3 Where Does the Data Come From?

Join our book community on Discord

https://packt.link/SecNet

In order to carry out effective threat hunts, there are some basic concepts that you should be clear on. The main sources of data for threat hunting are system logs and network logs. In this chapter, we are going to cover operating system basics, networking basics, and the main data sources that a threat hunting platform feeds from.

In this chapter, we will cover the following topics:

  • Understanding the data that's been collected
    • Operating system basics
    • Networking basics
  • Windows-native tools
  • Linux and MacOS Monitoring Tools
  • Data sources
  • Cloud Environments ...

Get Practical Threat Intelligence and Data-Driven Threat Hunting - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.