A SOC analyst received an alert about a potential compromise and is reviewing the following SIEM logs:
Which of the following is the most appropriate action for the SOC analyst to recommend?
The SIEM logs indicate suspicious behavior that could be a sign of a compromise, such as the launching of cmd.exe after Outlook.exe, which is atypical user behavior and could indicate that a machine has been compromised to perform lateral movement within the network. Isolating laptop314 from the network would contain the threat and prevent any potential spread to other systems while further investigation takes place.
Nina
10 months agoBambi
10 months agoJosphine
10 months agoCarma
11 months agoEdelmira
11 months agoNobuko
11 months agoIsaiah
11 months agoGianna
11 months agoBok
1 years agoXochitl
1 years agoArmando
1 years agoSanjuana
1 years agoVallie
1 years agoKanisha
1 years agoIzetta
1 years agoMelita
1 years agoGrover
1 years agoRaina
1 years agoHobert
11 months agoRonald
11 months agoChau
11 months agoFallon
12 months agoChaya
12 months agoBea
12 months agoRosendo
12 months ago