Upgrade to add your own logo

EnCase Endpoint Security | Detection and Remediation Essentials

Now that you’ve isolated the infected machine, learn how to find other infected machines, and then remediate the malware from them. This is part 5 of 5 videos in the Detection and Remediation Essentials series

0:00 Remediate files from infected machines
0:18 Find other infected machines
1:46 Remediate the infected machines

If you find this video useful, please like or comment.
Check out related videos on how to get the most out of EnCase Endpoint Security: https://youtube.com/playlist?list=PLEB6VOrLXy0cK0r3AV7sNZaBm-mv_FCyw

Subscribe to be notified whenever we post new content: http://www.youtube.com/OpenTextHowTo?app=desktop&sub_confirmation=1

This video was created using the default UI of EnCase Endpoint Security 21.3. What you see in this video might not reflect what you see in your version or customized interface.

#OpenText #EnCaseEndpointSecurity #NetworkSecurity