Even with the best security controls, sometimes your system is hacked. This is a critical moment and you want to follow strict procedures to quickly identify and act on the problem.
How to automatically enforce post-incident process?
After you detect malware in a VM, one of the first things you want to do is to separate them from your production infrastructure. Try our pre-built workflow for this and customize to your needs