Amazon GuardDuty has detected communications to a known command and control endpoint from a company's Amazon EC2 instance. The instance was found to be running a vulnerable version of a common web framework. The company's security operations team wants to quickly identify other compute resources with the specific version of that framework installed.
Which approach should the team take to accomplish this task?
Hungdv
Highly Voted 3 years, 8 months agogrekh001
3 years, 8 months agoDahMac
Highly Voted 3 years, 7 months agoRaphaello
Most Recent 1 year, 4 months agos50600822
1 year, 11 months agosamCarson
2 years agoITGURU51
2 years, 2 months agonairj
2 years, 2 months agoboooliyooo
2 years, 5 months agorrshah83
2 years, 7 months agosapien45
2 years, 10 months agoAlexey79
3 years, 1 month agoLaLune
3 years, 5 months agoHananS
3 years, 7 months agoSyeda123
3 years, 7 months agoDerekKey
3 years, 7 months agoPonzy
3 years, 7 months agoAyusef
3 years, 8 months ago