What topics are presented in the Hunting and Investigation Guide?
Which of the following does the Hunting and Investigation Guide contain?
Which document provides information on best practices for writing Splunk-based hunting queries, predefined queries which may be customized to hunt for suspicious network connections, and predefined queries which may be customized to hunt for suspicious processes?
What is the main purpose of the Mac Sensor report?
Where would an analyst find information about shells spawned by root, Kernel Module loads, and wget/curl usage?
Which of the following is a suspicious process behavior?