IncidentResponsev2

Verify Containment is Successful

Task Verify That Containment Actions Were Fully Successful and No Adversary Presence Remains

Conditions

Given containment actions (account disablement, network isolation, service disabling, removal of malicious tools) have been completed, the operator will validate that impacted systems and networks no longer exhibit signs of compromise or unauthorized access.

Operator Note: Verification of containment is critical before proceeding to eradication and recovery. Failure to validate containment may result in reinfection or attacker re-entry.

Standards

End State

Containment is validated through host, network, and user behavior review. Adversary access has been removed or blocked, and the environment is stabilized for eradication and recovery phases.


Notes


Manual Steps

Step 1: Validate Host-Based Controls

Review for active attacker tools and malware

Get-Process
Get-ScheduledTask
Get-Service

Operator Note: Verify no malicious processes, tasks, or services remain enabled or running.

Review unauthorized accounts

net user
Get-LocalUser

Check for open network connections

netstat -ano

Confirm firewall and policy enforcement

Get-NetFirewallProfile | Format-Table Name, Enabled

Step 2: Validate Network-Level Controls

IDS/IPS / Firewall

DNS Logging

Network Segmentation


Step 3: Validate Enterprise Controls

Central Logging/SIEM

Endpoint Detection and Response (EDR)

Review Active Directory


Step 4: Validate User Behavior and Access


Running Script (Windows Bulk Containment Verification)

$computers = Get-ADComputer -Filter * -SearchBase "OU=Workstations,DC=example,DC=com"

foreach ($computer in $computers) {
    Invoke-Command -ComputerName $computer.Name -ScriptBlock {
        Get-Service | Where-Object { $_.Status -eq "Running" }
        Get-ScheduledTask | Where-Object { $_.State -eq "Running" }
        Get-LocalUser
    }
}

Operator Note: Useful for verifying across multiple endpoints quickly.


Dependencies


Other Available Tools

Tool Platform Use Case
PowerShell / Task Manager Windows Validate local host state
Netstat, Get-NetTCPConnection Windows/Linux Network connections
EDR Tools (Defender ATP, CrowdStrike, SentinelOne) Cross-platform Validate endpoint state
SIEM (Splunk, Sentinel, Elastic) Cross-platform Validate no new alerts
IDS/IPS, Firewall Logs Network Validate no malicious activity
DNS Logs Network Validate no malicious outbound communication

Operator Recommendations and Additional Tools

Operator Checklist

Best Practices


References

Microsoft Defender ATP Hunting Queries
NIST SP 800-61 Rev. 2 - Computer Security Incident Handling Guide


Revision History

Date Version Description Author
2025-05-02 1.0 Fully generated operator guide for verifying containment success at host, network, and enterprise levels Leo