Threat Hunting using Log Analysis - The basics. How to use your logs for exploratory threat hunting and the indicators to look for.