Go to Enforce > Policies > Select the desired policy >
Which additional steps must be taken to complete the task?
The application powershell.exe was leveraged to make a potentially malicious network connection.
Which action should the administrator take immediately to block that connection?
Which immediate action is recommended to prevent further exfiltration?