Best Practices for Network Security Threat Hunting with ExtraHop and Ixia