Go To Home

The Scalable Endpoint Forensics Triage Guide

Endpoint Forensics

Inside You’ll Find

The tools and processes used by our ShadowHunt threat hunting team to run endpoint forensics. This handbook includes:

  • Links to seven tools in our endpoint forensics kit that are easy to set up and require zero installation.
  • Recommendations on how to approach an endpoint investigation and preparing for possible challenges.
  • Practical tips for L1, L2, and L3 analysts on how to use the handbook effectively.
  • An eight-point step-by-step guide that walks you through everything you need to do to investigate an endpoint.


Grab Your Copy

Much dreaded form coming up
We hate forms too but this one will help us get to know each other. Promise
Go to home

Simple solutions for detecting and containing threats. Working with us does not break the bank or your spirit. We’re the company of choice for offensive security teams with a Net Promoter Score of 70+.

© 2015-2021 Smokescreen. All rights reserved.

Solutions For
Web Application AttacksLateral MovementRansomware AttacksTargeted ThreatsSocial EngineeringMalware-less Attacks