Type
Threat Detection
D3FEND Tactic
Message Analysis (D3-MA)Credential Eviction (D3-CE)
TL;DR
Isolates compromised files/systems to limit blast radius.
Description
Rules and procedures for isolating compromised or suspicious files, systems, or devices to prevent the spread of malware or other security threats.
Techniques