The network operations center has identified malware, created a ticket within their ticketing system, and assigned the case to the SOC with high-level information.
A SOC analyst was able to stop the malware from spreading and identified the attacking host. What is the next step in the incident response workflow?
marceus
4 months, 2 weeks ago27ea763
5 months agojay_c_an
1 year agojay_c_an
11 months, 3 weeks agoak_technonet
1 year, 1 month agoDrVoIP
1 year, 4 months ago