An organization has just been breached, and the attacker is exfiltrating data from workstations. The security analyst validates this information with the firewall logs and must stop the activity immediately. Which of the following steps should the security analyst perform NEXT?
e020fdc
11 months, 2 weeks ago32d799a
1 year, 3 months agoCXSSP
1 year, 4 months ago