

If you are a developer or interested in the details IOC 1.1 specification you can look here. Note that Redline does not support IOC 1.1. This version brings updated IOC terms that allow us to create IOCs for HX real-time alerting and for searching the contents of the HX event buffer (ring buffer). The installation file Mandiant IOCe.msi can be downloaded from here.

There are two versions of IOC editor in the website. IOCs are XML documents that help incident responders capture diverse information about threats, including attributes of malicious files, characteristics of registry changes, artifacts in memory, etc.
#Fireeye redline download free
Indicators of Compromise (IOC) Editor is a free tool for Windows that provides an interface for managing data and manipulating the logical structures of IOCs. Let’s briefly go over some of the things that will be useful. One of the main freeware tools is the IOC Editor. On the FireEye Market website there are a few things that are freeware and can be downloaded without subscription. For this post I’m looking at the Endpoint Security apps that might extend the functionality of the HX or enhance the analyst ability to perform the work faster/better. If you are a FireEye customer you likely have seen this before.
#Fireeye redline download download
Goal is to improve threat detection and ability to analyze the results therefore increase the effectiveness of your product and maximize the outcome of your investigations.įireEye makes available a website named fireeye.market where one can download apps that extend the functionality of existing products. Today’s notes are primarily focused on two things: Increase awareness about tools that will help augment HX capability to detect attacks Increase awareness about tools that will help the analyst ability to work with the results. HX can be used in the realm of protection, detection, and response. HX is very powerful, feature rich but like many EDR products it tends to be designed for more seasoned incident responders with specialized skill set. I also tend to see HX or other EDR solutions on organizations with mature security operations that use such technology to increase endpoint visibility and improve their capabilities to detect and respond to threats on the endpoints. I tend to use HX when performing large scale Enterprise Forensics and Incident Response. If you don’t use FireEye HX, this post likely has no interest for you. Today I am going to write a few notes about tools that should be part of your toolkit in case you use FireEye Endpoint Security product a.k.a.
