Tuesday, June 12, 2018

Automated Threat Hunting Playbook

Automated Threat Hunting Playbook: Once the automation platform retrieves and attaches the suspicious files and packet captures (step #6), the incident is ready to be verified by an incident analyst.