Do you suspect that you have been attacked, do you want to help search potential malicious hideouts of attackers, check whether there are no suspicious events or signs of an attack in the activity logs? Or do you want to revise the settings and detection rules for EDR, SIEM or IDS, IPS?
We will analyze the detection mechanisms in your environment and mainly benchmark these detectors using hacking tools and tactics
Healthcheck log management solutions and rules
Defense bypass benchmark - resistance testing through tools and procedures used by real hackers
Reveal the hacker
searching for hiding places where the attacker could hide. The goal is to find any persistence of the attacker (hidden accounts, processes, services, attacked libraries, forged packets, etc.)
Behavioral analysis of the environment - analysis and detection of any anomalous or suspicious events
If you don’t have detection mechanisms yet or need to expand their power, we will help with
Deployment and configuration of the Microsoft Sentinel SIEM solution
Deployment and configuration of EDR, IDS, IPS
Deployment and configuration of Microsoft Defender technologies