Which hunting query's results could indicate that an adversary is performing reconnaissance from a specific host?
Which is a normal parent of cmd.exe on Windows?
You get a detection for a malicious PowerShell script with the process flow below:
Unknown Process - > chrome.exe - > wscript.exe - > powershell.exe Which process should you investigate further to identify the source of the script?
What can a hunter add at the end of a search string in Advanced Event Search to identify outliers when quantifying the results?