Malware Identification Decision Tree |
5. Suspect Trojan |
5.1. Manual Analysis and Remediation Steps | |
5.2. Wipe/Restore Machine? | |
5.3. Widespread? | |
5.4. Post-op Prevent Recurrence Policy |
1. Suspect Worm |
2. Suspect Advanced Persistent Threat |
3. Incident Response Phases |
4. Suspect Virus |
6. Symantec Specific Analysis Steps |
7. Information References |