When working in large network breaches, the technique of removing the infected hosts immediately and one-by-one is not the best or only option.