Security Incident Malicious Software workflow template

The Security Incident - Malicious Software - Template allows you to perform a series of tasks designed to handle malicious software on your network.

Before you begin

Role required: sn_si.write

About this task

The workflow is triggered when the Category in a security incident is set to Malicious Software. This action causes a response task to be created for the first activity in the workflow.

Malicious Software workflow template

Procedure

  1. Open the security incident for this potential attack, or create a new security incident.
  2. In Category, select Malicious code activity.
  3. Save the record.
  4. Scroll down and open the Response Tasks related list.
    The first of a series of response tasks appears. Each time the record is saved, your response to the previous task either causes the next response task to be created or the workflow to end.
    Table 1. Response tasks in Malicious Software Template
    Response task Action Results
    Scan Endpoint - Malware Found? After running a scan, determine whether malware was found.

    In the task, select Yes or No in Outcome.

    If you select Yes, the Remove Malware - Success? task is created.

    If you select No, the workflow ends.

    Remove Malware - Success? Determine whether the malware was successfully removed.

    In the task, select Yes or No in Outcome.

    If you select Yes, the Was there a larger breach? task is created.

    If you select No, the Wipe & Reimage task is created.

    Wipe & Reimage If you did not successfully remove the malware found, this task instructs you to perform a wipe and reimage on the computers infected with the malware. After the task is complete, the Set State to Review task is created.
    Was there a larger breach? Determine whether the breach caused by the malicious software is larger than first believed.

    In the task, select Yes or No in Outcome.

    If you select Yes, the following tasks are created in parallel:
    • Legal Review
    • HR Review
    • Law Enforcement Review

    If you select No, the workflow ends.

    Legal Review

    HR Review

    Law Enforcement Review

    Perform the steps necessary for each of these departments to review the process you followed to eradicate the malicious software. When the tasks are complete, the Set State to Review task is created.
    Set State to Review No action required. The State of the security incident is changed automatically to Review, and the workflow ends.