https://www.hackingarticles.in/threat-hunting-velociraptor-for-endpoint-monitoring-part-2/
Threat Hunting: Velociraptor for Endpoint Monitoring (Part 2)