Skip to main content
Threat Hunting

Threat Hunting


Threat Hunting

Threat Hunting is the process of proactively and continuously searching networks to detect and isolate advanced threats that have evaded existing security solutions. 

In threat hunting, security analysts utilize tools such as EDR (Endpoint Detection and Response) and threat intelligence to proactively hunt for adversaries already present - though as yet undiscovered - in corporate networks. Managed Detection and Response (MDR) is a form of outsourced threat hunting. Threat hunting may begin with the discovery of anomalous activity and hypotheses of what might be causing that activity. The security analyst or threat hunter will utilize the hypotheses as the basis for where to look for potential active or latent threats within the IT environment. Hunting is used to identify threats at the earliest stage possible and uses manual and technology-assisted techniques. When adding a threat hunter or a hunting team, an organization should outline specific practices about how and when hunting takes place, who will be responsible for specific actions and the development of metrics to measure success. Another important component is to establish baselines for normal operations.

Seeking Clarity?

View the Cybersecurity Dictionary for top terms searched by your peers.

Explore the Dictionary

Related Assets

June 20, 2017

Cyber Threat Intelligence – Putting out Fires or Firefighting?

When it comes to fighting malware, combating nation-state threats, and securing digital assets, the information security industry has much to learn fr...

See Details

September 03, 2015

Threat Intelligence Solution Primer

Learn how an intelligence-driven approach to security is different than other methods.

See Details

July 29, 2016

Cyber Threat Intelligence Consulting Services

Remove the confusion surrounding the implementation of threat intel with a blueprint for logical progression in planning, building and running your cy...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.