IR-002endpointv1.0.0
Malware Endpoint Containment
⚠️ high⚠️ critical
⏱ Est. Time45m
📋 Steps12 steps
🔧 Tools5 required
🔗 Integrations5 platforms
📊 Avg Resolution90m
🔧 Tools Required
edrsiemthreat intelligence platformnetwork firewallforensics platform
⚡ Triggers
edr_malware_detectionav_alertsiem_malware_correlation_ruleuser_reported_suspicious_behaviorndr_c2_beacon_detected
🔌 Integrations
req
crowdstrike falcon
Primary EDR — real-time detection, containment, and forensics
req
splunk
SIEM correlation, log aggregation, threat hunting
opt
carbon black
Alternative EDR — process tree analysis and live response
opt
palo alto cortex xdr
Alternative XDR platform
req
virustotal
Malware hash and file reputation lookups
Click each step to expand the full procedure, automation hints, and expected outputs.