- Knowledge Base
- Information Technology
- Email, Accounts, & Access
This article outlines how the University of Montana Information Security Office responds to compromised devices, including containment, remediation, and restoration of access, following the Identify, Protect, Detect, Respond, and Recover incident response framework.