Skip to main content
Microsoft Security
Learn how you can use threat hunting to help prevent your organization from malware attacks

The ABCs of Threat Hunting

Learn from Microsoft’s leading threat intelligence and security experts on how to stay protected against common threat scenarios. Start by being proactive in familiarizing your team with your environment, gain perspective by combining your knowledge with threat landscape information, and standardize your enterprise to detect suspicious activity earlier. Understand the difference between commodity and human-operated malware attacks and learn the ABCs of threat hunting, which are authentication, backdoors, and communication. Apply these to common threat scenarios such as cloud data theft, device compromise, Office 365 mailbox compromise, and human-operated ransomware attacks. Building your own threat- hunting program requires the right people, technology, and training, so choose enthusiastic collaborators and adopt a “shift left” mindset. Be prepared for evolving attacks and extend your digital perimeter using XDR and Zero Trust principles.

Related articles

Cyber Resilience Report

Microsoft Security conducted a survey of more than 500 security professionals to understand emerging security trends and top concerns among CISOs.

Learn more

CISO Insider Issue 2

In this issue of CISO Insider, we hear from CISOs on what they’re seeing at the frontlines—from targets to tactics—and what steps they’re taking to help prevent and respond to attacks. We also hear how leaders are taking advantage of XDR and automation to scale their defense against sophisticated threats.

Learn more

Three ways to protect yourself from ransomware

Modern ransomware defense requires a lot more than just setting up detection measures. Discover the top three ways you can harden your network’s security against ransomware today.

Learn more