To identify suspicious network activity, threat hunters traditionally employ highly specialized tools and solutions. These solutions can be broken into three main areas...