Take Control of Your Threat Hunts Like Never Before!
Managing cybersecurity hunts just got smarter, faster, and more efficient! With our latest enhancements, you can now streamline scheduled hunts, gain deeper visibility into hunt cancellations, and optimize results management—all with an intuitive, user-friendly experience.
🔍 Manage Scheduled HuntsGain full visibility and control over your scheduled hunts with our new calendar view. Easily list, edit, cancel, or reschedule hunts, ensuring maximum efficiency and coordination across your security teams.
🚨 Intelligent Hunt Cancellations with Detailed Error HandlingNo more generic errors—our enhanced cancellation process now provides granular error insights into why a hunt was stopped, including:✅ Resource limits exceeded (Memory/CPU)✅ Sensor updates or restarts✅ User-initiated cancellations with attribution✅ Asset unreachability alerts✅ Automated time-out handling
📂 Asynchronous Hunt Result ManagementInstantly download or delete hunt result files (YARA and others) without waiting. Our asynchronous processing ensures a smoother, non-blocking experience for faster incident resolution and smoother operations without workflow disruptions.
👤 Users & Last Logged-In User VisibilityGain full visibility into logged-in users for any asset with a detailed list of all users and the last logged-in user—streamlining investigations and access audits.
🎨 UX/UI Enhancements for Seamless Navigation✔ Bulk selection of assets for faster actions✔ Sticky headers in tables for improved visibility✔ Optimized scrollbars for better accessibility✔ Dynamic breadcrumb shortening for clutter-free navigation✔ Ascending/Descending sorting in tables for quick data analysis✔ Universal country code & phone number validation for seamless integrations
These enhancements are designed to boost security operations, provide real-time visibility, and enhance analyst productivity.
Lateral Movement: Threat Hunting “Processes Launching cmd.exe” Many lateral movement techniques rely on system utilities…
Threat Hunting Scenario “Registry Keys are Keys to Your Network” This Blog focuses on a…
Take Control of Your Threat Hunts Like Never Before! Managing cybersecurity hunts just got smarter,…