A company discovered an attack propagating through their network via a file. A custom file detection policy was created in order to track this in the future and ensure no other endpoints execute to infected file. In addition, it was discovered during testing that the scans are not detecting the file as an indicator of compromise. What must be done in order to ensure that the policy created is functioning as it should?
zeroC00L
Highly Voted 3 years, 5 months agosull3y
Highly Voted 2 years agoCyberGhost666
Most Recent 1 month, 3 weeks agoMarshpillowz
10 months, 1 week agoNaderelmansi
1 year, 10 months agoEmlia1
2 years, 2 months agosis_net_sec
2 years, 3 months agootzu1
2 years, 9 months agoWang87
3 years agodr4gn00t
3 years agoCock
3 years, 1 month agoJetnor
3 years, 2 months agozheka
3 years, 2 months agoflejd
3 years, 1 month agoflejd
3 years, 1 month agoGatPat
2 years, 1 month agoNullNull88
3 years, 2 months agobrownb
3 years, 2 months agoeazy99
3 years, 4 months agoic0deem
3 years, 5 months agoSarbi
3 years, 5 months ago