Episode 10 — Detect unauthorized software quickly using discovery signals, baselines, and change patterns

This episode focuses on detecting unauthorized software fast enough to reduce dwell time and prevent small issues from becoming incidents. You’ll learn what counts as unauthorized, including unapproved tools, risky remote access utilities, pirated software, and unexpected admin tools that often signal compromise. We’ll cover discovery signals such as endpoint inventory deltas, EDR telemetry, application execution logs, package manager histories, and software deployment tool reports, then explain how baselines help distinguish normal change from suspicious change. Exam relevance includes recognizing which data sources provide the strongest evidence and what response steps make sense based on risk and business impact. Scenarios include a newly installed tool that matches known attacker tradecraft and a harmless but unlicensed app that still creates compliance exposure. Troubleshooting includes reducing false positives, handling software that changes names or installs in nonstandard paths, and building a workflow that assigns owners, validates legitimacy, and documents outcomes so detection becomes a repeatable control, not an endless alert stream. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 10 — Detect unauthorized software quickly using discovery signals, baselines, and change patterns
Broadcast by