Threat Hunting
View a detailed summary of suspicious activity using insights from Resource Traffic, Risky Traffic, Malicious IP Threats, External Data Transfer, Country Insights, and Firewall Insights.

For information about the Threat Hunter persona's Investigation Analysis capability, see About Threat Hunter Investigation Analysis. To learn about launching an Investigation Analysis, see Launch a Threat Hunter Investigation Analysis.
Table 3. Insights based on personas
Persona | Typical Role | Insights |
|---|---|---|
SOC analyst, threat detection engineer, threat hunter |
|