As IT professionals, especially if we either dabble or work full-time in Digital Security, there are times when you must check to see if suspicious content is legitimate or malicious. This presentation will discuss and demonstrate three approaches for how to safely check the content, how to implement each approach, and the strengths and weaknesses of each approach.
This talk isn't directly about PowerShell, but PowerShell will be used to speed up the setup and usage of the approaches.