Rogue Server or Service


Use this content use case to create a security case for a rogue server or service.

Content pack title

Security Incident Handling Management

Case template

Rogue Server or Service

Task templates

  • Verify Rogue Server
  • Identify impacted systems
  • Update systems - Remove rogue connections
  • Potential data loss
  • Lessons learned meeting

Service request activity flow

The following sequence occurs when a security case is created for a rogue service or service:

Rogue Server or Service request workflow




 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*

BMC Helix for Security Incident Handling 25.3