This document provides an overview of threat hunting using Windows logs. It discusses why threat hunting is important given that existing controls may fail to detect attackers. It then outlines the threat hunting methodology, focusing on collecting log data from Windows event logs like IDs 4688, 4698, 4104, and 4103 that can help detect attacker techniques, persistence mechanisms, and malicious PowerShell usage. Basic threat hunting strategies are presented like statistical analysis and open source intelligence. Open source tools for collecting, analyzing, and visualizing log data to support threat hunting are also listed.