6. Symantec Specific Analysis Steps |
6.3. Quarantine the Infected Computers |
![]() | 6.3.1 Proceed to Containment Phase |
6.1. Identify the Threat and Attack Vectors |
6.2. Identify the Infected Computers |
6.4. Clean the Computers Infected |
6.5. Post-op Prevent Recurrence |