Cyber Threat Hunt
Analyze the system logs and identify suspicious activities!
Click Start in the console to begin.
Normal
Suspicious