You manage the IT for MNY Assets, a mid-sized financial services company. At around 10:30am, one of your users reported significant performance issues after opening an unusual email attachment. Since then, several other users have complained of slow network speeds and difficulty in accessing files.
You suspect one of your VMs has been exposed to malware. You need to find and isolate the source to prevent its spread, restore any corrupted data and maintain access to unaffected services for users to ensure continuity.
Complete the recovery tasks as they appear below by finding and dragging the relevant information from the runbook on the right.