DFIR

Digital Forensics and Incident Response

If you are experiencing a security breach, an operational, technical, or security-related incident of any kind, please do not hesitate to contact us immediately. Every minute counts.


Improbus DFIR:

The following points guide our work in DFIR cases. The list is not exhaustive or comprehensive, but it is intended to provide an overview of the process in a DFIR case.

  • Preparation: Initial contact, initial interviews, and gathering basic information.
  • Detection: Identify, validate, and scope the incident.
  • Containment: Limit impact, isolate objects, and secure assets.
  • Analysis: Gather more information and metadata, identify IOCs, patterns, etc.
  • Eradication: Remove breach cause(s), harden systems, and limit access.
  • Recovery: Restore services (if down), and monitor relevant systems closely.
  • Post-Incident Activities: Documentation, further hardening of security, improving controls and policies, tuning logging and detection, providing further security recommendations, etc.