| Malware Identification Decision Tree |
| 6. Symantec Specific Analysis Steps |
![]() | 6.1. Identify the Threat and Attack Vectors |
![]() | 6.2. Identify the Infected Computers |
![]() | 6.3. Quarantine the Infected Computers |
![]() | 6.4. Clean the Computers Infected |
![]() | 6.5. Post-op Prevent Recurrence |
| 1. Suspect Worm |
| 2. Suspect Advanced Persistent Threat |
| 3. Incident Response Phases |
| 4. Suspect Virus |
| 5. Suspect Trojan |
| 7. Information References |
Source of some of this information: http://service1.symantec.com/support/ent-security.nsf/854fa02b4f5013678825731a007d06af/52f4f4d80ac9a7b2882576ac0067121c?OpenDocument