investigation across BND’s endpoints. The software will be used on computers and servers owned and maintained by the State of ND. Servers and computer systems used by BND which are not directly owned by BND are excluded. This would include systems such as Exchange servers, SharePoint servers, Network Infrastructure, etc. The preference is for this solution to be hosted on STATE’s Information Technology Department’s servers. Applicable Directives This information technology project is subject to the following: N.D.C.C. § 54 - 10 - 28 related to the state auditor’s authority to conduct information technology compliance reviews. N.D.C.C. §§ 54 - 35 - 15.2, 54 - 35 - 15.3, and 54 - 35 - 15.4 related reporting to and review by the Legislative Council Information Technology Committee. N.D.C.C.§ 54 - 59 related to the Information Technology Department Information Technology Solution