With threat hunting, the network, system and other components of the corporation are analyzed, and advanced malicious activities that still exist or whose effects are ongoing are detected and transferred to the incident response team. In the first step of the threat hunting service, the information systems of the corporation are analyzed. According to the results of this analysis, it is aimed to detect weaknesses and possible cyber threats. With a proactive approach, we provide risk mapping and instant monitoring of the activities taking place in your corporate network before a threat occurs.