A user reports a malware alert to the help desk. A technician verifies the alert, determines the workstation is classified as a low-severity device, and uses network controls to block access. The technician then assigns the ticket to a security analyst who will complete the eradication and recovery processes. Which of the following should the security analyst do NEXT?
SimonR2
2 years agoTKW36
2 years, 6 months ago2Fish
2 years, 4 months agoms200
2 years, 7 months agoms200
2 years, 7 months agobob12356
2 years, 7 months ago[Removed]
2 years, 5 months agoComptia_Secret_Service
2 years, 7 months ago