REVIEWED by Sophos
Imagine the scenario - you see what looks to be a suspicious process on an endpoint, maybe you've used Live Query to list modules but you need to dig a little deeper.
Well, how about the following workflow:
Initiate a Live Response...