Threat Hunting Flashcards

1
Q

Enrich Alerts Across Multiple Threat Intel Sources

A

Provides details and context to reduce false positives, coordinate internal and external tools response, and integrate with case management systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Align Processes and Procedures

A

Adaptable no-code, low-code, and full-code workflow UI to create automations to accelerate threat-hunting workflows and filter through the noise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Automate EDR, XDR, and SIEM

A

Launch distributed search efforts to reach conclusions when a new exploit technique is discovered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trigger Search Processes with Workflows Across Disparate Infrastructure

A

Works with EDR/MDM, SIEM/logs, and email/storage to identify further events and evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Team-Based Threat Hunting

A

Supports SIEM, EDR, XDR, and other collaborative sources to serve as playbooks for automating investigations at record speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Immediately Respond to Threats with Minimal Manual Dependencies

A

Reduces the potential impact on the organization while freeing up IT analysts’ time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly