{"id":135541,"date":"2024-08-28T12:00:00","date_gmt":"2024-08-28T19:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=135541"},"modified":"2024-09-10T11:14:40","modified_gmt":"2024-09-10T18:14:40","slug":"the-art-and-science-behind-microsoft-threat-hunting-part-3","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/08\/28\/the-art-and-science-behind-microsoft-threat-hunting-part-3\/","title":{"rendered":"The art and science behind Microsoft threat hunting: Part 3"},"content":{"rendered":"\n

Earlier in Part 11<\/sup> and Part 22<\/sup> of this blog series, Microsoft Incident Response<\/a> outlined the strategies, methodologies, and approaches that are used while performing a cyberthreat hunt in both pre- and post-compromised environments. This chapter outlines how Microsoft Incident Response, in collaboration with partner security teams, leverages three distinct types of threat intelligence in the threat hunting cycle, and how customers can utilize these artifacts themselves to improve their own incident response preparedness.\u00a0<\/p>\n\n\n

\n\t
\n\t\t
\n\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\"a\t\t\t\t<\/div>\n\t\t\t\n\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t

Microsoft Incident Response<\/h2>\n\n\t\t\t\t\t
\n\t\t\t\t\t\t

Strengthen your security with an end-to-end portfolio of proactive and reactive cybersecurity incident response services.<\/p>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t