This documentation supports the 25.1 version of BMC Helix for Security Incident Handling.To view an earlier version, select the version from the Product version menu.

Unauthorized Access


Use this content use case to create a security case for unauthorized access.

Content pack title

Security Incident Handling Management

Case template

Unauthorized Access

Task templates

  • Are user credentials compromised
  • Determine if malicious software was introduced
  • Deactivate user account
  • Contact user and determine intent
  • Lessons learned meeting

Service request activity flow

The following sequence occurs when a security case is created for unauthorized access:

Unauthorized access request workflow




 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*