Threat Hunting II: Environment Setup

Adam Goss
12 min readOct 26, 2022

Welcome back to part II of this series on threat hunting! (apologies for the delay).

In the first part of this series I discussed what threat hunting was, the level of maturity an organization needs to reach in order to effectively develop a threat hunting capability, and why threat hunting was so important in today’s cyber security landscape. This installment in the series delves into setting up an environment where we can perform our own threat hunts.

Adam Goss

Cyber Security Professional | Red Teamer | Adversary Emulator | Malware Analysis | Threat Hunter | Automator