Threat Hunting
Overview
Threat hunting is the proactive search for threats that have evaded existing detection mechanisms. Unlike reactive detection (waiting for alerts), hunting starts with a hypothesis about attacker behavior and uses data analysis to confirm or deny the hypothesis. Effective hunting requires deep knowledge of attacker techniques and available telemetry.
Topics
- Hunting Methodology — hypothesis-driven hunting, data sources, frameworks, and hunt documentation
- Windows Threat Hunting — hunting techniques for Windows environments using event logs, Sysmon, and endpoint telemetry
Hunting Workflow
1. Hypothesize → "Attackers may be using scheduled tasks for persistence"
2. Data source → Identify relevant logs (Event ID 4698, Sysmon ID 1)
3. Collect → Query SIEM or endpoint data for the time period
4. Analyze → Filter, correlate, look for anomalies
5. Validate → Confirm malicious activity or refine hypothesis
6. Document → Record findings, create detection rules, update playbooks
Note: Sysmon event IDs and field names are schema-version-dependent. Qualify any Sysmon-based hunt queries by the schema version deployed in your environment.