Suspicious Network & Endpoint Activity Investigation Guide
This guide combines a structured documentation checklist with an actionable toolkit in PowerShell and Python to help rapidly investigate and respod to suspicious activity on a Windows-based endpoint. It includes tutorials for all tools and programs mentioned.Documentation, Triage/Remediation & Reporting Structure
1. Initial Triage & Observation
Symptoms Observed:
- Unexpected outbound connections
- CPU/disk spikes
- Unknown open ports
- Software behaving erratically
- System slowdown
- Time & Date Logged
- System(s) Affected: IP address / Hostname
- Alert Source Verficication/Review:
- User report
- SIEM
- EDR alert
- IDS/IPS
- Valid Security Alert (OS/AV)
- Etc.