Completion of a full objective survey of a network and its’ devices to discover unknown security breaches, malware, and signs of unauthorized access. More specifically, the¬†assessment¬†seeks to find attackers who are currently in the environment or that have been active in the recent past. A compromise assessment differs from intrusion detection in that it is an active dedication of analytical resources with a focus on indicators of a successful compromise. For the period of the assessment, there is more time and a wider authority to dig deeper than what is expected day-to-day in real-time monitoring.