Information

This site will undergo a brief period of maintenance on Thursday, 23 April at 2:30 AM Central/1:00 PM IST. During a 30 minute window, site availability may be intermittent.

Unauthorized Access


Use this content use case to create a security case for unauthorized access.

Content pack title

Security Incident Handling Management

Case template

Unauthorized Access

Task templates

  • Are user credentials compromised
  • Determine if malicious software was introduced
  • Deactivate user account
  • Contact user and determine intent
  • Lessons learned meeting

Service request activity flow

The following sequence occurs when a security case is created for unauthorized access:

Unauthorized access request workflow




 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*

BMC Helix for Security Incident Handling 25.3