How to investigate a suspicious alert

preview_player
Показать описание
In this video, Incident Handler turned Sales Engineer Kellon Benson dives into a step-by-step process to investigate an alert that could signal a potential threat in your environment. Kellon explores how to analyze command lines, process trees, and event logs to uncover if an alert is a legitimate threat or a false positive.

Intro 0:00
We have an alert! 0:37
What’s the alert telling me? 01:10
What’s interesting about it? 2:08
Is it a threat? 04:37

Follow us:
---
Red Canary stops cyber threats no one else does, so organizations can fearlessly pursue their missions. We do it by delivering managed detection and response (MDR) across enterprise endpoints, cloud workloads, network, identities, and SaaS apps. As a security ally, we define MDR in our own terms with unlimited 24×7 support, deep threat expertise, hands-on remediation, and by doing what’s right for customers and partners.

Subscribe to our YouTube channel for frequently updated, how-to content about Atomic Red Team, threat hunting in security operations, MDR or Managed Detection and Response, and using the MITRE ATT&CK® framework.

#cybersecurity #threatdetection #incidentresponse #emotet #SOC
Рекомендации по теме
visit shbcf.ru