detection-driven threat hunting using EDR telemetry to identify lateral movement, credential abuse, and post-exploitation activity.
-
Updated
Jan 17, 2026
detection-driven threat hunting using EDR telemetry to identify lateral movement, credential abuse, and post-exploitation activity.
Cybersecurity labs showcasing SOC investigation, telemetry correlation, and analyst decision-making.
Add a description, image, and links to the endpoint-telemetry topic page so that developers can more easily learn about it.
To associate your repository with the endpoint-telemetry topic, visit your repo's landing page and select "manage topics."