ASF-GitBook
CtrlK
LinkedInX (ex-Twitter)
  • PRESENTATION
  • Cloud/SysOps
    • Securing your AWS Infrastructure
    • Send_email_with_RSS_feed_content
    • Count_how_many_actives_users_service_account
    • Active Directory Tiering
  • Asset Security
    • Securing your BIOS / UEFI
    • Smartphones_configuration
  • GRC
    • Vulnerability Management Basics
    • Ready_for_cyber_disaster
    • Cyber threat mapping
    • Be prepare for Cybercrises
  • Security Assessment and Testing
    • Newsletter_CVE
    • CISA_KEV_Alert_Script
    • Create a SOC lab
  • FORENSICS
    • IR playbook
    • Investigate Phishing
  • INCIDENT HANDLING
    • TweetFeed Jira Check
    • Rebuild_your_AD_after_compromise
      • Definitions
      • CHRONOLOGY
      • USUAL MODUS OPERANDI OF RANSOMWARE
      • LIST OF ACTIONS TO TAKE
        • NETWORK
        • STOP THE DEPLOYMENT OF ENCRYPTION
        • BUILD THE NEW DOMAIN
        • CERTIFICATE
        • HARDENING YOUR NEW INFRASTRUCTURE
        • TIER MODEL / ENTERPRISE ACCESS MODEL
      • FLOWCHART
    • Restore AD without third party software
    • Windows-Emergency-update-out-of-WSUS-schedule
    • OS for Blue Team work
  • UNIVERSITAIRES (unis)
    • Books CTI Fundamentals
    • Security Certification Roadmap
Powered by GitBook
On this page
  1. INCIDENT HANDLING
  2. Rebuild_your_AD_after_compromise

LIST OF ACTIONS TO TAKE

NETWORKSTOP THE DEPLOYMENT OF ENCRYPTIONBUILD THE NEW DOMAINCERTIFICATEHARDENING YOUR NEW INFRASTRUCTURETIER MODEL / ENTERPRISE ACCESS MODEL
PreviousUSUAL MODUS OPERANDI OF RANSOMWARENextNETWORK