{"id":135541,"date":"2024-08-28T12:00:00","date_gmt":"2024-08-28T19:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=135541"},"modified":"2024-09-10T11:14:40","modified_gmt":"2024-09-10T18:14:40","slug":"the-art-and-science-behind-microsoft-threat-hunting-part-3","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/08\/28\/the-art-and-science-behind-microsoft-threat-hunting-part-3\/","title":{"rendered":"The art and science behind Microsoft threat hunting: Part 3"},"content":{"rendered":"\n
Earlier in Part 11<\/sup> and Part 22<\/sup> of this blog series, Microsoft Incident Response<\/a> outlined the strategies, methodologies, and approaches that are used while performing a cyberthreat hunt in both pre- and post-compromised environments. This chapter outlines how Microsoft Incident Response, in collaboration with partner security teams, leverages three distinct types of threat intelligence in the threat hunting cycle, and how customers can utilize these artifacts themselves to improve their own incident response preparedness.\u00a0<\/p>\n\n\n Strengthen your security with an end-to-end portfolio of proactive and reactive cybersecurity incident response services.<\/p>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t Threat intelligence is often oversimplified to represent a feed of indicators of compromise<\/a> (IOCs). The intersection between multiple types of threat intelligence, however, enables organizations and their threat hunters to have a holistic understanding of the cyberattackers and techniques that can and will target them. With this comprehensive cheat sheet of knowledge, threat hunters can not only increase efficiency when responding to a compromise, but proactively hunt their systems for anomalies and fine-tune protection and detection mechanisms.\u00a0<\/p>\n\n\n\nMicrosoft Incident Response<\/h2>\n\n\t\t\t\t\t