A threat hunter generates a report containing the list of users who have logged in to a particular database during the last 6 months, along with the number of times they have each authenticated. They sort this list and remove any user names who have logged in more than 6 times. The remaining names represent the users who rarely log in, as their activity is more suspicious. The hunter examines each of these rare logins in detail.
This is an example of what type of threat-hunting technique?
Ammie
3 months agoJuliann
3 months agoRoslyn
3 months agoPaul
4 months agoTammi
4 months agoDortha
4 months agoXochitl
4 months agoRossana
4 months agoLettie
5 months agoCarey
5 months agoAntonio
5 months agoColette
5 months agoJennie
5 months agoRenea
5 months agoAntonio
5 months agoHarley
1 year agoFiliberto
1 year agoWhitney
1 year agoCatrice
1 year agoSocorro
1 year agoCeleste
1 year agoMira
1 year agoBritt
1 year agoSelma
1 year agoVicky
1 year agoTarra
1 year agoKimberlie
1 year agoSharee
1 year agoReuben
1 year agoCeleste
1 year agoSean
2 years agoWenona
1 year agoFrank
1 year agoGaston
1 year agoDwight
2 years agoClay
2 years agoNobuko
1 year agoJosue
1 year agoRebecka
1 year agoShawnta
1 year ago