A SOC analyst observes reconnaissance activity from an IP address. The activity follows a pattern of short bursts toward a low number of targets. An open-source review shows that the IP has a bad reputation. The perimeter firewall logs indicate the inbound traffic was allowed. The destination hosts are high-value assets with EDR agents installed. Which of the following is the best action for the SOC to take to protect against any further activity from the source IP?
Cyde
2 months, 3 weeks agoCyde
2 months, 3 weeks agoPopeyes_Chicken
3 months agoWolf541
3 months agoPopeyes_Chicken
3 months ago