Threat Hunting and Log Analysis – What to look for in your logs