Chapter 29: Mitigation Techniques
Reconfigure endpoint security solutions
Application approved list
Application blocklist/deny list
Quarantine
Configuration changes
Firewall rules
MDM
DLP
Content filter/URL filter
Update or revoke certificates
Isolation
Containment
Segmentation
SOAR
Runbooks
Playbooks