Threat Hunt package
BETTER CONTENT ENABLES MORE EFFECTIVE THREAT HUNTS
WHAT’S IN A THREAT HUNT PACKAGE?
Learn how our threat hunt packages can arm threat hunters with the behavioral content they need to hunt for the latest adversarial behaviors, exploits, and malware!
01. USE CASE & QUERY
- A clear, concise use overview of the package, including an explanation of what it detects or detects and how.
- An up-to-the-minute query customized for your security tools (e.g., SIEM, EDR, NDR, or XDR) that goes way beyond fragile IoC monitoring to detect specific threat actor tactics, techniques, and procedures (TTPs).
Play Video
02. CONTEXT & DEPLOYMENT GUIDE
- Analyst-focused documentation to guide the threat hunt and provide next steps and advice.
- Remediation guidance for analysts to ensure each threat is remediated consistently in line with best practices.
Play Video
03. RUNBOOK & REMEDIATION
- A clear, concise use case overview of the package, including an explanation of what it detects and how.
- An up-to-the-minute query customized for your security tools (e.g., SIEM, EDR) that goes way beyond IoC monitoring to detect specific threat actor tactics, techniques, and behaviors (TTPs).
Play Video
04. CYBER THREAT EMULATION
- Tools to emulate each threat inside your environment in a non-destructive manner.
Play Video