Chapter 3: Where Does the Data Come From?
In order to carry out effective threat hunts, there are some basic concepts that you should be clear on. The main sources of data for threat hunting are system logs and network logs. In this chapter, we are going to cover operating system basics, networking basics, and the main data sources that a threat hunting platform feeds from.
In this chapter, we will cover the following topics:
- Understanding the data that's been collected
- Windows-native tools
- Data sources
Let's get started!