Endpoint Detection and Response

Table of Contents

What is Endpoint Detection and Response?

This post complements the Wiki entry “Virus scanner”, which explains what antivirus programs are, how virus scanners work and what their advantages and disadvantages are.

He sheds light on Endpoint Detection and Response (EDR), a further development of virus scanners and endpoint protection, to support the development of Malware combat it with the help of new technologies.

What is EDR (Endpoint Detection and Response)?

Endpoint Detection and Response (EDR) is an advanced solution integrated with Endpoint Protection to enable continuous data collection, monitoring, and automated analysis and response functionality. It protects endpoints from advanced malware, APTs and phishing attacks protect.

Are you looking for professional advice on protecting your IT?
We are happy to support you! Contact us now!
To the contact request!

What type of threat does it protect against?

EDR protects against malware, anomalous behavior, and fileless attacks using advanced analytics. It also deals with documenting and tracking the tactics, techniques and procedures (TTP/Tactic, Technique and Procedure) used as to how the attackers entered and moved through the network.

Most organizations implement endpoint protection, which is a means of reactive security, but integrating EDR also provides organizations with proactive security. Even with the best solutions, there is no 100% protection; it makes access more difficult for attackers due to the significantly increased effort and the required know-how.

Some information collected by EDR:

Icon Threat Modeling Assets

1. Processes:

The analysis of processes provides information about running programs on end devices. Malicious processes invoke other processes, and this information can help determine the parent process of a malicious process.

Icon Network

2. Network connections:

Information about all active and pending connections is collected.

Icon Laptop Gear

3. System information:

Collecting information about end devices to detect abnormal system behavior. This information helps determine what has changed on a system in the event of an incident.

ProSec Icon Social Engineering​

4. User Information:

Collecting user information for machine learning can help determine their standard user behavior and thus detect anomalies.

PSN Rocket Launch

5. Autostart:

Autostart control. This is one of the most common means of executing code and attacking systems, as some malware tries to hide in the Windows startup process.

Endpoint detection and response capabilities

PSN Icon Man in the Middle

1. Collect and Monitor:

The data is collected centrally for monitoring and used to detect threats. This collected data is useful to Security Operation Centers (SOC) and used in incident response.

ProSec Icon Ransomware

2. Alerting and prioritization:

If threats are detected, those responsible for IT security are alerted. If multiple threats occur, prioritization is carried out in order to effectively avert the danger.

PSN Icon Analysis

3. Investigation:

EDR offers the ability to visually display the progression of the attack using correlated events.

Icon Laptop Gear

4. Automation and real-time threat response:

If endpoints do not comply with guidelines or malware is discovered, EDR offers automated response options, such as isolating these endpoints from the network or isolating the entire network area.

Icon map

5. Hunting Threats:

Through active searching, threats can be found and prevented from malicious exploitation.
Your IT won't yet
monitored by a SOC?
Contact us now and we will help you implement it!
For IT security advice

Application areas of endpoint detection and response

Proactively by addressing potential dangers (Cross referencing to “Network Traffic Analysis”)

Replacement of regular endpoint protection for larger companies with their own SOC

For subsequent incident analysis

Newsletter Form

Become a Cyber ​​Security Insider

Get early access and exclusive content!


By signing up, you agree to receive occasional marketing emails from us.
Please accept the cookies at the bottom of this page to be able to submit the form!
OTHER CONTRIBUTIONS

Table of Contents

PSN_KU_Cover
NewsLetter Form Pop Up New

Become a Cyber ​​Security Insider

Subscribe to our knowledge base and get:

Early access to new blog posts
Exclusive content
Regular updates on industry trends and best practices


By signing up, you agree to receive occasional marketing emails from us.
Please accept the cookies at the bottom of this page to be able to submit the form!