The process of threat hunting is usually built on the foundation of planning, baselining, and testing based on the hypothesis. Besides these, a threat hunter also uses automated tools to boost threat analysis and identify any suspicious patterns and relationships on a large scale.
