Performing Threat Hunting on Resources

You can perform Threat Hunting on resources.

What it does: Runs an on-demand Threat Scan on a resource using the latest signatures and threat intelligence. The on-demand scan leverages malware and encryption detection techniques, including hash-based checks and YARA rules imported by the user.

When to use: After an incident is suspected/confirmed and you want to do the following:

  • Reassess a resource with updated detection intelligence (signatures/models/IOCs).

  • Validate whether a resource is trending clean or showing signs of infection before selecting an appropriate restore strategy.

  • Rescan backups using latest signatures and threat intelligence.

Procedure

  1. From the Command Center navigation pane, go to Security center > Threat scan.

    The Threat Scan page appears.

  2. The Resources tab shows the resources that are currently scanned by Threat Scan.

    overview_tab

  3. For the resource you want to perform Threat Hunting on, click the Actions button action_button, and then select Threat hunting.

    The Threat hunting dialog box appears, as follows:

    threat_hunting

  4. In the Plan field, select a Threat Scan plan, or create a new one by clicking the add button add/plus button - gray - no border.

  5. Click Submit.

Page contents

×

Loading...