A security analyst on the threat-hunting team has developed a list of unneeded, benign services that are currently running as part of the standard OS deployment for workstations. The analyst will provide this list to the operations team to create a policy that will automatically disable the services for all workstations in the organization.
Which of the following BEST describes the security analyst’s goal?
A . To create a system baseline
B . To reduce the attack surface
C . To optimize system performance
D . To improve malware detection
Answer: B