A SOC analyst received an alert about a potential compromise and is reviewing the following SIEM logs:
Which of the following is the most appropriate action for the SOC analyst to recommend?
The SIEM logs indicate suspicious behavior that could be a sign of a compromise, such as the launching of cmd.exe after Outlook.exe, which is atypical user behavior and could indicate that a machine has been compromised to perform lateral movement within the network. Isolating laptop314 from the network would contain the threat and prevent any potential spread to other systems while further investigation takes place.
Nina
7 months agoBambi
8 months agoJosphine
8 months agoCarma
8 months agoEdelmira
8 months agoNobuko
8 months agoIsaiah
8 months agoGianna
9 months agoBok
9 months agoXochitl
9 months agoArmando
10 months agoSanjuana
10 months agoVallie
10 months agoKanisha
10 months agoIzetta
10 months agoMelita
10 months agoGrover
10 months agoRaina
10 months agoHobert
8 months agoRonald
8 months agoChau
8 months agoFallon
9 months agoChaya
9 months agoBea
9 months agoRosendo
9 months ago