Your business’ toughest competition might be criminal. See why.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    ebooks
    ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeWhy HuntressSecurity Operations Center
Explaining an Incident

Explaining an Incident


Published: 7/18/2025

Written by: Jake Vicini

Glitch effectGlitch effect

Receiving an incident report is stressful. You get an alert telling you something bad happened on a device, its network access has been cut off, and now you’ve got a list of remediations before you can bring it back online. You’re trying to make sense of the report Huntress has just sent, all the while you’re getting calls from your client asking why they don’t have internet access.

And things can get even worse. Hackers don’t always work a 9-5, so an incident report might hit your inbox in the middle of the night or on a weekend, leaving you scrambling to fix things before your client is back in the office on Monday.

Our incident reports try to strike a balance—detailed enough to be informative, but concise enough to help you take action quickly. But sometimes, the report alone isn’t enough to fully walk you through what happened.

That’s where Security Operations Center (SOC) Support comes in. You can reach out to us anytime, and we’ll walk you through the incident from the perspective of the SOC analysts here at Huntress, regardless of how big or small the incident is.

The example below demonstrates one of these cases, where the SOC support team was able to provide additional value to a partner facing a security incident.


Ticket walkthrough

This ticket highlighted one of the most valuable aspects of the SOC Support team—collaborating with our partners to build the full picture of an incident. Our SOC analysts can only report on what we see from our EDR’s perspective. But security is a team effort, and by working together with the partner we were able to piece together a much clearer chain of events.

Our partner received the following incident report, and they had a few questions as they worked through the remediations. 


Figure 1: Huntress Incident report


As the partner dug into the details, they noticed an alert from another security product had triggered at the same time. That raised some important questions:

  • Were we both alerting on the same exact thing?

  • Did we isolate the endpoint because we felt the malware hadn’t been properly contained?

  • Which alert came in first?

  • What did each product actually do?

And of course, one of the most critical questions—what needed to be done next?

To answer those questions, we needed to determine the sequence of events as things played out. The investigation carried out by our SOC focused on the execution of a process with malicious intent.

This highlights one of the key benefits of our Managed EDR: the focus on the behaviors attackers use to gain and maintain access, which often involves leveraging legitimate tools or services to do so. The additional layer of antivirus (AV) provided another perspective, flagging the presence of the downloaded file itself. Together, this helped us answer key questions about what happened, when it took place, and what actions were taken to contain the threat.


The support perspective 

When a partner reaches out with questions about an incident report, the SOC Support team’s first priority is to review the investigation from our end, starting with what our SOC analysts reported and what remediation steps were recommended.

One of the most useful tools at our disposal is the ability to review the specific signal that triggered the report:



Figure 2 : Signals Investigated tab on the Incident report


In this case, there was only one signal that detected malware being downloaded from a suspicious domain.This gives us a solid starting point—we can immediately see what process triggered our alert. Often, the signal is one we’re familiar with, making it easier to quickly piece together the scenario. But this time, the detection wasn’t one we encounter every day, so it warranted adeeper dive.

Our next step was understanding exactly what triggered this detection and why.



Figure 3 : Rule Description from internal Dashboard


The image above was pulled from our SOC dashboard, helping us break down the nature of the signal and the logic behind the detector.

After researching, we determined that we sent this report out because we saw a command being run on this machine that made a connection to a domain listed in the “Living Off Trusted Sites (LOTS) Project” —a database that tracks websites that are often abused in phishing campaigns.

At this stage, we had enough information to confidently assess that the user named in the incident report had likely been phished, and we isolated the host after we saw a connection made to a compromised domain hosting malware. With that context, we were ready to walk the partner through the incident from Huntress’ perspective.


Reviewing the antivirus alert

With a clear understanding of the activity we had reported on, the next step was to review the alert the partner had shared in order to create a timeline of events and put together the full picture. The alert in question showed that a file downloaded had been detected, quarantined, and deleted by the AV.

The file was downloaded seconds after the command execution, and was linked to the same user profile we had seen execute the command. Additionally, the alert from the AV had the same timestamp as the one included in our report. This is what originally had caused the partner to question the sequence of events—were we both responding to the same thing, or was something potentially missed?

At this point, the picture was becoming clearer, and some of the language in our incident report made more sense. Our SOC analyst had noted:

"This typically attempts execution of additional malware starting with a .lnk file hosted at this resource, but user interaction appears to have ceased after initially accessing this remote resource."

Put simply, we observed the initial connection to the malicious domain and expected it to download a secondary payload, but in this case, we didn’t see clear evidence that a malicious file was downloaded.


Answering the partner's questions

Now that both reports had been reviewed, we were able to address the partner’s specific questions.

Were we both alerting for the same thing? What occurred first in the timeline? Our response below directly addressed the partner’s ticket request for timelines on both alerts. 

Huntress detected the execution first, but the actual malware download happened seconds later.

More specifically, Huntress Managed EDR detected the process (Rundll32.exe) responsible for reaching out and downloading the malware. The AV alerted us of the malware file that was downloaded from that domain. This aligns with typical detections from AV solutions that perform signature-based scanning on files.

This explained why both alerts had such close timestamps—our EDR saw thecommand executing, while the AV saw the payload once it had reached disk.


Why did Huntress isolate the endpoint?

We explained:

Huntress doesn’t isolate an endpoint just because malware is present—we do it to prevent further execution and prevent it from spreading across a network

One of the partner’s biggest concerns was why Huntress had isolated the endpoint despite their AV successfully removing the malware. This is a common question and a great opportunity to explain the value of EDR vs. AV.

Even if an AV solution successfully removes a malicious file, there are still risks:

  • The attacker could have deployed additional payloads before the file was deleted.
  • There could be persistence mechanisms left behind that allow the attacker to regain access.
  • The malware could have executed other commands before it was quarantined.

By isolating the endpoint, we ensured that network activity by the malware was prevented, the admin had time to fully investigate for any lingering threats, and the integrity of the system was preserved before reconnecting the device to the network.


What needs to be done next?

This ticket was an example of an interaction with a partner when stakes were fairly low, and an incident had already been remediated,but that wasn’t immediately clear to the partner based on the incident report alone. By the end of the conversation, the partner had an understanding of what had taken place and the purpose behind our suggested remediations.


Conclusion

Stakes may not always be low, and many incidents have the potential to cause even greater damage. Dealing with those incidents alone can be stressful.

The SOC Support team is here to assist our partners as they navigate the specifics of our incident reports, or if they just need an additional set of eyes on any security-related concerns they have.

Protect What Matters

Secure endpoints, email, and employees with the power of our 24/7 SOC. Try Huntress for free and deploy in minutes to start fighting threats.
Try Huntress for Free
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy