Welcome back to part II of this series on threat hunting! (apologies for the delay).
In the first part of this series I discussed what threat hunting was, the level of maturity an organization needs to reach in order to effectively develop a threat hunting capability, and why threat hunting was so important in today’s cyber security landscape. This installment in the series delves into setting up an environment where we can perform our own threat hunts.