Explore our core capabilities to transform your workflows.
Be inspired by over 500 pre-built workflows.
Discover our latest updates and releases.
Isolate and take a snapshot of an AWS EC2 instance that might be compromised. This can allow for forensic investigation to be performed while quarantining the host.
How it works
Import this story to your tenant, from where you can adapt it to meet your unique needs.