Check the server for indications of an authenticated attack. If an attack is detected, use mitigation measures to stop it. ...