While preparing a software inventory report, a security analyst discovers an unauthorized program installed on most of the company’s servers. The program utilizes the same code signing certificate as an application deployed to only the accounting team. After removing the unauthorized program, which of the following mitigations should the analyst implement to BEST secure the server environment?
ApplebeesWaiter1122
Highly Voted 2 years, 1 month agoAfel_Null
Highly Voted 1 year, 8 months agoMarcelmikael
Most Recent 1 year, 4 months agoBD69
1 year, 3 months agoPaula77
1 year, 4 months agoklinkklonk
1 year, 5 months agodavid124
1 year, 5 months agoTCP_13
1 year, 6 months agocybertechb
1 year, 5 months agodavid124
1 year, 5 months agoganymede
1 year, 6 months agoBD69
1 year, 4 months agoganymede
2 years, 4 months agoBD69
1 year, 4 months agoganymede
2 years, 4 months agoUfuk_Ari
2 years, 4 months agoganymede
2 years, 4 months agoBD69
1 year, 4 months agoganymede
2 years, 4 months agoJibz18
2 years, 4 months agosdc939
2 years, 4 months ago