Hunt and Investigate
Cybereason provides various methods through which analysts can hunt for indicators of compromise, and perform deep investigations into items and behaviors that Cybereason has deemed potentially malicious.
This section provides in-depth detail about hunting and investigating using the Cybereason UI.
- Hunt and Investigate
- Perform a Hunt or Investigation
- Elements and Features
- Investigation Cycle
- Plan a Hunt
- Build a Query
- Save Queries
- Analyze Query Results
- Customize Query Results - Tutorial
- Download a File for Analysis During Investigation
- Use Query Results Limits in Investigations - Tutorial
- Hunt with the Attack Tree
- Machine Timeline
- Automate Your Hunting
- Hunting Use-Case Example
- Query Use-Case Examples
- Use Historical Hunting Data