EnCase Endpoint Security | Detection and Remediation Essentials
Now that you’ve isolated the infected machine, learn how to find other infected machines, and then remediate the malware from them. This is part 5 of 5 videos in the Detection and Remediation Essentials series
0:00 Remediate files from infected machines
0:18 Find other infected machines
1:46 Remediate the infected machines
If you find this video useful, please like or comment.
Check out related videos on how to get the most out of EnCase Endpoint Security: https://youtube.com/playlist?list=PLEB6VOrLXy0cK0r3AV7sNZaBm-mv_FCyw
Subscribe to be notified whenever we post new content: http://www.youtube.com/OpenTextHowTo?app=desktop&sub_confirmation=1
This video was created using the default UI of EnCase Endpoint Security 21.3. What you see in this video might not reflect what you see in your version or customized interface.
#OpenText #EnCaseEndpointSecurity #NetworkSecurity
0:00 Remediate files from infected machines
0:18 Find other infected machines
1:46 Remediate the infected machines
If you find this video useful, please like or comment.
Check out related videos on how to get the most out of EnCase Endpoint Security: https://youtube.com/playlist?list=PLEB6VOrLXy0cK0r3AV7sNZaBm-mv_FCyw
Subscribe to be notified whenever we post new content: http://www.youtube.com/OpenTextHowTo?app=desktop&sub_confirmation=1
This video was created using the default UI of EnCase Endpoint Security 21.3. What you see in this video might not reflect what you see in your version or customized interface.
#OpenText #EnCaseEndpointSecurity #NetworkSecurity