Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Temporarily locking a user's account, to limit damage to their personal information and resources
  • Locking one or more accounts to prevent damage from spreading to new accounts or devices
  • Taking one or more devices physically (or virtually, via software) off the network, to prevent intrusion
  • Removing unauthorized software ("malware")
  • Reimaging/rebuilding affected machines, resetting them to a "known good" state
  • Requestion that a user, or set of similar users, update software, in order to secure a device they are responsible for

...