Emulation Control
This section groups the tabs that allow the user to control emulations. Includes Endpoints, Threat Library, Packages, Emulations, IoC Validation, Custom Threat, and Incursion.
Each of them described in the following sections.
Last updated