Summary
Throughout this chapter we have covered some of the basic concepts a threat hunter needs to understand to carry out hunts successfully and to better interpreter the information available. We have covered some of Windows native tools alongside the way windows records events to the logs files. And lastly, we have gone over a comprehensive (but not final) list of threat hunting possible data sources.
In the next chapter we are going to start working with the data sources in order to create data dictionaries and also emulate the adversary.