Detection Engineering

Threat hunting and detection engineering go hand in hand. Tailored hunting queries are great starting points for custom detections. We have a library of proven detections we can customize and deploy in your environment. Example detections include:

  1. Administrative actions initiated by users, or from systems that should never occur
  2. Creation of suspicious services in your environment
  3. Lateral movement through methods not used by your admins
  4. Access to administrative shares from non-admin systems
  5. Dual-use tooling not in your approved software list
  6. Tampering with security controls