A. Advise the user to run a complete system scan using the OS anti-malware application.
B. Guide the user to reboot the machine into safe mode and verify whether the anomalous activities are still present.
C. Have the user check for recently installed applications and outline those installed since the link in the email was clicked.
D. Instruct the user to disconnect the Ethernet connection to the corporate network.