Idaho Official Government Website

Threat Hunting

Proactive prevention of cybersecurity threats and response to potential incidents.

Service Includes

  • Monitor threat alerts from internal and external sources
  • Email phishing and malicious attachment inspection
  • Cyber incident response
  • Log inspection for anomalies


  • ITS antivirus detection software
  • State owned hardware and software

What Is Excluded

•    Personally-owned hardware and software

Customer Responsibility

  • Timely notification of potential cybersecurity issues
  • Follow ITA acceptable use policies for hardware and software
  • Agency cooperation with investigative process

Rates and Billing