Best Practices Series: Implementing Advanced Threat Detection