Incident Response
Forensics – Digital Forensics for Security Incidents
Forensics reconstructs what actually happened — technically defensible, clearly documented, and suitable for incident decisions, management, and data protection.
Digital forensics answers the core questions after a security incident:
👉 How did attackers gain access?
👉 How did they move?
👉 Which systems were affected?
👉 Was data exfiltrated?
👉 Since when has the environment been compromised?
Attack path
Entry point, movement, persistence
Evidence
Forensically sound artifacts
Affected systems & data
Why forensics matters
In real-world incidents, the situation is rarely clear:
- logs are missing or fragmented
- systems have already been rebooted
- passwords were reset
- attacker activity may date back days or weeks
Without structured forensics, decisions remain assumptions.
Forensics provides defensible facts.
Objectives of forensics
- identify the entry point
- reconstruct lateral movement
- detect persistence mechanisms
Operational
- determine scope
- identify affected assets
- provide foundation for recovery
- assess data exposure
- document timelines
- support GDPR / NIS2
Typical technical scope
Telemetry & Logs
- EDR (Defender, CrowdStrike, SentinelOne)
- M365 / Entra ID sign-ins & Unified Audit Log
- Active Directory security events
- Firewall / VPN / proxy logs
- Azure Activity Logs / AWS CloudTrail
- Kubernetes audit logs (if applicable)
Endpoints & Servers
- volatile artifacts (processes, network connections)
- event logs, Prefetch, registry
- scheduled tasks, services, autoruns
- user profiles & browser artifacts
Cloud & Identity
- service principals
- API token usage
- conditional access changes
- privileged roles
When is forensics required?
- unclear root cause
- suspected data exfiltration
- compromised admin accounts
- ransomware / malware
- regulatory requirements
- partial visibility
- systems already modified
- management pressure
- missing timeline
Our forensic process
Collect artifacts
Correlate data
Reconstruct events
Derive conclusions
Document results
Common mistakes
- rebuilding systems before analysis
- uncoordinated password changes
- deleting or overwriting logs
- no clear evidence handling
- missing documentation
What you should prepare
- alerts / screenshots
- known affected systems
- actions already taken
- SIEM / EDR / cloud access
- decision maker
Outcomes (Deliverables)
Executive summary
Technical timeline
Attack path & IOC list
Recovery recommendations
GDPR / NIS2 context
Forensics provides the technical foundation for:
- personal data impact assessment
- notification decisions
- proof of due diligence
(no legal advice)
FAQ
How long does forensic analysis take?
From hours to several days — depending on scope and log quality.
Should systems be powered off?
No — isolate instead.
Will we receive a final report?
Yes — including executive summary and technical details.