Tips From the Trenches: Hunting Endpoint Threats at Scale