Find Malicious Infrastructure Assets

This video shows you how to use Legacy Search to find malicious infrastructure and rogue assets.