Scenario B – external threat hunt
Due to the Cyber Security Intelligence (CSI) team setting up stronger sensors at the beginning and the lack of bandwidth for data collection, the team must use a hybrid approach to get the evidence. The sensors will be able to filter ahead of time for items they don't need, and the small selection of data they want full copies of can be sent directly via the jump box.
They have automatic tagging set up and dashboards built out of the box for the most common ways the team is going to analyze the data for evidence to prove their hypothesis. Other items that are automated are taking IOCs from TheHive and scripting them to be built into simple detections for the SIEM.
As the team starts searching across the network for evidence to test their hypothesis, they identify a workstation that's reaching out to other workstations across the network with no reason to do so.
They're able to see the secondary correlation evidence...