How To Detect Malicious Network Share Usage With The Windows Event Logs When Threat Hunting