Module 4 practical

Monitoring and Incident Review VM

Work through an active AI security investigation the way a blue-team analyst would: review telemetry, define detections, triage the incident, contain the risky workflow, and verify recovery before release.

  1. Review the incident evidence and telemetry
  2. Document the detections and triage findings
  3. Harden alerting, containment, and recovery controls
  4. Deploy the defended workflow and run replay
Live browser workstation inside the recap room.
A

AISPLOIT monitoring and IR VM

supportpilot-incident-review

baseline monitoring config

Use Files, Workbench, Terminal, and Mission Control to complete the review.

Security Workbench

Editor

README.md

/home/analyst/README.md read only clean

Analyst Terminal

Console

Analyst terminal