The process of proactively searching through networks to detect and isolate security threats, rather than relying on security solutions or services to detect those threats.