A company discovered an attack propagating through their network via a file. A custom file detection policy was created in order to track this in the future and ensure no other endpoints execute to infected file. In addition, it was discovered during testing that the scans are not detecting the file as an indicator of compromise. What must be done in order to ensure that the policy created is functioning as it should?
zeroC00L
Highly Voted 3 years, 3 months agosull3y
Highly Voted 1 year, 10 months agoMarshpillowz
Most Recent 8 months, 2 weeks agoNaderelmansi
1 year, 8 months agoEmlia1
2 years agosis_net_sec
2 years, 2 months agootzu1
2 years, 7 months agoWang87
2 years, 10 months agodr4gn00t
2 years, 10 months agoCock
2 years, 11 months agoJetnor
3 years agozheka
3 years agoflejd
2 years, 11 months agoflejd
2 years, 11 months agoGatPat
1 year, 11 months agoNullNull88
3 years agobrownb
3 years agoeazy99
3 years, 3 months agoic0deem
3 years, 3 months agoSarbi
3 years, 3 months ago