A user reports a malware alert to the help desk. A technician verifies the alert, determines the workstation is classified as a low-severity device, and uses network controls to block access. The technician then assigns the ticket to a security analyst who will complete the eradication and recovery processes. Which of the following should the security analyst do NEXT?
SimonR2
1 year, 9 months agoTKW36
2 years, 3 months ago2Fish
2 years, 1 month agoms200
2 years, 3 months agoms200
2 years, 3 months agobob12356
2 years, 4 months ago[Removed]
2 years, 1 month agoComptia_Secret_Service
2 years, 4 months ago