Real-time threat hunting playbook

Written by: RANK Software  |  October 2, 2018

This guide will help you to operationalize a real- time threat hunting methodology by unpacking which indicators of attack and compromise to monitor along with presenting threat hunting scenarios to further assist the SOC analyst in their threat hunt for a potential breach on their network.
  • Understand 15 indicators of attack to monitor
  • Examine 14 threat hunting scenarios
  • Specific SQL queries to help SOC analysts hunt for potential breaches on their network

Topics: ciso

Comments