You are located in service: Security Operation Center (SOC)

How should infected systems be handled?

How should infected systems be handled?

Kurzinformation

 

There are no general recommendations for action here, as knowledge of the type of infection must already be available.

In the case of a system that is currently being encrypted, it should be shut down or disconnected from the power supply as quickly as possible to avoid data loss. In the case of a system that is sending spam, unplugging the Ethernet cable is sufficient.
In all cases, however, do not panic and never delete data, as this will destroy any evidence.

last changed on 10/22/2024

How did this content help you?

Creative Commons Lizenzvertrag
This work is licensed under a Creative Commons Attribution - Share Alike 3.0 Germany License