Use the following instructions to enable Misconfigurations, Threat Detection, Host Vulnerability Management, and Container Vulnerability Management.

Kubernetes
Docker
ECS EC2
Windows
Linux