C2.a (point 8)—C2.a (point 8)
>Control Description
Your threat hunts focus on the tactics, techniques and procedures (TTPs) of threats over atomic IoCs (e.g. hashes, IP addresses, domain names etc)
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.