Quarantine Threats
Last updated
Last updated
Based on the direction from the SOC team, you will now quarantine the threat to ensure you don't use this snapshot for recovery and avoid any reinfection.
To get started:
Select the eicar.com file.
Click QUARANTINE next to the (...) ellipses.
On the Quarantine Objects wizard, click QUARANTINE.
Click DONE.
Congratulations on quarantining the threat!
You can now use the Hash values (MD5, SHA256, SH1) to run a complete Threat Hunt to ensure no other older snapshots are affected by the IOC.
With Threat Monitoring, you now have a proactive approach to cybersecurity. You can now stay ahead of the threat landscape, decrease risk exposure, and minimize the potential impact of security incidents.