EDR
Use the Profiles > EDR tab to configure profiles and exclusions for EDR threat hunting, which features a set of software tools and information sources focused on detecting, investigating, containing, and mitigating suspicious activities on end-user devices.
To set up Threat Hunting in EDR, configure the following: