DATAVERSITY: How to Plan a Threat Hunt: Using Log Analytics to Manage Data in Depth