Endpoint Compromise Response Sheet
Incident Overview
| Incident ID |
|
| Date & Time Detected |
|
| Reported By |
|
| Endpoint Name / ID |
|
| Location |
|
| Owner / User |
|
Description of Compromise
Initial Actions Taken
- Isolate endpoint from the network:
- Capture volatile memory/image:
- Collect relevant logs/artifacts:
- Other (specify):
Investigation
Containment, Eradication, and Recovery
Post-Incident Actions
- Reset passwords:
- Update security controls/rules:
- Vulnerability remediation:
- User notification/training:
- Review/update incident response plan:
Lessons Learned