Malicious Software


Use this content use case to create a security case for malicious software.

Content pack title

Security Incident Handling Management

Case template

Malicious Software

Task templates

  • Scan Endpoint
  • Remove Malware
  • Remote Wipe
  • Scope of Breach
  • Wipe & Reimage
  • Legal Process
  • Law Enforcement Review
  • HR Review
  • Lessons learned meeting

Service request activity flow

The following sequence occurs when a security case for malicious software is created:

Malicious software request workflow\




 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*

BMC Helix for Security Incident Handling 25.4