Host logs versus network logs
When it comes to log sources, they are normally broken up into two categories: host-based and network-based logs. Host logs would contain anything found on a host or application such as the operating system. Included in this category would be anything generated by toolsets employed by cyber defense such as any Endpoint Detection and Response (EDR) toolsets they are utilizing. Network logs would be anything that is captured as it is traveling across the network, such as the raw packets communicated on an enterprise.
Does a team need them both? Can a team hunt off of primarily one of them? The answer to how to address this balance is it all depends upon the hunt team and what is already available to them. Is it possible to conduct a threat hunt with only host logs and data? Yes. Is it also possible to conduct a threat hunt with only network logs and data? Yes. If a team has specialized or a deeper understanding of a particular area, exploit that to their...