A security analyst receives an escalation regarding an unidentified connection on the Accounting A1 server within a monitored zone. The analyst pulls the logs and discovers that a Powershell process and a WMI tool process were started on the server after the connection was established and that a PE format file was created in the system directory. What is the next step the analyst should take?
Sanjuana
5 months agoYun
5 months agoShayne
5 months agoNorah
5 months agoAnisha
6 months agoElbert
6 months agoVeronika
6 months agoNilsa
6 months ago