Detection & Response

Assignments: 1. Investigate a suspicious file hash, 2. Use Playbook.