0 / 60 seg.

You have recovered a server that was compromised in a malware attack to its previous state. What is the final step in the incident response process?