{"id":720,"date":"2024-04-20T08:20:58","date_gmt":"2024-04-20T08:20:58","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/resources\/?p=720"},"modified":"2026-05-11T04:13:15","modified_gmt":"2026-05-11T04:13:15","slug":"thinking-of-starting-a-adversary-hunting-program","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/resources\/thinking-of-starting-a-adversary-hunting-program\/","title":{"rendered":"Thinking of Starting a Adversary Hunting Program?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"720\" class=\"elementor elementor-720\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"aux-parallax-section elementor-element elementor-element-eace8d3 e-con-full e-flex e-con e-parent\" data-id=\"eace8d3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;curve&quot;,&quot;shape_divider_bottom_negative&quot;:&quot;yes&quot;}\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500,97C126.7,96.3,0.8,19.8,0,0v100l1000,0V1C1000,19.4,873.3,97.8,500,97z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6515c4c aux-appear-watch-animation aux-fade-in-down-2 elementor-widget elementor-widget-aux_modern_heading\" data-id=\"6515c4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<section class=\"aux-widget-modern-heading\">\n            <div class=\"aux-widget-inner\"><h1 class=\"aux-modern-heading-primary\">WHITE PAPER<\/h1><h3 class=\"aux-modern-heading-secondary\"><span class=\"aux-head-before\">Thinking of Starting a Adversary Hunting Program?<\/span><\/h3><\/div>\n        <\/section>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b406b31 elementor-widget elementor-widget-aux_modern_button\" data-id=\"b406b31\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t    <div class=\"aux-modern-button-wrapper aux-modern-button-align-center\" >\n                    <a class=\"aux-modern-button aux-black aux-modern-button-md aux-modern-button-normal aux-modern-button-default aux-icon-left\" href=\"https:\/\/lmntrix.com\/resources\/\">\n                <div class=\"aux-overlay\"><\/div>\n                                    <div class=\"aux-icon \">\n                        <i aria-hidden=\"true\" class=\"auxicon2 auxicon2-arrow-chevron-fat-left\"><\/i>                    <\/div>\n                                <div class=\"aux-text\">\n<span class=\"aux-text-before\">Back to Resource center<\/span>                <\/div>\n            <\/a>\n            \n    <\/div>\n\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"aux-parallax-section elementor-element elementor-element-1717ef7 e-flex e-con-boxed e-con e-parent\" data-id=\"1717ef7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9dde6d0 e-con-full e-flex e-con e-child\" data-id=\"9dde6d0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48e2ee8 elementor-widget elementor-widget-aux_image\" data-id=\"48e2ee8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<section class=\"widget-container aux-widget-image aux-alignnone aux-parent-au58175bd5\">\n    <div class=\"aux-media-hint-frame \">\n        <div class=\"aux-media-image \" >\n        \n            \n\n            \n            <img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"482\" src=\"https:\/\/lmntrix.com\/resources\/wp-content\/uploads\/2024\/04\/Thinking-of-Starting-a-Adversary-Hunting-Program.webp\" class=\"aux-attachment aux-featured-image aux-attachment-id-725\" alt=\"Thinking-of-Starting-a-Adversary-Hunting-Program\" data-ratio=\"1.24\" data-original-w=\"600\" \/>            \n                <\/div>\n    <\/div>\n\n<\/section><!-- widget-container -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c93157 elementor-widget elementor-widget-aux_modern_button\" data-id=\"5c93157\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t    <div class=\"aux-modern-button-wrapper aux-modern-button-align-center\" >\n                    <a class=\"aux-modern-button aux-info aux-modern-button-md aux-modern-button-curve aux-modern-button-default aux-icon-\" href=\"https:\/\/lmntrix.com\/res\/Thinking-of-Starting-a-Adversary-Hunting-Program-seo.pdf\" target=\"_blank\">\n                <div class=\"aux-overlay\"><\/div>\n                                    <div class=\"aux-icon \">\n                                            <\/div>\n                                <div class=\"aux-text\">\n<span class=\"aux-text-before\">Download White Paper<\/span>                <\/div>\n            <\/a>\n            \n    <\/div>\n\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-225d5be e-con-full e-flex e-con e-child\" data-id=\"225d5be\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-925d1b9 elementor-widget elementor-widget-text-editor\" data-id=\"925d1b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Adversary hunting is the stealthy and surgical detection and eviction of adversaries within your network without prior adversary knowledge or known indicators of compromise. The goal of hunting is to detect and evict adversaries that have bypassed defenses before damage and loss can occur. To do so, a hunter must be able to enter the network undetected, identify the adversary at any stage of the kill chain, and evict them without disrupting running systems.<\/p><p>But even after following online tutorials, attending webinars and workshops \u2013 you might be struggling to achieve any justifiable success with your adversary hunting program, or simply lost with the large amount of data generated from the first hunt.<\/p><p>In this paper we have laid down the top 10 most important tasks to perform to make your adversary hunting program a success.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"aux-parallax-section elementor-element elementor-element-86e6337 e-flex e-con-boxed e-con e-parent\" data-id=\"86e6337\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"aux-scroll-anim elementor-element elementor-element-3fb81f2 elementor-widget__width-auto elementor-view-default elementor-widget elementor-widget-icon\" data-move-in=\"rotateIn\" data-move-out=\"rotateIn\" data-axis-x=\"0\" data-axis-y=\"110\" data-rotate=\"55\" data-scale=\"1\" data-vp-top=\"0.5\" data-vp-bot=\"0.5\" data-el-top=\"0.2\" data-scroll-animation-off=\"1024\" data-id=\"3fb81f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"auxicon auxicon-lists\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c79c2b aux-appear-watch-animation aux-fade-in elementor-widget__width-auto elementor-widget elementor-widget-aux_modern_heading\" data-id=\"5c79c2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<section class=\"aux-widget-modern-heading\">\n            <div class=\"aux-widget-inner\"><h1 class=\"aux-modern-heading-primary\"><\/h1><h3 class=\"aux-modern-heading-secondary\"><span class=\"aux-head-before\">Download <\/span><span class=\"aux-head-highlight\">Our Datasheet<\/span><\/h3><\/div>\n        <\/section>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e5b070 elementor-widget__width-auto elementor-widget elementor-widget-aux_modern_button\" data-id=\"9e5b070\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t    <div class=\"aux-modern-button-wrapper aux-modern-button-align-center\" >\n                    <a class=\"aux-modern-button aux-info aux-modern-button-md aux-modern-button-curve aux-modern-button-default aux-icon-\" href=\"https:\/\/lmntrix.com\/res\/LMNTRIX-XDR-DATASHEET.pdf\" target=\"_blank\">\n                <div class=\"aux-overlay\"><\/div>\n                                    <div class=\"aux-icon \">\n                                            <\/div>\n                                <div class=\"aux-text\">\n<span class=\"aux-text-before\">DOWNLOAD NOW<\/span>                <\/div>\n            <\/a>\n            \n    <\/div>\n\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>WHITE PAPER Thinking of Starting a Adversary Hunting Program? Back to Resource center Download White Paper Adversary hunting is the stealthy and surgical detection and eviction of adversaries within your network without prior adversary knowledge or known indicators of compromise. The goal of hunting is to detect and evict adversaries that have bypassed defenses before [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":725,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[13,16,12,15,11,14],"class_list":["post-720","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-white-paper","tag-paper","tag-white","tag-white-paper","tag-white-papers","tag-whitepaper","tag-whitepapers"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/posts\/720","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/comments?post=720"}],"version-history":[{"count":18,"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/posts\/720\/revisions"}],"predecessor-version":[{"id":3078,"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/posts\/720\/revisions\/3078"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/media\/725"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/media?parent=720"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/categories?post=720"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/tags?post=720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}