An analyst has sorted all recent detections in the Falcon platform to identify the oldest in an effort to determine
the possible first victim host What is this type of analysis called?
Which document provides information on best practices for writing Splunk-based hunting queries, predefined
queries which may be customized to hunt for suspicious network connections, and predefined queries which
may be customized to hunt for suspicious processes?