What is Compromise Assessment?

- Suspicious lateral movements in the network
- Escalation of user privileges
- Abnormal amount of network traffic
- Anti-virus configuration being tampered
- Unusual files and/or folders in protected directories
Do I need a compromise assessment?

How LGMS does it differently than others?
