Command Zero
← Back to the glossary
Glossary · IOC

What is an IOC?

An IOC (Indicator of Compromise) is a piece of forensic evidence, a file hash, IP address, domain name, registry key, or behavior pattern, that indicates a system has been compromised or a specific adversary is present.

Updated 2026-05-19

What it means

IOCs are the simplest building blocks of threat detection. Threat intelligence feeds distribute IOC lists; SIEMs and EDRs use them to trigger alerts; SOC analysts pivot on them during investigation. IOCs are useful but ephemeral, adversaries rotate infrastructure quickly, so an IOC may be valid for days or hours before becoming stale. IOC-only detection misses adversaries who change tooling but keep their TTPs.

Command Zero’s approach

How Command Zero handles IOC.

Command Zero investigations pivot on IOCs by default, when an alert references a hash, domain, or address, expert questions immediately query for that indicator across all connected data sources. The Federated Data Model means the IOC search runs in parallel against endpoint, network, email, and cloud telemetry. Findings tagged to the IOC are surfaced together, accelerating scoping. The platform does not produce or sell IOC feeds; it consumes them through customer-provided threat intelligence integrations.

Related terms
← Back to the glossary
See IOC in production

Book a Command Zero demo.

Live in under an hour. No migration. Zero training data required.

Book a Demo
No training data requiredSOC 2 CompliantDirect-to-data