Threat Hunting
Threat Hunting presents a detailed summary of suspicious activity drawn from insights gathered by Resource Traffic, Risky Traffic, Malicious IP Threats, External Data Transfer, Country Insights, and Firewall Insights.
To learn more about the Threat Hunter persona's Investigation Analysis capability, see About Threat Hunter Investigative Report.
To learn about launching an Investigation Analysis, see Launch a Threat Hunter Investigation Analysis.
Table 3. Insights based on personas
Persona | Typical Role | Insights |
|---|---|---|
SOC analyst, threat detection engineer, threat hunter |
|