Containment actions
What are appropriate actions?
Shutdown
Disconnect from the network
Leave connected and observe
Scope and assessment importance
PreviousDetermining status of infected/affected computing resourcesNextContainment tools and techniques
Last updated