Create your own rules to detect threats by monitoring system calls.
You must be logged in to post a comment.