Overview

What this service is (and when to use it)

Compromise Assessment (DFIR-lite) is designed for organizations that need a fast, structured answer to the question: “Are we compromised?” It focuses on high-signal evidence sources (endpoints, identity, email, and key logs) to identify indicators of compromise, suspicious persistence, and likely intrusion paths.

Common triggers

Suspicious alerts, unusual account activity, ransomware concerns, data exposure indicators, or third‑party notifications.


Primary outcomes

Triage findings, likely attack timeline, affected assets/users, and prioritized containment and remediation actions.


What it is not

A full forensic investigation for legal proceedings, or a complete incident response with eradication and rebuild—those can be scoped as a next step if needed.


Best fit environments

Microsoft 365 / Entra ID, Windows endpoints, common EDR/XDR stacks, and organizations with centralized logging (SIEM optional).

What’s Included

High-signal checks that answer “Are we compromised?”

Scope is tailored to your environment and available telemetry. Typical inclusions:

Identity & access triage

Review privileged accounts, risky sign-ins, MFA posture, suspicious OAuth/app consent, and anomalous access patterns.

Endpoint compromise sweep

Targeted endpoint review for persistence, suspicious processes, malware traces, and high-confidence indicators across priority devices.

Email & collaboration review

Mailbox rules, forwarding, suspicious logins, and common BEC patterns; review of key artifacts in M365 where applicable.

Deliverables

Clear outputs you can act on immediately

You receive practical, audit-friendly documentation and a prioritized action plan.

Executive summary

What we found, what it means, and what to do next—written for leadership and stakeholders.


Findings & evidence pack

Indicators of compromise (IOCs), affected accounts/assets, supporting artifacts, and confidence levels.


Containment & remediation plan

Prioritized actions (0–24h, 1–7d, 7–30d) mapped to risk reduction and operational impact.


Optional retest / validation

Follow-up validation to confirm containment actions reduced the identified risk.

Typical timeline

Fast turnaround, with daily touchpoints during the assessment window.

Most engagements complete in 3–10 business days depending on scope, number of endpoints/users, and log availability. We start with a short kickoff to confirm priority assets, access requirements, and communication channels, then proceed with evidence collection and analysis.

Talk to an Analyst

Rapid assessment (remote)

Focused triage for a defined set of users/endpoints and key log sources. Ideal for quick confirmation and immediate next steps.

Request a Consultation

Expanded assessment

Broader coverage across business-critical systems, additional endpoints, and deeper identity/email review for higher confidence.

Request a Consultation

IR escalation (as needed)

If compromise is confirmed, we can scope full incident response support for containment, eradication, recovery, and hardening.

Request a Consultation

Tell us what you’re seeing (alerts, unusual activity, suspected breach). We’ll respond with a recommended scope, required access, and a timeline.

Contact Us

(049) 302 1782

2/F CJRS Bldg. Rodeo Drive Laguna Bel-Air 2, Brgy Don Jose, Sta Rosa, Laguna, 4026