Introduction

Tools to find malicious actors in an environment that have slipped past the initial endpoint security defences.