Port 22

The art and science behind Microsoft threat hunting: Part 3