This section groups the tabs that allow the user to control emulations. Includes Endpoints, Threat Library, Packages, Emulations, IoC Validation, Custom Threat, and Incursion.
Last updated 5 months ago