This document discusses various types of threat hunting and provides examples of threat hunting use cases. The main types of threat hunting covered are IOC based, hypotheses based, baseline based, and anomaly based threat hunting. Several threat hunting use cases are then described in more detail, including hunting for abnormal cmd.exe spawns, suspicious RDP activities, stopping of Windows defensive services, and suspicious task scheduler usage. The document concludes with an overview of how to conduct an end to end threat hunting process by defining hypotheses and hunting across various data sources and platforms.