F-Response Blog
Do you EDR?
20.05.2024
Since 2020, EDR (Endpoint Detection and Response) tools and platforms have become all the rage. Endpoint detection and response, also known as endpoint threat detection and response (ETDR), is a cybersecurity technology that continually monitors an "endpoint" (e.g. mobile phone, laptop, …
Read the full postAn Interview with Jason Hale of USB Detective
06.05.2014
A few days ago we profiled USB Detective, a fascinating desktop application for USB device artifact forensics.
Since that time, we reached to Jason Hale of USB Detective to get a …
Read the full postF-Response and USB Detective
29.04.2024
It should come as no surprise that we love finding new and interesting analysis tools. Finding investigative software that works well over F-Response is a passion of ours.
Recently, a customer reached out and asked us if USB Detective worked over an …
Read the full postSometimes you can't deploy...
25.03.2024
When it works, F-Response's built in deployment mechanisms are nothing short of magical. You put in some credentials, and we take care of the rest. We connect to the remote machine, negotiate the right protocol, and get the software where it needs to be. But when it doesn't work... Well, there's …
Read the full postF-Response 8.7.1.27 Now Available
21.03.2024
We're happy to announce the latest update to F-Response is now available on the downloads page. In this latest version, we've fixed a few outstanding issues, and added a new authentication option for F-Response Collect.
Starting in 8.7.1.27, you can now use Okta as an authentication …
Read the full post