4.4. Post-op Prevent Recurrence Policy
4. Suspect Virus
4.4. Post-op Prevent Recurrence Policy
4.4.1. Custom IPS Signature Possible?
4.4.2. Is it possible to leverage Application and Device Control
4.4.3. Firewall Block policy possible?
4.4.4. If False Positive Add to Centralized Exceptions Policy in
4.1. Manual Analysis and Remediation Steps
4.2. Wipe/Restore Machine?
4.3. Widespread?
By
Efrain Ortiz