Customize the Malware Infection Use Case by including the following sections for each single endpoint, multiple endpoints, and server infection:
- Incident summary
- Escalation process diagram
- Detailed response procedures
- Revision history
Align the response procedures with Phase 2: Operate as outlined in the Develop and Implement a Security Incident Management Program blueprint.