The document describes an example of investigating a phishing attack on a company using Apache Metron. An employee reports receiving a suspicious email appearing to be from an internal co-worker. A security analyst uses Metron to investigate by accessing various systems and services from a single interface. Metron's analytics detect anomalies and help determine the attack compromised another employee's email account. It identifies the scope of affected users and how the attack occurred, faster than traditional tools. The document demonstrates Metron's abilities to streamline incident response and threat hunting across multiple data sources.