Trace Id is missing

The ABCs of Threat Hunting

A logo of a letter
When it comes to securing your environment, it’s important to know where the danger lies.

Learn from Microsoft's leading threat intelligence and security experts on how to stay protected against common threat scenarios.

Start by being proactive in familiarizing your team with your environment:

  • Gain perspective by combining your knowledge with threat landscape information 
  • Standardize your enterprise to detect suspicious activity earlier. 
  • Understand the difference between commodity and human-operated malware attacks
  • Learn the ABCs of threat hunting, which are authentication, backdoors, and communication

Apply these to common threat scenarios such as

  • Cloud data theft
  • Device compromise
  • Office 365 mailbox compromise
  • Human-operated ransomware attacks.

Building your own threat-hunting program requires the right:

  • People
  • Technology
  • Training

So, choose enthusiastic collaborators and adopt a "shift left" mindset. Be prepared for evolving attacks and extend your digital perimeter using XDR and Zero Trust principles.

Related articles

Cyber Resilience Report

Microsoft Security conducted a survey of more than 500 security professionals to understand emerging security trends and top concerns among CISOs.

CISO Insider Issue 2

In this issue of CISO Insider, we hear from CISOs on what they’re seeing at the frontlines—from targets to tactics—and what steps they’re taking to help prevent and respond to attacks. We also hear how leaders are taking advantage of XDR and automation to scale their defense against sophisticated threats.

Three ways to protect yourself from ransomware

Modern ransomware defense requires a lot more than just setting up detection measures. Discover the top three ways you can harden your network’s security against ransomware today.

Follow Microsoft