How cyber threat hunting works
Cyber threat hunting utilizes threat hunters to preemptively search for potential threats and attacks within a system or network. Doing so allows for agile, efficient responses to increasingly complex, human-operated cyberattacks. While traditional cybersecurity methods identify security breaches after the fact, cyber threat hunting operates under the assumption that a breach has occurred, and can identify, adapt, and respond to potential threats immediately upon detection.
Sophisticated attackers can breach an organization and remain undetected for extended periods of time—days, weeks, or even longer. Adding cyber threat hunting to your existing profile of security tools, like endpoint detection and response (EDR) and security information and event management (SIEM), can help you prevent and remediate attacks that might otherwise go undetected by automated security tools.
Automated threat hunting
Tools and techniques for cyber threat hunting
- SIEM: A solution that collects data from multiple sources with real-time analysis, SIEM can provide threat hunters with clues about potential threats.
- Extended detection and response (XDR): Threat hunters can use XDR, which provides threat intelligence and automated attack disruption, to achieve greater visibility into threats.
- EDR: EDR, which monitors end-user devices also provides threat hunters with a powerful tool, giving them insight into potential threats within all of an organization’s endpoints.
Follow Microsoft Security