TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

What Endpoint Detection and Response (EDR) Looks Like | Huntress

2023-02-23 · Read original ↗

ATT&CK techniques detected

4 predictions
T1486Data Encrypted for Impact
93%
“more in - depth risk analysis and root cause assessment of the attack vector employed. av solutions know a lot about a few milliseconds of activity and quickly lose value when the questions “ when, ” “ where, ” “ why ” and “ how ” are brought up regarding the left or right of the…”
T1518.001Security Software Discovery
82%
“. let ’ s dispel some rumors hopefully, this blog was able to provide some context around what edrs do with respect to their close resemblance to av / ngav solutions. they may collect a lot of the same data, but how it ’ s extracted, stored, and analyzed are the key differentiato…”
T1518.001Security Software Discovery
69%
“what endpoint detection and response ( edr ) looks like | huntress endpoint detection and response ( edr ) is simply named, yet it ’ s anything but simple when trying to understand the variance, capability, and efficacy of edr solutions in the market. in this blog, we ’ re going …”
T1588.002Tool
47%
“edr has become nebulous and hard to differentiate from a feature / delivery perspective. almost every vendor of an edr product has a proprietary av solution that bundles with that capability ( for an additional cost ). huntress ’ managed edr does not rely on microsoft defender fo…”

Summary

We’re going to try to cut through the noise and shed some light on EDR to understand the variance, capability, and efficacy of EDR solutions in the market.