Windows Incident Response

This article is specific to the Windows Operating system (Server, Desktop, etc.). The tools and resources found here will enable you or your team to quickly obtain incident information and help triage any affected systems. If your a small business looking for security or a means to collect information to provide a robust threat hunt, detection or mitigation strategy you may use these tools to do so.

If you require assistance with collecting evidence on a system that has been affected by a potential breach please


Linux Incident Response

Incident response is not only limited to the Windows desktop or, server environment. In a mixed environment you may find Linux, Windows, OS X or MacOS. Responding to incidents within Linux may become a challenge for administrators who are either over-worked, or have a small team / resources.

Network Defense Solutions, Inc. has developed a set of scripts and, tools that can be utilized for artifact collection and incident response. It is estimated that companies do not know they have sustained until approximately 380 days after a breach! Don't be one of those companies. With the tools and scripts we've developed obtaining the information you need to discern whether your systems have suffered a breach is easier than you think. All our scripts categorize the information you need by user, and artifact collected. If you require assistance with collecting evidence on a system that has been affected by a potential breach please


Apple & MacOS Incident Response

With the last 10 years Apple has been positioning itself as a major contender to the Microsoft Operating system in the workforce. Many companies have a mixed environment with both Apple and Windows products. Catering more resources to the other can put companies at a disadvantage when it comes to triaging an incident. When responding to incidents within an OSX / MacOS environment, there may be quite a few challenges for administrators to overcome. Considering the documentation is limited within this scope, we have put together some scripts to help lessen the gap for incident responders in MacOS.

Network Defense Solutions, Inc. has developed a set of scripts and, tools that can be utilized for artifact collection and incident response. It is estimated that companies do not know they have sustained until approximately 380 days after a breach! Don't be one of those companies. With the tools and scripts we've developed obtaining the information you need to discern whether your systems have suffered a breach is easier than you think. All our scripts categorize the information you need by user, and artifact collected. If you require assistance with collecting evidence on a system that has been affected by a potential breach please


Login Form