Automated Response

Introduction

If business continuity is important then the machine must be restored to a known safe state. If critical files have been modified then they can be restored from trusted read-only media. See examples in “Restoration of a known “good” state” on page 202.

184

Appendix B

Page 196
Image 196
HP Host Intrusion Detection System (HIDS) manual 184