Both the options
Threat hunters use software and tools to find suspicious activities. There are three main categories of solutions and tools:
a) Security monitoring tools—tools such as firewalls, antivirus, and endpoint security solutions collect security data and monitor the network.
b) SIEM solutions—security information and event management (SIEM) help manage the raw security data and provide real-time analysis of security threats.
c) Analytics tools—statistical and intelligence analysis software. These tools provide a visual report through interactive charts and graphs, making it easier to correlate entities and detect patterns.