https://store-images.s-microsoft.com/image/apps.9737.f8bda46a-9d4c-4982-a449-6adca1991078.cc3a615f-41af-41ef-9f29-ab19fa69037d.6e94bfa1-bca6-4f13-8a70-fa9a1e109f21
AC-Hunter
Active Countermeasures Inc.
AC-Hunter
Active Countermeasures Inc.
AC-Hunter
Active Countermeasures Inc.
Continuously threat hunts your network to identify which of your systems have been compromised
Setup Guide: https://portal.activecountermeasures.com/wp-content/uploads/2023/05/AC-Hunter-Azure-Setup-Guide-v6-4-0.pdf
AC-Hunter™ is a software solution that continuously threat hunts your network to identify which of your systems have been compromised.
Our Core Focus Is Identifying Compromised Systems Calling Home to Their Command and Control Servers. We Have Streamlined and Automated the Techniques Used by the Best Pentesters and Threat Hunters in the Industry.
AC-Hunter™ is a software solution that continuously threat hunts your network to identify which of your systems have been compromised.
Our Core Focus Is Identifying Compromised Systems Calling Home to Their Command and Control Servers. We Have Streamlined and Automated the Techniques Used by the Best Pentesters and Threat Hunters in the Industry.
- Equally Monitor All Network Communications That Arrive and Depart Your Azure Network
- Advanced Automated Threat Hunting Increases Your Security Teams’ Success and Productivity
- We Have Been Awarded 24 Patents for Our Software
- AC-Hunter can quickly analyze millions of connection requests and easily identify which systems have been compromised
- AC-Hunter continuously threat hunts the previous 24-hours of your network traffic
- AC-Hunter utilizes patented and innovative beacon detection and connection behavior algorithms
- AC-Hunter inspects encrypted sessions while maintaining data privacy and integrity
- Simple-to-use Graphical User Interface – Designed for everyone from junior analysts to seasoned professionals
- Safelisting – Safelist communications by source, destination, pairs, single IP address, class A, B or C range, FQDN, Org Name, or ASN
- SIEM and Slack Alerting – AC-Hunter can notify you of threats via Slack, the SIEM of your choice, or a centralized logging server
- Cyber Deception - Receive alerts when a threat-actor attempts to access monitored accounts or files in your Windows Active Directory environment
https://store-images.s-microsoft.com/image/apps.61360.f8bda46a-9d4c-4982-a449-6adca1991078.cc3a615f-41af-41ef-9f29-ab19fa69037d.ca31c784-8efd-4d3f-be0c-3ca93d8679bd
https://store-images.s-microsoft.com/image/apps.61360.f8bda46a-9d4c-4982-a449-6adca1991078.cc3a615f-41af-41ef-9f29-ab19fa69037d.ca31c784-8efd-4d3f-be0c-3ca93d8679bd
https://store-images.s-microsoft.com/image/apps.63374.f8bda46a-9d4c-4982-a449-6adca1991078.cc3a615f-41af-41ef-9f29-ab19fa69037d.8aeda310-04d6-409f-8ce5-c6b2260368a1
https://store-images.s-microsoft.com/image/apps.5134.f8bda46a-9d4c-4982-a449-6adca1991078.cc3a615f-41af-41ef-9f29-ab19fa69037d.7fa138f9-f34e-4fee-9af1-8b4174820e30
https://store-images.s-microsoft.com/image/apps.10320.f8bda46a-9d4c-4982-a449-6adca1991078.cc3a615f-41af-41ef-9f29-ab19fa69037d.3b2f11d2-194d-41e2-b671-30e216c72162
https://store-images.s-microsoft.com/image/apps.4220.f8bda46a-9d4c-4982-a449-6adca1991078.cc3a615f-41af-41ef-9f29-ab19fa69037d.b603ec7e-9f89-4c0f-801c-a4320d65af10
https://store-images.s-microsoft.com/image/apps.34843.f8bda46a-9d4c-4982-a449-6adca1991078.cc3a615f-41af-41ef-9f29-ab19fa69037d.51f6a2e6-8c2a-4e0f-8178-429c5c1f9850
https://store-images.s-microsoft.com/image/apps.3158.f8bda46a-9d4c-4982-a449-6adca1991078.cc3a615f-41af-41ef-9f29-ab19fa69037d.930ebc53-8918-463a-a413-2e95ad14d776