A SOC analyst observes reconnaissance activity from an IP address. The activity follows a pattern of short bursts toward a low number of targets. An open-source review shows that the IP has a bad reputation. The perimeter firewall logs indicate the inbound traffic was allowed. The destination hosts are high-value assets with EDR agents installed. Which of the following is the best action for the SOC to take to protect against any further activity from the source IP?
Popeyes_Chicken
Highly Voted 4Â months agoJustheretolook
Most Recent 1Â week, 4Â days agoOnly12go
3Â weeks, 3Â days agoCyde
4Â months agoCyde
4Â months agoWolf541
4Â months, 1Â week agoPopeyes_Chicken
4Â months ago