Category: Incident Response & Threat Hunting
-
How to Build a Practical Incident Response Runbook for SMB Environments
Small and medium-sized businesses are frequent targets of cyberattacks, yet most of them lack a clear and usable incident response process. In many environments, incident response exists only as a policy document or not at all. When an actual incident occurs, teams improvise, leading to delayed containment and unnecessary damage. A practical incident response runbook…
-
Windows Privilege Escalation Suspicion – Incident Response Guide
Privilege escalation often follows an initial foothold. Early identification and controlled response are critical to limit damage while preserving evidence. Detection Indicators New local admin accounts Event ID 4672 (special privileges assigned) Unexpected group membership changes Suspicious scheduled tasks or services Scope Windows endpoints and servers Local and domain-joined systems Phase 1: Evidence Collection (READ-ONLY)…
-
Suspected RDP Brute Force Attack – Incident Response Runbook
RDP brute force attacks are among the most common intrusion attempts against Windows systems. This runbook provides a structured response workflow focused on containment, evidence preservation, and recovery without disrupting production unnecessarily. Detection Triggers Repeated Event ID 4625 (failed logon) Login attempts from multiple IPs Security alerts from SIEM or firewall Unexpected account lockouts Scope…