Not terribly concerned about it being identified. Between the network segmentation, local firewalls, limited local permissions, EDR, IPS-IDs and other security items we deemed it more important to quickly identify the location of the machine. If it is compromised we need to know how to find it and resolve ...
|