
28
©
SOLIDA SYSTEMS INTERNATIONAL 2017
10. Responding To Critical Events
A majority of all events will require no further action by the user. These events are marked with
a low or medium severity.
Critical events require immediate user intervention. Examples of such events are DGA events.
They will be generated if ransomware infects a computer in the network. In this case it is
extremely important to remove the infected computer from the rest of the network. Some
advanced ransomware are capable of propagating through the network and infecting additional
computers.
The critical events will be listed with the source and destination IP addresses visible. Use the
destination IP address from the event and match it with a computer in the LAN that uses this IP
address. This is the computer that has become infected. Disconnect this computer from the rest
of the network.
Once the infected computer has been removed from the network, use Google to search for any
available removal tools.