The help desk is reporting an increase in calls related to user accounts being locked out over the last few days. You suspect that this could be an attack by an adversary against your organization. Select the best hunting hypothesis from the following:
Which field should you reference in order to find the system time of a *FileWritten event?
You are reviewing a list of domains recently banned by your organization's acceptable use policy. In particular, you are looking for the number of hosts that have visited each domain. Which tool should you use in Falcon?
What do you click to jump to a Process Timeline from many pages in Falcon, such as a Hash Search?
You need details about key data fields and sensor events which you may expect to find fromHosts running the Falcon sensor.Which documentation should you access?
What information is provided from the MITRE ATT&CK framework in a detection's Execution Details?
The Process Timeline Events Details table will populate the Parent Process ID and the Parent File columns when the cloudable Event data contains which event field?
Which of the following does the Hunting and Investigation Guide contain?
How do you rename fields while using transforming commands such as table, chart, and stats?