Application should include
- reconfiguring endpoint security solutions
- application whitelisting
- application blocklisting
- device quarantine
- making configuration changes
- firewall rules
- mobile device management (MDM)
- DLP
- content filter and/or URL filter
- certificate updates or revocations
- implementing network segmentation
- creating security, orchestration, automation, and response (SOAR)