https://store-images.s-microsoft.com/image/apps.31199.7ee41f50-86e3-4a59-9337-e5657a24a8ac.b6e24615-64ea-451b-822f-2bda3e1e1513.ba07a8f1-b73b-46b5-bd1f-c28bde7fe42d

Fortis IR Compromise Assessment

Sentinel Technologies Inc.

A high-level forensics evaluation designed to identify current and past threat activity.

Sentinel’s compromise assessment uses lightweight scripts coupled with AI-based tools to identify anomalies and correlate them to root causes. These indicators of compromise (IOCs) answer the question, “Are we (or have we previously been) compromised?” If no compromise is detected, our focus shifts to identifying any risks detected in your Microsoft 365 systems. When attempting to identify a compromise, Sentinel’s expert technical analysts investigate the following areas: Compromise assessments can be performed for any or all of the following technologies. • Data Exfiltration & Sabotage • Command & Control (Botnet) Detection • User Account Activities • Malware & Persistence Tools • Network, Host, & Application Configurations • Privilege Escalations • Risks & Vulnerabilities AREAS OF EXPERTISE • Client & Server Endpoint Devices • Cloud Email Platforms • Network Edge Devices •Perimeter Web Servers • Active Directory

De un vistazo

https://store-images.s-microsoft.com/image/apps.52572.7ee41f50-86e3-4a59-9337-e5657a24a8ac.b6e24615-64ea-451b-822f-2bda3e1e1513.d8ada3c2-3fa0-4c22-9ddf-f731992d1f01