Risk assessments
In this scenario, a security bulletin that outlines certain vulnerabilities, exploits, or malicious behavior prompts an organization to do a risk assessment. The risk assessment determines whether the organization is susceptible or is already compromised.
Objective
To solve the problem in these investigations, the organization has these objectives:
- Assess the presence of identified vulnerabilities in the organization.
- Detect the malicious presence of external parties.
- Uncover evidence of any compromise.
- Determine whether the organization is a victim of an exploit.
- Determine the user's identity.
Investigation
Use the tools on the Forensics tab to help you investigate.

- Use free-form search to search for traits of vulnerabilities, exploits, or other malicious behavior that is specified in the security bulletin.
- Use free-form search to cross-reference research or other data to derive indicators.
- Use Surveyor to investigate interactions that possibly exploited vulnerabilities that were identified.
- Examine suspect content that is flagged by the product.
- Review content that underlies potentially risky interactions by using data reconstruction.
- Use Surveyor to retrace the activities of potentially risky entities.