Threat hunting is a tool that allows you to find telemetry events according to a specified criterion or several criteria, and then analyze them. The search result is a list of events detected on the assets of your organization. IT security specialists of your organization can view the events, identify suspicious actions that require attention, or create custom rules to automate the search for threats in your organization.
The Allow access right is required in the Threat hunting functional area, in order to work with Threat hunting.
Page top