A team of security analysts has been alerted to potential malware activity. The initial examination indicates one of the affected workstations is beaconing on TCP port 80 to five IP addresses and attempting to spread across the network over port 445. Which of the following should be the team's NEXT step during the detection phase of this response process?
I_heart_shuffle_girls
Highly Voted 4 years, 3 months agoRokzyBalboa
4 years, 3 months agoDrChats
Highly Voted 3 years, 11 months agoheinzelrumpel
Most Recent 1 year, 9 months agoSimonR2
1 year, 9 months agoNIKTES
1 year, 8 months agokill_chain
1 year, 10 months agoDutch012
1 year, 10 months agokiduuu
2 years agoksr933
2 years, 1 month agoSnkrsnaker1
2 years, 1 month ago2Fish
2 years, 1 month agoshivas
2 years, 5 months agoManiact165
2 years, 6 months agoSolventCourseisSCAM
2 years, 6 months agoAbyad
2 years, 7 months agoLaudy
2 years, 8 months agomiabe
2 years, 9 months agocysa_1127
3 years, 2 months ago