This document provides guidelines for handling a suspicious network activity or incident. It outlines six steps for incident response: preparation, identification, containment, remediation, recovery, and aftermath. The preparation step involves ensuring monitoring tools, contacts, and alert processes are in place. Identification involves detecting the incident from various sources and analyzing related logs, traffic, and impacted systems. Containment aims to limit the attack's impact by disconnecting compromised areas and isolating affected systems. Remediation takes actions to stop the malicious behavior by blocking sources and performing technical fixes. Recovery works to restore normal system operations. The aftermath step involves documenting details in a report and identifying improvements.