Nowadays, a company has at least two internet services to protect its operation or at least its critical services or users, but normally the solution is unfinished, because although the necessary elements are in place, many times these actions must be executed manually and with the dependence of an expert in the subject, which makes it complicated and tedious to carry it out quickly and effectively, when it should be a simple and routine action.