When in doubt, isolate hosts, accounts, or segments first, then investigate. Preapproved triggers prevent debate over obvious steps. Provide offline imaging options and stepwise reconnect criteria, so business impact is minimized while preventing reinfection or hidden persistence from springing back later.
Standardize removal of scheduled tasks, startup entries, abused remote tools, and rogue identities. Include exact registry and service areas to review, password resets for admins and service principals, and token revocation steps. Short, proven sequences reduce rabbit holes and fragile improvisation.
Preserve memory and disk where appropriate, snapshot cloud workloads, and note time sources. Track who touched what, when, and why. Clear labeling, sealed bags, and centralized evidence locations avoid disputes later while still allowing frontline staff to move quickly.