Response actions for individual cyber kill chain nodes

If you need to manage the incident in more granular detail, you can apply various response actions to individual cyber kill chain nodes. These response actions enable you to quickly and easily remediate any node.

To apply global response actions to an entire incident, see Remediate an entire incident.

Response actions are divided into the following categories, although not all nodes include all of the following categories:

  • Remediate: Actions in this category enable you to apply an immediate response to the attack, and include managing network isolation for a workload, and the deletion and quarantining of files, processes, and registry values.
  • Investigate: Actions in this category (applicable to workloads only) enable you to run a Forensic backup, or remote desktop connection for a more in-depth investigation.
  • Investigate: Actions in this category (applicable to workloads only) enable you to run a remote desktop connection for a more in-depth investigation.
  • Recovery: Actions in this category (applicable to workloads only) enable you to respond to intensive attacks by running a recovery from backup, or Disaster Recovery failover.
  • Prevent: Actions in this category enable you to prevent future threats or false positives by adding them to a protection plan allowlist or blocklist.
If an incident is closed, you cannot apply a response action to a node. However, you can reopen a closed incident by changing its investigation state to Investigating. When reopened, you can then apply response actions.

The following table describes each of the node types in the cyber kill chain, the applicable categories for each node, and the response actions available.

Node Category Response Actions
Workload Remediate
Investigate
Investigate
Recovery
Prevent
Process Remediate
Prevent
File Remediate
Prevent
Registry Remediate
Network Prevent