While investigating findings in Enterprise Security, an analyst has identified a compromised device. Without leaving ES, what action could they take to run a sequence of containment activities on the compromised device that also updates the original finding?
Anisha
1 day agoHelene
6 days agoDestiny
11 days agoPauline
17 days agoBarney
22 days agoBrice
27 days agoZona
2 months agoKiera
2 months agoMalissa
2 months agoJeffrey
2 months agoTiera
2 months agoKaycee
2 months agoJacquelyne
3 months agoFreeman
3 months agoJules
3 months agoCelestina
3 months agoMickie
3 months agoNieves
3 months agoSelene
4 months agoDominga
4 months agoMargarett
4 months agoNichelle
4 months agoFrancoise
4 months agoDorothy
5 months agoCamellia
5 months ago