Summary
In this chapter we review the basics of Adversary Emulation and how to create an adversary emulation plan. We have also reviewed the main tools that we are going to use in the following exercises. Next, we are going to start setting up the threat hunting environment to move forward with practical hunting exercises!