F-Response Blog


Do you EDR?

20.05.2024

Since 2020, EDR (Endpoint Detection and Response) tools and platforms have become all the rage. Endpoint detection and response, also known as endpoint threat detection and response (ETDR), is a cybersecurity technology that continually monitors an "endpoint" (e.g. mobile phone, laptop, …

Read the full post

An Interview with Jason Hale of USB Detective

06.05.2014

A few days ago we profiled USB Detective, a fascinating desktop application for USB device artifact forensics.

Since that time, we reached to Jason Hale of USB Detective to get a …

Read the full post

F-Response and USB Detective

29.04.2024

It should come as no surprise that we love finding new and interesting analysis tools. Finding investigative software that works well over F-Response is a passion of ours.

Recently, a customer reached out and asked us if USB Detective worked over an …

Read the full post

Sometimes you can't deploy...

25.03.2024

When it works, F-Response's built in deployment mechanisms are nothing short of magical. You put in some credentials, and we take care of the rest. We connect to the remote machine, negotiate the right protocol, and get the software where it needs to be. But when it doesn't work... Well, there's …

Read the full post

F-Response 8.7.1.27 Now Available

21.03.2024

We're happy to announce the latest update to F-Response is now available on the downloads page. In this latest version, we've fixed a few outstanding issues, and added a new authentication option for F-Response Collect.

Starting in 8.7.1.27, you can now use Okta as an authentication …

Read the full post