This article has been indexed from Windows Incident Response
Over the years as a DFIR analyst…first doing digital forensics analysis, and then incorporating that analysis as a component of IR activity…there have been some stunningly simple truths that I’ve learned, truths that I thought I’d share. Many of these “tips” are truisms that I’ve seen time and time again, and recognized that they made much more sense and had more value when they were “named”.
Tips, Thought, and Stuff to Think About
Computer systems are a finite, deterministic space. The adversary can only go so far, within memory or on the hard drive. When monitoring computer systems and writing detections, the goal is not write the perfect detection, but rather to force the adversary into a corner, so that no matter what they do, they will trigger something. So, it’s a good thing to have a catalog of detections, particularly if it is based on things like, “…we don’t do this here..”.
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: Tips for DFIR Analysts