Practical 2: Threat Hunting Challenge
Use log artifacts and a simulated MITRE attack path to detect lateral movement