Threat Hunting: Hunting the Endpoint & Endpoint Analysis