{"id":121214,"date":"2022-09-08T09:00:00","date_gmt":"2022-09-08T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=121214"},"modified":"2023-06-19T10:24:34","modified_gmt":"2023-06-19T17:24:34","slug":"part-1-the-art-and-science-of-threat-hunting","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/09\/08\/part-1-the-art-and-science-of-threat-hunting\/","title":{"rendered":"The art and science behind Microsoft threat hunting: Part 1"},"content":{"rendered":"\n

At Microsoft, we define threat hunting as the practice of actively looking for cyberthreats that have covertly (or not so covertly) penetrated an environment. This involves looking beyond the known alerts or malicious threats to discover new potential threats and vulnerabilities.<\/p>\n\n\n\n

Why do incident responders hunt?<\/h2>\n\n\n\n

The Microsoft Detection and Response Team (DART) mission is to respond to security incidents and help our customers become cyber-resilient. This involves incorporating threat hunting as part of our proactive and reactive investigative service offerings<\/a> to determine the following:<\/p>\n\n\n\n