...
Threat hunting is done using queries. IT It allows for manual, proactive investigations into possible security threats based on available data as well as collecting additional supporting evidence that will lead into an investigation. It consists of several capabilities:
...