Port 22

Microsoft security experts outline next steps after compromise recovery