Breached?

Indicator of Compromise Assessment

Identify vulnerabilities, mitigate risks and be better prepared against cyber threats.

Our indicator of compromise assessment utilizes our extensive experience within cybersecurity to identify potential malicious compromise signatures that may already exist within your network and systems. This allows us to give you key insights into your environment to assess whether your organization may have already been the victim of a cyberattack.

Our team employs a comprehensive approach to cybersecurity and proactive incident response services that are part of our overall strategy to secure our clients’ networks and key systems. Below are some of the checks that are provided with an indicator of compromise (IOC) assessment:

  • Antivirus log analysis
  • Network device log analysis
  • Web filter log analysis
  • Windows event log analysis from key servers or endpoints
  • Forensic artifacts review of critical Windows systems
  • Cloud log analysis (e.g., Azure, AWS, or O365)
  • Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) log analysis
  • Security Information and Event Management (SIEM) log analysis
  • Email security appliance or software log analysis
  • Network device firmware integrity checks
  • Access point (AP) log analysis
  • Sensitive application/web security log analysis

While the primary goal of the assessment is to determine if there is already a compromise of critical systems, Schneider Downs will also provide a security architecture review and recommend improvements to improve the multiple layers of security protecting your organization. This includes reviewing the following items, leveraging our extensive client experiences:

  • Web filters
  • Antivirus products
  • SIEM products
  • IDS/IPS (integrated firewalls or standalone devices)
  • Data Loss Prevention (DLP) Software
  • Email Security Products
  • Cybersecurity User Education
  • Network Architecture
  • DMZ Architecture
  • Patch Management
  • Windows Event Logging Analysis

Our Process

  1. Interview to scope the analysis
  2. Conduct public domain searches, custom IP and domain scans, DNS scans, metadata scans, and web bug attacks
  3. Review and validate findings and refine configuration to re-scan as necessary; write report
  4. Report, review, and knowledge transfer

About Schneider Downs Cybersecurity

The Schneider Downs cybersecurity practice consists of experts offering a comprehensive set of information technology security services, including penetration testing, intrusion prevention/detection review, ransomware security, vulnerability assessments and a robust digital forensics and incident response team. In addition, our Digital Forensics and Incident Response teams are available 24x7x365 at 1-800-993-8937 if you suspect or are experiencing a network incident of any kind.

Want to be in the know? Subscribe to our bi-weekly newsletter, Focus on Cybersecurity, at www.schneiderdowns.com/subscribe.

To learn more, visit our dedicated Cybersecurity page.

View our additional IT Risk Advisory services and capabilities

Breached?

Every moment counts. For urgent requests, contact the Schneider Downs digital forensics and incident response team at 1-800-993-8937. For all other requests, please complete the form below.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.