While investigating findings in Enterprise Security, an analyst has identified a compromised device. Without leaving ES, what action could they take to run a sequence of containment activities on the compromised device that also updates the original finding?
Zona
9 hours agoKiera
6 days agoMalissa
11 days agoJeffrey
16 days agoTiera
21 days agoKaycee
26 days agoJacquelyne
1 month agoFreeman
1 month agoJules
1 month agoCelestina
2 months agoMickie
2 months agoNieves
2 months agoSelene
2 months agoDominga
2 months agoMargarett
2 months agoNichelle
3 months agoFrancoise
3 months agoDorothy
3 months agoCamellia
3 months ago