Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Security Operations Glossary

XDR (Extended Detection & Response)

An integrated security platform that correlates telemetry data from endpoints (EDR), the network (NDR), email, and the cloud, and analyzes it across silos. XDR serves as the overarching framework—NDR provides network telemetry, EDR provides endpoint telemetry, and SIEM provides log aggregation.

XDR (Extended Detection & Response) is an evolution of the EDR concept that extends across the entire IT environment. While EDR monitors only endpoints, XDR integrates telemetry data from endpoints, the network, email, the cloud, and identity systems into a central analytics platform.

EDR vs. MDR vs. XDR vs. SIEM

SolutionFocusTelemetryExamples
EDREndpoints (Windows, macOS, Linux)Processes, files, registry, network connectionsCrowdStrike Falcon, SentinelOne, Microsoft Defender for Endpoint
NDRNetwork trafficNetFlow, packets, DNS, protocol metadataDarktrace, ExtraHop, Vectra AI
SIEMLog aggregation + correlationLogs from EVERYTHINGSplunk, Microsoft Sentinel, IBM QRadar
XDRALL vectors unifiedEndpoint + network + email + cloud + identityPalo Alto Cortex, Microsoft Defender XDR, CrowdStrike Falcon Complete
MDRXDR + external SOC operationsLike XDR24/7 monitoring by service provider

How XDR detects attacks

Attack without XDR (siloed view):

  • EDR: "Suspicious process on Workstation-14"
  • Email gateway: "Phishing email blocked" (different console!)
  • Network: "DNS request to unknown domain" (yet another console!)

IT must manually correlate: do these belong together? Average detection time: 197 days (IBM Cost of Breach).

Attack with XDR (correlated view):

XDR aggregates all three events into a single alert:

ALERT: Ransomware attack in progress
┌─────────────────────────────────────────┐
│ 09:14 Phishing email received           │
│        User: j.schmidt@firma.de     │
│ 09:17 Attachment opened (Word document)   │
│        Workstation: WS-JSCHMIDT         │
│ 09:17 Macro executed → PowerShell     │
│ 09:18 DNS query: evil-c2.ru           │
│ 09:19 Outbound HTTP to 185.234.x.x      │
│ 09:21 Lateral movement via SMB          │
└─────────────────────────────────────────┘
Confidence: 94% | Recommendation: ISOLATE
  • Automatic Response: WS-JSCHMIDT isolated!
  • Detection time: 7 minutes instead of 197 days

Microsoft Defender XDR - Practical Example

Microsoft Defender XDR integrates:

  • Defender for Endpoint (EDR)
  • Defender for Office 365 (Email)
  • Defender for Identity (AD Protection)
  • Defender for Cloud Apps (CASB)
  • Microsoft Sentinel (SIEM)
// KQL query for suspicious PowerShell activity:
DeviceProcessEvents
| where FileName =~ "powershell.exe"
| where ProcessCommandLine has_any ("-enc", "-EncodedCommand", "bypass", "IEX")
| where InitiatingProcessFileName =~ "winword.exe"
| project Timestamp, DeviceName, AccountName, ProcessCommandLine
| sort by Timestamp desc

Automatic Investigation:

  • ALERT: "Suspicious macro execution" → automatic investigation
  • XDR automatically checks: similar activity on other devices?
  • Entities analyzed: user, device, IP, domain, file hash
  • Recommendation: "Isolate device, reset credentials"

Native XDR vs. Open XDR

Native XDR (Vendor Stack)

  • All components from the same vendor
  • Deep integration, best correlation
  • Vendor lock-in
  • Example: Microsoft Defender XDR (Microsoft products only)

Open XDR (Cross-Vendor)

  • Integrates tools from different vendors via API
  • More flexible, but higher integration effort
  • Examples: Palo Alto Cortex XDR, CrowdStrike Falcon
  • Useful if: existing Splunk + CrowdStrike + Darktrace

Decision Criteria

SituationRecommendation
Microsoft ecosystemMicrosoft Defender XDR (native)
Heterogeneous environmentOpen XDR or SOAR supplement
No in-house SOCEngage MDR service

XDR ROI and Key Metrics

Mean Time to Detect (MTTD)

Value
Without XDR197 days (IBM 2024)
With XDR< 1 day (Target: minutes)

Mean Time to Respond (MTTR)

Value
Without XDR> 30 days
With XDR< 4 hours

Alert Fatigue

  • SIEM Tuning: hundreds of alerts/day
  • XDR: 5–15 prioritized, correlated incidents/day

SOC Productivity

  • Fewer tool switches (single pane of glass)
  • Automated triage for 70% of alerts
  • Analysts focus on complex cases