Automated detection catches known threats. Threat hunting finds the adversaries that already bypassed your defenses and are living inside your network undetected.
Median attacker dwell time: 16 days. Threat hunting programs reduce dwell time by 2-3x by actively searching for indicators of compromise.
| Aspect | Automated Detection | Threat Hunting |
|---|---|---|
| Approach | Reactive — alerts fire on known signatures | Proactive — analyst-driven investigation |
| Coverage | Known threats with existing rules | Unknown threats, novel TTPs, living-off-the-land |
| Trigger | SIEM rule, EDR alert, IOC match | Hypothesis, threat intel, anomaly |
| Output | Alert for triage | New detections, improved visibility, hardened defenses |
| Skill level | L1-L2 analyst can triage | Requires senior analysts with deep adversary knowledge |
Detection and hunting are complementary. Every successful hunt should produce new automated detections.
Map your hunts to ATT&CK techniques to track coverage gaps. Use the ATT&CK Navigator to visualize which techniques you've hunted for and which remain blind spots.
| Level | Description | Indicators |
|---|---|---|
| HM0 | Initial — Relies entirely on automated alerts | No dedicated hunting, reactive only |
| HM1 | Minimal — Ad-hoc hunts using IOC searches | Occasional hunts, no formal process |
| HM2 | Procedural — Documented hunt playbooks, regular cadence | Weekly hunts, hypothesis-driven, ATT&CK-aligned |
| HM3 | Innovative — Custom tooling, original research | Data science techniques, ML-assisted anomaly detection |
| HM4 | Leading — Automated hunt workflows, threat intel-driven | Hunts generate org-specific detections, continuous improvement loop |
Most organizations are at HM0-HM1. Reaching HM2 with consistent, documented hunts is the most impactful step you can take.
Threat hunting is a skill, not a product. No tool will hunt for you. Invest in training your analysts to think like adversaries.
Every hunt should produce one of three outputs: a new detection rule, a visibility gap to fix, or confirmed malicious activity escalated to IR.
Track hunt metrics: hypotheses tested, new detections created, mean time to detect improvement, and coverage across ATT&CK techniques.