Threat hunting starts with the assumption that bad actors have already breached perimeter defences and are operating inside the environment….