During an incident response, an organization identifies that multiple systems have been compromised. What is the BEST approach to accurately determine the scope of the compromise?
Re-image all suspected systems and return them to operation
Perform a quick scan using antivirus software on all systems
Isolate all potentially compromised systems from the network
Conduct thorough log analysis and correlate findings with known Indicators of Compromise (IoCs)