Back to all projects







61173923
Project 5.2: LOG(N) Pacific Internship: Threat Hunting Scenario 2: Sudden Network Slowdown
2025-10-14
Samson Otori
Personal Project
Blue Team
Cloud

Blue Team
Cloud
Threat Hunting
Microsoft Defender for Endpoint
Network Security
Port Scanning
EDR
KQL
PowerShell
Microsoft Defender for Endpoint
KQL
PowerShell
Windows
Continue Reading
PreviousProject 5.3: LOG(N) Pacific Internship: Threat Hunting Scenario 3: Suspected Data Exfiltration

Project 5.3: LOG(N) Pacific Internship: Threat Hunting Scenario 3: Suspected Data Exfiltration
A comprehensive threat hunting exercise investigating suspected data exfiltration by a disgruntled employee, using Microsoft Defender for E…
Oct 20, 2025
Read previous
NextProject 5.1: LOG(N) Pacific Internship: Threat Hunting Scenario 1: Devices Exposed to the Internet · Part 1 of 1

Project 5.1: LOG(N) Pacific Internship: Threat Hunting Scenario 1: Devices Exposed to the Internet
A comprehensive threat hunting exercise investigating devices accidentally exposed to the internet, using Microsoft Defender for Endpoint a…
Sep 14, 2025
Read next
Related Projects

Blue Team
Project 5.4: LOG(N) Pacific Internship: Threat Hunting Scenario 4: PwnCrypt Ransomware Outbreak
Oct 24Project

Blue Team
Project 5.3: LOG(N) Pacific Internship: Threat Hunting Scenario 3: Suspected Data Exfiltration
Oct 20Project

Blue Team
Project 5.9: LOG(N) Pacific Internship Final Project – Detecting Tor Browser Usage on Corporate Endpoint - Threat Hunting Scenario (Part 2: The Threat Hunt)
Nov 17Project
Oldest Projects
Newest Projects

Blue Team
Project 6.4: Agent-Based Vulnerability Monitoring on Linux with Tenable Nessus Agent
Dec 5Project

Blue Team
Project 6.3: Agent-Based Monitoring on Windows 11 Using Tenable Nessus Agents
Nov 28Project

Blue Team
Project 6.2: LOG(N) Pacific Internship – Windows 11 Compliance Scanning Using a Custom Tenable Scan Template
Nov 25Project
Project Categories
All
Cloud
Blue Team
Red Team
Infrastructure
