Phishing


Use this content use case to create a security case for phishing.

Content pack title

Security Incident Handling Management

Case template

Phishing

Task templates

  • Confirm a phishing attack occurred
  • Scan Endpoint
  • Remove Unread Phishing Email in Queue
  • Remove Malware
  • Remote Wipe
  • Lessons learned meeting
  • Update email protection software

Service request activity flow

The following sequence occurs when a security case for phishing is created:

Phishing attack request workflow




 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*

BMC Helix for Security Incident Handling 25.4