The ABCs of Threat Hunting
When it comes to securing your environment, it’s important to know where the danger lies.
Learn from Microsoft’s leading threat intelligence and security experts on how to stay protected against common threat scenarios. Start by being proactive in familiarizing your team with your environment, gain perspective by combining your knowledge with threat landscape information, and standardize your enterprise to detect suspicious activity earlier. Understand the difference between commodity and human-operated malware attacks and learn the ABCs of threat hunting, which are authentication, backdoors, and communication. Apply these to common threat scenarios such as cloud data theft, device compromise, Office 365 mailbox compromise, and human-operated ransomware attacks. Building your own threat- hunting program requires the right people, technology, and training, so choose enthusiastic collaborators and adopt a “shift left” mindset. Be prepared for evolving attacks and extend your digital perimeter using XDR and Zero Trust principles.