Analyst Quickstart Guides

Step-by-step checklists for the first 15 minutes, first hour, and first 4 hours of an incident. Track your progress and never miss a critical step.

Ransomware

Time-boxed response path for ransomware incidents covering initial triage through eradication. Prioritises containment to stop encryption spread, evidence preservation for decryption feasibility, and backup validation for recovery.

13 steps|8 critical|~170m

Phishing

Time-boxed response path for phishing incidents from initial email analysis through credential remediation. Focuses on rapid IOC extraction, recipient-scope determination, email quarantine, and post-compromise activity analysis across M365 and Azure AD.

12 steps|6 critical|~160m

Business Email Compromise

Time-boxed response path for business email compromise incidents. Prioritises halting fraudulent financial transactions, revoking cloud sessions, identifying impersonation tactics, and preserving email evidence chains for potential law-enforcement referral.

12 steps|6 critical|~150m

Data Exfiltration

Time-boxed response path for data exfiltration incidents. Focuses on confirming active exfiltration, blocking outbound channels, preserving network and host evidence, and determining the scope of data loss for regulatory notification and business impact assessment.

12 steps|6 critical|~170m

Insider Threat

Time-boxed response path for insider threat investigations. Emphasises covert evidence collection, HR and legal coordination, and maintaining operational secrecy to prevent evidence destruction while building a defensible case for personnel action or law-enforcement referral.

11 steps|6 critical|~170m

Cloud & Identity Compromise

Time-boxed response path for cloud identity compromise incidents targeting Azure AD, M365, and associated cloud services. Prioritises immediate session revocation, MFA enforcement, tenant-configuration review, and OAuth app auditing to eliminate attacker persistence in the cloud identity plane.

12 steps|6 critical|~160m

Web Application Compromise

Time-boxed response path for web application compromise incidents. Covers initial access vector validation, server isolation, evidence preservation, web-shell hunting, and vulnerability remediation to restore the application to a known-good state.

12 steps|7 critical|~170m

Credential Theft

Time-boxed response path for credential theft incidents including credential dumping, pass-the-hash, Kerberoasting, and credential harvesting attacks. Focuses on rapid account lockdown, volatile-evidence capture, credential-dumping technique analysis, and comprehensive credential reset across the environment.

11 steps|6 critical|~160m

Supply Chain Attack

Time-boxed response path for a compromised software vendor or third-party library. Moves from vendor-advisory ingestion through blast-radius estimation, package rollback, and malicious-payload analysis. Emphasizes separating "package present" from "payload executed" from "attacker infrastructure contacted".

10 steps|8 critical|~315m

APT / Nation-State Intrusion

Time-boxed response path for a suspected advanced persistent threat. APT incidents reward patience and thoroughness over speed: the fastest short-term containment is often the cause of failed long-term eradication. This path emphasizes TTP characterization, dwell-time hunting, and assume-breach recovery.

10 steps|7 critical|~315m

Crypto Mining

Time-boxed response path for unauthorized cryptocurrency mining. Treats the miner as a foothold signal, not a resource-theft event. Focuses on identifying miner family, closing the entry vector, and confirming whether secondary attacker tooling is also present.

10 steps|8 critical|~315m

DDoS Attack

Time-boxed response path for an active denial-of-service attack. DDoS is a speed-plus-volume problem; mitigation latency kills more than attack magnitude. This path emphasizes rapid characterization, scrubbing activation, and parallel hunting for secondary intrusion that may be hidden behind the flood.

10 steps|6 critical|~315m