The network operations center has identified malware, created a ticket within their ticketing system, and assigned the case to the SOC with high-level information.
A SOC analyst was able to stop the malware from spreading and identified the attacking host. What is the next step in the incident response workflow?
marceus
2 months, 3 weeks ago27ea763
3 months, 1 week agojay_c_an
10 months, 2 weeks agojay_c_an
10 months agoak_technonet
11 months, 3 weeks agoDrVoIP
1 year, 2 months ago