To be a successful threat hunter, you must have a target in mind. You need to look in the right places and you need the right weapons. While some analysts can devote a good amount of time to threat hunting, most have limited time and resources for this activity.
In this guide you will learn the minimum toolset and data requirements needed to develop a set of threat hunting techniques.
In Threat Hunting 101 — co-authored by Randy Franklin Smith of Ultimate Windows Security — we explore eight types of threat hunts that you can use to spot suspicious activity.
You’ll discover how to:
- Get started with threat hunting
- Leverage the right log data for your threat hunt to be successful
- Take action with eight types of threat hunts
Download the guide to learn more about threat hunting techniques.