To ensure admissibility of evidence from a legal standpoint, once the incident was identified and the server isolated, the next step should be to: