Active Threats: Procedures & Best Practices