In this module
References & Further Reading
Figure — References & Further Reading.
References & Further Reading
The content in Practical Incident Response: Windows and Microsoft 365 is grounded in the tool documentation, forensic methodology, and technical references listed below. This page is updated as new modules are published.
Forensic Tool Documentation
Eric Zimmerman. "EZTools — KAPE, PECmd, MFTECmd, EvtxECmd, AmcacheParser, and more." https://ericzimmerman.github.io
Detection depth: NE-specific implementation
This detection rule addresses a technique that directly threatens NE's operational environment. The implementation accounts for NE's specific infrastructure characteristics:
Telemetry source: The primary data table for this detection ingests approximately 0.5-3.2 GB/day depending on the activity volume. At NE's scale (810 users, 865 devices, 42 servers), the event volume generates a stable baseline that statistical detection methods (percentile analysis from DE9.4) can reliably characterize. Deviations from this baseline represent either environmental changes (new applications, infrastructure modifications) or attacker activity.
The myth: Evidence collection can wait until the investigation is underway
The reality: Volatile evidence disappears with every passing minute. Running processes, network connections, logged-in sessions, and memory contents are lost on reboot. The first responder's priority is evidence preservation — not investigation. Collecting a memory dump, capturing network state, and imaging volatile storage BEFORE beginning the investigation ensures evidence integrity. Investigate later with complete data rather than investigating now with incomplete data.