Recent Posts
Blog
How To Investigate Endpoints with Cyber Triage and Windows Defender
It’s important to quickly start collecting DFIR artifacts when an...
Blog
DFIR Next Steps: What to do after you find a suspicious Windows Network Logon Session
This post in the “DFIR Next Steps” series is about...
Blog
Windows Scheduled Tasks for DFIR Investigations
Welcome to the first post in a multi-part series about...
Popular categories
Videos
New Features
New Features
New Features