3. Where does data come from?
In order to carry out effective threat hunts there are some basic concepts that should be clear. The main sources of data for threat hunting are system logs and network logs. This chapter is going to cover operation systems basics, networking basics and the main data sources that a threat hunting platform feeds from. We will be covering the following topics in this chapter:
- Understanding data collected
- Windows Native Tools
- Data Sources