6.1.4. Configure SEP to higher security state
6.1. Identify the Threat and Attack Vectors
6.1.4. Configure SEP to higher security state
6.1.4.1. Configure Auto-Protect to allow network scanning.
6.1.4.2. Configure All IPS Signatures in Log-only
6.1.4.3. Configure Application Control to Monitor Common Load Points
6.1.4.4. Increase the Bloodhound level to High
6.1.4.5. Increase the sensitivity of Proactive Threat Protection
6.1.0. Acquire Binary
6.1.1. Submit the file to Symantec Response
6.1.2. Upload to VirusTotal.org
6.1.3. Upload to www.threatexpert.com to get High Level overview
6.1.5. Upload to Anubis.iseclab.org
6.1.6. Observed Activity
6.1.7.Run SEP Support tool
By
Efrain Ortiz