This documentation sets out suggested steps for responding to a UNIX or NT system compromise.