To summarize it, take a look at the incident response best practices checklist I share below. What could go wrong when trying to isolate the threat? If you don’t do it right, you could damage normal operations or overlook a fake threat.
Source: Heimdal Security Blog