Compromised systems
In this scenario, an organization is alerted that one or more of their systems was compromised by an advanced cyber attack technique such as a watering hole, phishing, brute force, or an SQL injection.
Objectives
To solve the problem in these investigations, the organization has these objectives:
- Determine the extent of the compromise within the organization.
- Understand the type of operational risk of the compromise on each system.
- Uncover any peripheral actions that the initial attack did to circumvent cleanup activities and detection.
Investigation
Use the tools on the Forensics tab to help you investigate.

- Use free-from search to search for malicious payload or a compromised asset.
- Examine suspect content that is flagged by the product.
- Use Digital Impressions and Visualizations to explore entity relationships that result from compromised systems.
- Use Surveyor to see a timeline of activities so that you can retrace an attack.
- Discover inconsistencies or suspicious interactions across data categories by using free-form search, data pivoting, and suspect content.