The contents of analysis:
- Detection status of the anti-virus software
- Logs of a suspicious Internet communication
- Web browsing
- Connection of a removable media
- Connection to a wireless LAN
- The list of installed programs
Benefits of application:
- Real-time monitoring and detecting harmful factors.
- Trace and prevent threats (threat hunting)
- Forensics reverse investigation to determine how the attack worked and develop better protection after a real risk has occurred.