Incident response plans and processes
Communication with internal and external stakeholders
Personnel role and responsibilities
Incident reporting
Allow list/block list
IDS/IPS rules configuration
Network segmentation
Web content filtering
Port blocking
Firewall
IDS/IPS
Web proxy
Anti-malware
Endpoint security solutions
DLP
Windows tools to analyze incidents
Registry
Network
File system
Malware
Processes
Services
Volatile memory
Active Directory tools