An engineer received a report of a suspicious email from an employee. The employee had already opened the attachment, which was an empty Word document. The engineer cannot identify any clear signs of compromise but while reviewing running processes, observes that PowerShell.exe was spawned by cmd.exe with a grandparent winword.exe process. What is the recommended action the engineer should take?
Buck
2 months agoLinwood
11 days agoChu
12 days agoGeraldine
16 days agoTequila
2 months agoEarleen
2 months agoGwenn
17 days agoRefugia
1 months agoHannah
1 months agoRashida
2 months agoAshleigh
2 months agoTamar
1 months agoJill
1 months agoLuis
1 months agoLeonie
2 months agoAlonzo
2 months agoKiley
2 months agoAndra
2 months ago