Attackers don’t stop after breaching a system — they start exploring, collecting, and arming themselves. This second part of Windows Threat Detection reveals how discovery, data collection, and tool transfer unfold through real-world cases and Windows telemetry.