*** Hopeleonie ***
asked on
Which Threat Artifacts are important when a system is compromised?
Hallo Experts
I would like to collect the following Threat Artifacts from a compromised Windows System:
What would you collect? Is there any best practice from NIST or anyware?
Thanks a lot
I would like to collect the following Threat Artifacts from a compromised Windows System:
- CPU
- Routing-, ARP- & Process tables
- Memory
- Temporary files
- Relevant data from storage media
What would you collect? Is there any best practice from NIST or anyware?
Thanks a lot
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER