Proaktive threat hunting hilft Sicherheitsteams, fortgeschrittene Bedrohungen 11 Tage früher zu erkennen und durchschnittlich 1,3 Millionen Dollar pro Vorfall einzusparen (Gartner, Prioritize Threat Hunting for the Early Detection of Stealthy Attacks, Oct 2025).
Dieser umfassende Leitfaden zeigt Ihnen, wie Sie die Jagd mit der Vectra AI operationalisieren können - unter Verwendung von KI-erweiterten Metadaten, KI-unterstützter Suche, vorgefertigten Abfragen und wiederholbaren Arbeitsabläufen, um verborgene Verhaltensweisen von Angreifern aufzudecken, bevor sie eskalieren.
In diesem Leitfaden erfahren Sie:


Modern security teams cannot rely on alerts alone. Attackers dwell in environments for days or weeks before detection tools surface their activity — and the most sophisticated threats are specifically designed to avoid triggering automated rules. A structured threat hunting methodology closes that gap: shifting from reactive alerting to proactive investigation, starting from the assumption that something may already be wrong and systematically searching for evidence.
This guide covers what threat hunting methodology is, how leading security teams structure their hunting programs, and how to apply those frameworks using the Vectra AI Platform across hybrid environments spanning network, identity, cloud, and SaaS infrastructure.
It is written for SOC analysts, detection engineers, and security architects building or maturing a proactive threat hunting practice.
A threat hunting methodology is a structured approach to proactively searching for threats that have not yet triggered automated alerts. Rather than waiting for a detection rule to fire, hunters start from the assumption that something could already be wrong and search for behavioral evidence. They combine threat intelligence, knowledge of attacker tactics, and familiarity with their own environment to surface activity that does not match expected patterns.
A complete threat hunting methodology defines three things: what to hunt for (the hypothesis), how to hunt for it (the technique), and what to do when something is found (the response workflow).
The three most widely adopted threat hunting methodologies are:
A threat hunting framework provides the structural layer that guides how hunts are planned, executed, and repeated. The most widely used frameworks reference MITRE ATT&CK as the taxonomy for attacker techniques, organizing hunts by tactic (what the attacker is trying to achieve) and technique (how they achieve it).
The core components of an operational threat hunting framework are:
Without a repeatable framework, threat hunting remains ad hoc and produces inconsistent results. With one, it becomes a measurable program that continuously strengthens detection coverage.
The following best practices are drawn from mature SOC programs and reflect what differentiates high-performing hunting teams from those that struggle to operationalize the practice.
Start with high-confidence hypotheses. The strongest hunts are grounded in specific attacker techniques — not generic searches. Use threat intelligence, recent incident reports, and MITRE ATT&CK to identify techniques relevant to your industry and infrastructure before writing a single query.
Prioritize network metadata. Network metadata shows how systems communicate — not just that they did. Endpoint logs describe isolated events on a single machine. Network data reveals how activity connects across the environment. Teams that hunt primarily from endpoint telemetry miss a significant category of lateral movement, command-and-control, and data exfiltration signals.
Hunt across all three methodology types. TTP-based, compliance-based, and IOC-based hunts each surface different threat categories. A program that only runs one type consistently misses what the other two are designed to find.
Build repeatable query libraries. Save effective queries. Document what each one looks for, what it has historically found, and under what conditions it produces false positives. A growing query library is a direct measure of program maturity.
Integrate findings into detection engineering. Every confirmed threat hunting finding that is not converted into a detection rule is a missed hardening opportunity. The loop between hunting and detection tuning is what makes programs self-improving over time.
Establish behavioral baselines before hunting anomalies. You cannot reliably identify what is abnormal without first understanding what normal looks like. Invest time in baseline documentation before expecting anomaly-based hunts to produce reliable signal.
Time-box hunts. Structured, time-limited hunts with clear objectives outperform open-ended investigations. Most experienced hunters operate in 5–30 minute structured sessions, then triage findings before deciding whether to escalate or pivot.
The Vectra AI Platform is purpose-built for advanced threat investigations and hunting at scale. Analysts pivot across AI-enhanced metadata to uncover attacker behaviors, trace activity over time, and correlate signals across identity, cloud, and network layers — all from a single interface.
TTP-based hunting focuses on identifying attacker behaviors rather than relying on static indicators. By targeting specific tactics, techniques, and procedures used during real-world intrusions, security teams can detect threats that often evade signature-based tools.
What TTP-based hunts are designed to surface:
The nine TTP-based hunts below are mapped to known attacker techniques and executable directly in the Vectra AI Platform.
TTP-based hunting focuses on identifying attacker behaviors rather than relying on static indicators. By targeting specific tactics, techniques, and procedures used during real-world intrusions, security teams can detect threats that often evade signature-based tools.
What TTP-based hunts are designed to surface:
The nine TTP-based hunts below are mapped to known attacker techniques and executable directly in the Vectra AI Platform.
What this query finds:
Hunt logic: Checks network DCE/RPC logs from the last 14 days for events where a system connects to a domain controller using the LSARPC endpoint and performs the lsarretrieveprivatedata operation.
Security implication: DPAPI backup key theft enables an attacker to:
SELECT
timestamp,
orig_hostname,
id.orig_h AS "id_orig_h",
id.resp_h AS "id_resp_h",
resp_hostname,
domain,
username,
endpoint,
hostname,
operation,
sensor_uid
FROM
network.dce_rpc
WHERE
id.orig_h = '10.254.50.142'
AND LOWER(endpoint) = 'lsarpc'
AND LOWER(operation) = 'lsarretrieveprivatedata'
AND timestamp > date_add('day', -14, now())
ORDER BY
timestamp DESC
LIMIT 100What this query finds:
certutil.exe used to download files from external websitesMicrosoft-CryptoAPI/10.0 user agentHunt logic: Scans HTTP traffic from the last 14 days for requests with user agent Microsoft-CryptoAPI/10.0, which is generated when certutil downloads files from external sources.
Security implication: Certutil abuse enables attackers to:
SELECT host, COUNT(*) AS request_count
FROM network.http
WHERE user_agent = 'Microsoft-CryptoAPI/10.0' AND timestamp > date_add('day', -14, now())
GROUP BY host
ORDER BY request_count DESC
LIMIT 50What this query finds:
Hunt logic: Scans NTLM traffic from the last 14 days for requests with domain controllers as source IP addresses.
Security implication: A domain controller initiating outbound NTLM authentication is a strong indicator of:
SELECT id.orig_h, orig_hostname.name AS hostname, COUNT(*) AS ntlm_request_count
FROM network.ntlm
WHERE (LOWER(orig_hostname.name) LIKE '%dc%' OR TRY_CAST(id.orig_h AS
IPADDRESS) BETWEEN IPADDRESS '10.254.100.0' AND IPADDRESS '10.254.100.255')
AND timestamp > date_add('day', -14, now())
GROUP BY id.orig_h, orig_hostname.name
ORDER BY ntlm_request_count DESC
LIMIT 100
What this query finds:
Hunt logic: Examines RPC traffic metadata to identify calls to vulnerable Windows protocols using specific operation numbers that correspond to known coercion techniques.
Security implication: Successful coerced authentication enables attackers to:
SELECT timestamp, orig_hostname, id.orig_h, id.resp_h, resp_hostname, domain,
username, endpoint, hostname, operation, sensor_uid
FROM network.dce_rpc
WHERE (
(endpoint = 'unknown-c681d488-d850-11d0-8c52-00c04fd90f7e' AND operation
IN ('unknown-0', 'unknown-4', 'unknown-5', 'unknown-6', 'unknown-7', 'unknown-12',
'unknown-13', 'unknown-15')) OR
(endpoint = 'spoolss' AND operation IN
('RpcRemoteFindFirstPrinterChangeNotificationEx')) OR
(endpoint = 'unknown-a8e0653c-2744-4389-a61d-7373df8b2292' AND operation
IN ('unknown-8', 'unknown-9')) OR
(endpoint = 'netdfs' AND operation IN ('NetrDfsAddStdRoot', 'NetrDfsRemoveStdRoot'))
) AND timestamp > date_add('day', -14, now())
ORDER BY timestamp DESC
LIMIT 100What this query finds:
Hunt logic: Examines iSession metadata to identify outbound TCP connections with SSH protocol occurring on ports other than port 22.
Security implication: Outbound SSH on non-standard ports is associated with:
SELECT timestamp, uid, id.orig_h, orig_hostname, id.resp_h, resp_hostname,
id.resp_p, proto_name, orig_ip_bytes, resp_ip_bytes, duration, conn_state, sensor_uid, service
FROM network.isession
WHERE LOWER(service) = 'ssh' AND id.resp_p != 22 AND local_resp != true AND
timestamp > date_add('day', -14, now())
ORDER BY timestamp DESC
LIMIT 100What this query finds:
Hunt logic: Groups all successful sign-ins by user over the last 24 hours, counts distinct countries per user, and identifies users appearing in more than one country.
Security implication: Multi-country sign-ins within 24 hours indicate probable credential compromise — rapid international travel is physically impossible for most users. This pattern is characteristic of credential stuffing and account takeover campaigns targeting enterprise identity.
SELECT DISTINCT(vectra.identity_principal), COUNT(DISTINCT location.country_or_region) AS CountryCount,
MIN(timestamp) AS FirstLogin, MAX(timestamp) AS LastLogin
FROM entra.signins._all
WHERE location.country_or_region IS NOT NULL
AND timestamp > date_add('day', -1, now())
GROUP BY vectra.identity_principal
HAVING COUNT(DISTINCT location.country_or_region) > 1
ORDER BY CountryCount
LIMIT 100What this query finds:
Hunt logic: Aggregates failed sign-in attempts by IP address over the last 6 hours, identifying IPs with high failure volumes that indicate automated attack tooling.
Security implication:
SELECT ip_address, COUNT(*) AS FailedAttempts,
COUNT(DISTINCT vectra.identity_principal) AS UniqueUsers,
MIN(timestamp) AS FirstFailure,
MAX(timestamp) AS LastFailure
FROM entra.signins."Demolab-AD"
WHERE ip_address IS NOT NULL
AND timestamp > date_add(hour, -6, now())
AND status.error_code != 0
GROUP BY ip_address
HAVING COUNT(*) >= 20
ORDER BY FailedAttempts
LIMIT 100What this query finds:
Hunt logic: Analyzes Azure activity logs for storage account read operations over the last 6 hours, identifying sources with read counts at or above the bulk-access threshold.
Security implication: Bulk storage read operations indicate:
SELECT vectra.identity,
resourceid,
COUNT(*) AS AccessCount,
COUNT(DISTINCT ResourceId) AS UniqueStorageAccounts,
MIN(timestamp) AS FirstAccess,
MAX(timestamp) AS LastAccess
FROM azurecp.operations._all
WHERE timestamp > date_add(hour, -6, now())
AND UPPER(operationname) IN ('MICROSOFT.STORAGE/STORAGEACCOUNTS/BLOBSERVICES/CONTAINERS/BLOBS/READ',
'MICROSOFT.STORAGE/STORAGEACCOUNTS/FILESERVICES/SHARES/FILES/READ')
AND resulttype = 'Success'
GROUP BY vectra.identity, ResourceId
HAVING COUNT(*) >= 100
ORDER BY AccessCount
LIMIT 100What this query finds:
Hunt logic: Examines Azure activity logs for Key Vault access operations over the last 24 hours, identifying sources that exceed normal application access volumes.
Security implication: Excessive Key Vault access is associated with credential harvesting attacks where compromised identities are used to steal:
SELECT calleripaddress,
vectra.identity,
resourceid,
operationname,
COUNT(*) AS SecretAccessCount,
COUNT(DISTINCT resourceid) AS UniqueSecrets,
MIN(timestamp) AS FirstAccess,
MAX(timestamp) AS LastAccess
FROM azurecp.operations._all
WHERE timestamp > date_add('hour', -24, now())
AND operationname IN ('SecretGet', 'KeyGet', 'CertificateGet')
AND resulttype = 'Success'
AND calleripaddress IS NOT NULL
GROUP BY calleripaddress, vectra.identity, resourceid, operationname
HAVING COUNT(*) >= 20 OR COUNT(DISTINCT resourceid) >= 10
ORDER BY SecretAccessCount
LIMIT 100Compliance-based hunting targets violations of security policies, access controls, or architectural boundaries defined by regulatory or internal standards. This approach surfaces risky behavior that may not be outright malicious but could signal misconfigurations, insider threats, or enforcement gaps — often before they become audit findings or breach vectors.
What compliance-based hunts are designed to surface:
What this query finds:
Hunt logic: Scans network SMB activity over the past 14 days, listing distinct source hosts using SMBv1.
Security implication: SMBv1 usage creates risk across three dimensions:
SELECT DISTINCT id.orig_h, orig_hostname.name
FROM network.smb_mapping._all
WHERE version = 'SMBv1' AND timestamp > date_add('day', -14, now())What this query finds:
Hunt logic: Searches HTTP logs for proxied CONNECT methods that do not use standard HTTPS (port 443). Vectra AI's deep packet service inspection identifies HTTP traffic regardless of port number, making this hunt effective even against port-evasion techniques.
Security implication: HTTP CONNECT on uncommon ports indicates:
SELECT timestamp, id.orig_h, orig_hostname, user_agent, id.resp_h, resp_hostname,
id.resp_p, method, host, uri, status_code
FROM network.http
WHERE is_proxied = true AND LOWER(method) = 'connect' AND uri NOT LIKE '%:443'
AND timestamp > date_add('day', -14, now())
ORDER BY timestamp DESC
LIMIT 100
What this query finds:
Hunt logic: Detects HTTP user-agent strings indicating usage of outdated web browsers. Persistent use across multiple days highlights systems that are unpatched and at elevated exploitation risk.
Security implication: Outdated browsers are commonly exploited via:
Persistent outdated browser usage often indicates broader endpoint hygiene gaps and may represent a compliance violation against endpoint hardening policies.
SELECT id.orig_h, orig_hostname.name AS hostname, user_agent, COUNT(*) AS request_count
FROM network.http._all
WHERE timestamp BETWEEN date_add('day', -14, now()) AND now()
AND ( user_agent LIKE '%MSIE%'
OR user_agent LIKE '%Firefox/[3-6]%'
OR user_agent LIKE '%Chrome/[1-9]%'
OR user_agent LIKE '%Chrome/[1-4][0-9]%'
OR user_agent LIKE '%Version/(1[0-6](\.\d+)*)\s+Safari%' )
GROUP BY id.orig_h, orig_hostname.name, user_agent
ORDER BY request_count DESC
LIMIT 100What this query finds:
Hunt logic: Searches DNS metadata for outbound queries to known generative AI platform domains, surfacing hosts, request volumes, and usage patterns.
Security implication: Unsanctioned AI adoption introduces three categories of risk:
SELECT query, COUNT(DISTINCT orig_hostname.name) as unique_host_count,
COUNT(*) as total_query_count
FROM network.dns
WHERE ( query LIKE '%openai.com'
OR query LIKE '%chat.openai.com'
OR query LIKE '%anthropic.com'
OR query LIKE '%claude.ai'
OR query LIKE '%bard.google.com'
OR query LIKE '%bing.com'
OR query LIKE '%cohere.ai'
OR query LIKE '%huggingface.co'
OR query LIKE '%mistral.ai'
OR query LIKE '%deepseek.com%' )
AND timestamp BETWEEN date_add('day', -14, now()) AND now()
GROUP BY query
ORDER BY unique_host_count DESC, total_query_count DESC
LIMIT 100IOC-based threat hunting validates potential exposures, uncovers attacker infrastructure reuse, and catches threats that may have bypassed initial defenses. It is especially effective for responding to threat intelligence advisories or public disclosures of active campaigns.
IOCs are artifacts that hint at attacker activity when placed in context. They do not typically generate detections on their own — they require active investigation to confirm whether a match represents a true compromise.
Once you have an IOC or a set of them, the investigation workflow follows four steps:
Tip: Even if an IOC is stale or generic, it may still help surface long-dwelling threats or confirm containment after an incident.
Example workflow: A CISA advisory is published with indicators tied to a known APT campaign. You extract two domains, one IP, and a PowerShell hash. In the Vectra AI Platform, you search for one of the domains in HTTP metadata and spot activity three weeks ago. The destination host is a finance system. You pivot into Investigate and see related detections: "Abnormal Scripting Activity" and "Suspicious Lateral Movement." You now have high-confidence evidence to escalate and contain.
What this query finds:
Hunt logic: Searches for network sessions in the last 14 days where the destination domain matches a list of known-bad domains.
Security implication: Connections to attacker-controlled domains can indicate:
SELECT timestamp, uid, id.orig_h as "id_orig_h", orig_hostname, id.resp_h as "id_resp_h",
resp_hostname, id.resp_p as "id_resp_p", proto_name, orig_ip_bytes,
resp_ip_bytes, duration, conn_state, sensor_uid
FROM network.isession
WHERE (resp_domain = 'baddomain1.com' OR resp_domain = 'baddomain2.com')
AND timestamp > date_add('day', -14, now())
ORDER BY timestamp DESC
LIMIT 100What this query finds:
Hunt logic: Searches for all network sessions involving specific IP addresses as either source or destination.
Security implication: IP-based IOCs are frequently reused across multiple threat actor campaigns. Matches may indicate:
SELECT timestamp, uid, id.orig_h as "id_orig_h", orig_hostname, id.resp_h as "id_resp_h",
resp_hostname, id.resp_p as "id_resp_p", proto_name, orig_ip_bytes, resp_ip_bytes,
duration, conn_state, sensor_uid
FROM network.isession
WHERE (id.resp_h IN ('192.0.2.1', '192.0.2.2') OR id.orig_h IN ('192.0.2.1', '192.0.2.2'))
AND timestamp > date_add('day', -14, now())
ORDER BY timestamp DESC
LIMIT 100What this query finds:
Hunt logic: Scans SMB file activity from the past 14 days, extracting and listing files with unusually long base filenames.
Security implication: Excessively long or obfuscated file names signal:
SELECT name, REGEXP_EXTRACT(name, '([^\\/]+)$') AS base_filename,
LENGTH(REGEXP_EXTRACT(name, '([^\\/]+)$')) AS base_length
FROM network.smb_files
WHERE LENGTH(REGEXP_EXTRACT(name, '([^\\/]+)$')) > 50 AND timestamp > date_add('day', -14, now())
ORDER BY base_length DESC
LIMIT 50What this query finds:
Hunt logic: Extracts filenames containing no vowels (only consonants or symbols) from SMB file activity in the last 14 days.
Security implication: Vowel-free file names indicate programmatic generation — a common evasion technique used by malware builders to avoid signature-based detection. Undetected, these payloads increase attacker dwell time and attack impact.
SELECT name, REGEXP_EXTRACT(name, r'([^\\/]+)$') AS base_filename
FROM network.smb_files
WHERE REGEXP_LIKE(REGEXP_EXTRACT(name, r'([^\\/]+)$'), '^[^aeiouAEIOU]+$') AND
timestamp > date_add('day', -14, now())
LIMIT 50What this query finds:
App/Data/Roaming/ pathsHunt logic: Searches SMB file activity from the last 14 days for files accessed in AppData/Roaming paths. The query can be modified to monitor any file paths of concern in your specific environment.
Security implication: AppData/Roaming directories are specifically targeted by malware and attacker tools because:
SELECT timestamp, uid, id.orig_h as "id_orig_h", orig_hostname, id.resp_h as "id_resp_h",
resp_hostname, id.resp_p as "id_resp_p", version, path, action, name, sensor_uid
FROM network.smb_files
WHERE path LIKE '%/App/Data/Roaming/%' AND timestamp > date_add('day', -14, now())
ORDER BY timestamp DESC
LIMIT 100What this query finds:
Hunt logic: Pulls SSL/TLS session logs from the last 14 days, filtering for a specific JA3 hash known to match TOR clients.
Security implication: TOR usage in an enterprise environment can indicate:
For further reference: JA3 methodology documentation is available at https://github.com/salesforce/ja3. Community-curated JA3 fingerprints are available at https://ja3.zone/.
SELECT timestamp, uid, id.orig_h as "id_orig_h", orig_hostname, id.resp_h as "id_resp_h",
resp_hostname, id.resp_p as "id_resp_p", server_name, client_version,
next_protocol, cipher, ja3, established, sensor_uid
FROM network.ssl
WHERE ja3 = 'e7d705a3286e19ea42f587b344ee6865' AND timestamp > date_add('day', -14, now())
ORDER BY timestamp DESC
LIMIT 100Threat hunting delivers the most value when it is operationalized, embedded as a regular practice rather than a reactive, one-time exercise. The queries in this guide are starting points. The goal is to adapt them to your environment, save the most effective variants, and build them into structured hunting cadences.
How to operationalize hunting with the Vectra AI Platform:
Familiarity built through consistent hunting is an operational multiplier during incident response, teams that hunt regularly investigate faster, triage more accurately, and contain threats before they escalate.