IncidentResponsev2

4.21 Find and Contain Rogue Workstations

Task

Locate rogue or unauthorized workstations on the network and isolate them to prevent potential damage, data exfiltration, or continued attacker access.


Conditions

Given:


Standards


End State


Notes


Manual Steps

Detection Phase - Identify Rogue Workstation

Indicators of Rogue Workstations


Step-by-Step Detection Procedures

1. Validate the Alert or Suspicion
2. Scan Network for Unauthorized Devices
Nmap Options:
# List Scan - See what hosts are visible
nmap -sL <IP Address/Subnet>

# Ping Scan - Find active hosts
nmap -sn <IP Address/Subnet>

# ARP Scan - Fast local network discovery
nmap -PR <IP Address/Subnet>

# No ping scan (useful if hosts block ping)
nmap -Pn <IP Address/Subnet>
Additional detection methods
show mac address-table
Nessus Scan (if authorized)

Containment Phase - Isolate Rogue Workstation

Step-by-Step Containment Procedures

Option 1 → Switch Port Shutdown
interface GigabitEthernet1/0/24
shutdown
Option 2 → Switch Access Layer ACL
Option 3 → Boundary Firewall
Option 4 → DHCP Deny List (Windows DHCP)
Option 5 → Group Policy (GPO)

Reporting and Follow-up


Running Script Examples

Nmap Full Discovery Example

nmap -sn 192.168.1.0/24
nmap -PR 192.168.1.0/24

Windows DHCP Deny MAC (manual method)

Switch Port Example (Cisco)

show mac address-table
interface GigabitEthernet1/0/24
shutdown

Dependencies


Other Available Tools

Tool Platform Installation Usage
Nmap Cross-platform Native or installed Network discovery
Nessus Cross-platform Installed Vulnerability and host scanning
Wireshark Cross-platform Installed MAC / ARP / IP analysis
Switch CLI Network Native to switch Port control and MAC review
DHCP Manager Windows Server Native Manage DHCP deny/allow lists
Group Policy Windows Domain controllers Enforce network rules

Operator Recommendations and Best Practices

Operator Checklist

Best Practices


References


Revision History

Date Version Description Author
2025-05-02 1.0 Original retained + expanded with operator workflow, containment methods, tool usage, and escalation guidance Leo