A security analyst was transferred to an organization's threat-hunting team to track specific activity throughout the enterprise environment. The analyst must observe and assess the number of times this activity occurs and aggregate the results. Which of the following is the BEST threat-hunting method for the analyst to use?
NadeemRV
2 years agokiduuu
2 years, 2 months agoAbusedInk
2 years, 4 months agodb97
2 years, 5 months ago2Fish
2 years, 4 months agoencxorblood
2 years, 5 months agoCock
2 years, 5 months agojleonard_ddc
2 years, 5 months agognnggnnggnng
2 years, 5 months agognnggnnggnng
2 years, 5 months ago