A security analyst was transferred to an organization's threat-hunting team to track specific activity throughout the enterprise environment. The analyst must observe and assess the number of times this activity occurs and aggregate the results. Which of the following is the BEST threat-hunting method for the analyst to use?
NadeemRV
1 year, 9 months agokiduuu
1 year, 12 months agoAbusedInk
2 years agodb97
2 years, 2 months ago2Fish
2 years, 1 month agoencxorblood
2 years, 2 months agoCock
2 years, 2 months agojleonard_ddc
2 years, 2 months agognnggnnggnng
2 years, 2 months agognnggnnggnng
2 years, 2 months ago