In SIEM software, a security analyst detected some changes to hash signatures from monitored files during the night followed by SMB brute-force attacks against the file servers. Based on this behavior, which of the following actions should be taken FIRST to prevent a more serious compromise?
novolyus
1 year, 7 months agokyky
2 years agokyky
2 years agokhrid4
2 years, 3 months agoyolylight
2 years, 3 months agojosephconer1
2 years, 3 months agoMockento
2 years, 7 months ago2Fish
2 years, 3 months agosh4dali
2 years, 9 months agoamateurguy
2 years, 9 months ago