Isolate a system for suspicious activity — Carbon Black Defense

  1. Login into Active Directory
  2. Click on the domain to which the user has been added
  3. Search for the user in the domain and click find
  4. right-click the user, select diable account
  1. Login Carbon Black Cloud
  2. Navigate to Inventory -> Endpoints in dashboard
  3. Search for the system
  4. Select -> Take Actions -> Assign Policy -> Disabled OU

--

--

--

CyberPunk who always wanted to explore a new horizons over cyber space. Doing pen testing into my own network systems for detecting the vunerabilities .

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Configuring VirtualBox for Scambaiting: Part 2

Search and Seizure in the Digital Age: Carpenter v. United States

New DAI/MIXS Pool on Dec 31st & 98/2 MIXS/WETH pool ends soon

{UPDATE} Item Challenge Hack Free Resources Generator

{UPDATE} Cross Virus Hack Free Resources Generator

The Importance of Managing Threat Intelligence

UmamiSwap Alpha Sniper

ZelNodes + Flux + Kadena — Coin Distribution

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Akilnath Bodipudi

Akilnath Bodipudi

CyberPunk who always wanted to explore a new horizons over cyber space. Doing pen testing into my own network systems for detecting the vunerabilities .

More from Medium

Tracking SugarLocker ransomware & operator

Sharing VPN, Internet host networks with Hyper-V Ubuntu on Windows 10

Much ado about time — UTC and NTP: Part 2

Audit Logs: Best Practices for Security