Logs from various sources can show a broad overview of activity but lack detail and nuance, providing an incomplete picture. Equipped with only this data, threat hunters can miss signs of a breach.