The network operations center has identified malware, created a ticket within their ticketing system, and assigned the case to the SOC with high-level information. A SOC analyst was able to stop the malware from spreading and identified the attacking host. What is the next step in the incident response workflow?
Romana
8 months agoCassi
8 months agoBo
8 months agoJamal
8 months agoKenda
8 months agoJani
8 months agoParis
8 months agoDevora
8 months agoBrittni
8 months agoLyndia
8 months agoHelene
8 months ago