6. Symantec Specific Analysis Steps |
6.5. Post-op Prevent Recurrence |
![]() | 6.5.1. Patch Exploited Vulnerabilities |
![]() | 6.5.2. Disable AutoPlay |
6.1. Identify the Threat and Attack Vectors |
6.2. Identify the Infected Computers |
6.3. Quarantine the Infected Computers |
6.4. Clean the Computers Infected |