A security analyst receives an escalation regarding an unidentified connection on the Accounting A1 server within a monitored zone. The analyst pulls the logs and discovers that a Powershell process and a WMI tool process were started on the server after the connection was established and that a PE format file was created in the system directory. What is the next step the analyst should take?
Bobster02
Highly Voted 1 year, 11 months agomarceus
Most Recent 2 months, 2 weeks agoDrVoIP
8 months, 2 weeks agoNoxman
9 months, 3 weeks agoTOLU1985
1 year, 1 month agojaciro11
1 year, 2 months ago