- Feb 7, 2023
- 2,364
The rollback as well is poorly documented, there is no official documentation that explains it. Of course we can dive into the patents and find out even the mathematical formulas behind the clustering but that’s not the point.That is my opinion too.![]()
My question is, if untrusted process cuteGirl.exe spawns PowerShell and through that destroys or exfiltrates data, would the actions of the not-monitored and trusted PowerShell be undone?
Last edited: