Containment

1. Isolation

Physically or logically isolate affected systems:

2. Network Segmentation

Implement network segmentation to limit lateral movement:

3. Endpoint Isolation

Disconnect compromised endpoints:

4. Firewall Rules

Adjust firewall rules to block malicious traffic: