An analyst recommends that an EDR agent collect the source IP address, make a connection to the firewall, and create a policy to block the malicious source IP address across the entire network automatically. Which of the following is the best option to help the analyst implement this recommendation?
kmordalv
Highly Voted 1 year, 9 months agoking_basir88
Most Recent 7 months, 3 weeks agoglenndexter
1 year, 2 months ago