Threat Hunting Steps
The process of proactive cyber threat hunting typically involves three steps: a trigger, an investigation and a resolution. Step 1: The Trigger A trigger points threat hunters to a specific system or area of the network for further investigation when advanced detection tools identify unusual actions that may indicate malicious activity. Often, a hypothesis about a new threat can be the trigger for proactive hunting. For example, a security team may search for advanced threats that use tools like fileless malware to evade existing defenses. Step 2: Investigation During the investigation phase , the threat hunter uses technology such as EDR (Endpoint Detection and Response) to take a deep dive into potential malicious compromise of a system. The investigation continues until either the activity is deemed benign or a complete picture of the malicious behavior has been created. Step 3: Resolution The resolution phase involves communicating relevant malicious activity