A security analyst receives an escalation regarding an unidentified connection on the Accounting A1 server within a monitored zone. The analyst pulls the logs and discovers that a Powershell process and a WMI tool process were started on the server after the connection was established and that a PE format file was created in the system directory. What is the next step the analyst should take?
Bobster02
Highly Voted 2 years agomarceus
Most Recent 4 months, 2 weeks agoDrVoIP
10 months, 2 weeks agoNoxman
11 months, 2 weeks agoTOLU1985
1 year, 3 months agojaciro11
1 year, 3 months ago