Threat Hunting for Unusual Logon Activity

What is one of the first things that you think of when thinking of potential threat activity on your network? Most would probably say that there has been some unusual login activity ...