Inside You’ll Find
The tools and processes used by our ShadowHunt threat hunting team to run endpoint forensics. This handbook includes:
- Links to seven tools in our endpoint forensics kit that are easy to set up and require zero installation.
- Recommendations on how to approach an endpoint investigation and preparing for possible challenges.
- Practical tips for L1, L2, and L3 analysts on how to use the handbook effectively.
- An eight-point step-by-step guide that walks you through everything you need to do to investigate an endpoint.
Grab Your Copy
Much dreaded form coming up
We hate forms too but this one will help us get to know each other. Promise