The network operations center has identified malware, created a ticket within their ticketing system, and assigned the case to the SOC with high-level information. A SOC analyst was able to stop the malware from spreading and identified the attacking host. What is the next step in the incident response workflow?
Romana
6 months agoCassi
5 months agoBo
5 months agoJamal
5 months agoKenda
5 months agoJani
5 months agoParis
5 months agoDevora
5 months agoBrittni
6 months agoLyndia
6 months agoHelene
6 months ago