Threat intelligence enables cyber security teams to inform the SOC and incident response teams of potential and impending harmful activities and business risks.
How to looks for modifications to registry keys that can be used to launch an application or service at system startup with this process you can run in Splunk software.
You want to use Splunk software to create new baselines, then use this data to establish new alerts, monitoring, and reporting that fit with a home-based workforce.