C2.a (point 7)—C2.a (point 7)
>Control Description
You leverage automation to improve threat hunts where appropriate (e.g. some stages of the threat hunting process are automated)
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.