A threat hunter generates a report containing the list of users who have logged in to a particular database during the last 6 months, along with the number of times they have each authenticated. They sort this list and remove any user names who have logged in more than 6 times. The remaining names represent the users who rarely log in, as their activity is more suspicious. The hunter examines each of these rare logins in detail.
This is an example of what type of threat-hunting technique?
Harley
10 months agoFiliberto
10 months agoWhitney
9 months agoCatrice
9 months agoSocorro
9 months agoCeleste
9 months agoMira
9 months agoBritt
9 months agoSelma
10 months agoVicky
10 months agoTarra
11 months agoKimberlie
11 months agoSharee
11 months agoReuben
10 months agoCeleste
10 months agoSean
11 months agoWenona
10 months agoFrank
10 months agoGaston
11 months agoDwight
11 months agoClay
11 months agoNobuko
10 months agoJosue
10 months agoRebecka
10 months agoShawnta
10 months ago