EDR Flashcards

1
Q

: What does the acronym EDR stand for, and what is its primary function?

A

EDR stands for Endpoint Detection and Response. Its primary function is to monitor, detect, and respond to security threats on endpoint devices, like computers, servers, and mobile devices, to protect against cyber threats and suspicious activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List three types of data an EDR system typically collects from an endpoint.

A

An EDR system typically collects data on:
File changes (modifications, deletions, or unauthorized creations)
Network activity (unusual outbound connections or data transfer)
Process and application behavior (execution of unusual or unauthorized programs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain how EDR contributes to an organization’s cybersecurity by continuously monitoring endpoints.

A

EDR helps protect an organization’s cybersecurity by continuously monitoring endpoint devices for signs of malicious behavior. It collects data from each endpoint, analyzing it for indicators of compromise (IoCs), like unusual network traffic or unauthorized access to files. This allows security teams to identify threats early and take action before an attacker can cause significant harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe how EDR systems differentiate between normal behavior and suspicious activity. What techniques are commonly used to make this distinction?

A

EDR systems differentiate between normal and suspicious activity using behavioral analytics, machine learning, and baseline monitoring. Behavioral analytics helps detect anomalies by comparing current activity to known normal behavior. Machine learning can identify subtle patterns of threats that may not be detected by signatures alone. Baseline monitoring establishes “typical” behavior for an endpoint and flags deviations, such as unusual login locations or times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company employee opens a suspicious email attachment that triggers an alert in the EDR system. Outline the steps the EDR system might take in response to this event.

A

In response to a suspicious email attachment:
Alert Generation: The EDR system flags the unusual activity, alerting the security team.
Isolation: EDR might automatically isolate the affected endpoint from the network to prevent lateral movement.
File Analysis: Security analysts investigate the file for malicious code or hidden malware.
Root Cause Analysis: The team checks if the file originated from a known threat actor or a phishing email.
Remediation: If the file is malicious, the EDR may quarantine it and alert the employee to prevent further downloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In a scenario where an EDR detects a sudden spike in data transfer from a specific endpoint, describe how the EDR system would respond and what actions a security analyst might take.

A

If an EDR detects a sudden data transfer spike:
Immediate Alert: The EDR flags the activity, alerting security analysts to possible data exfiltration.
Investigation: Analysts check logs for recent user activity, file changes, and network connections from the endpoint.
Isolation: If deemed a risk, the EDR may isolate the device to halt data transfer.
Response: The team determines if the spike was legitimate or related to a breach, adjusting security protocols accordingly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the key components of an EDR system, and how do they work together to detect and respond to threats?

A

the main components of an EDR system are:
Endpoint Sensors: These are installed on endpoints to collect data continuously.
Centralized Analytics Platform: Aggregates data from sensors, using analytics and machine learning to detect anomalies.
Dashboard: Provides a user interface for analysts to review alerts, investigate incidents, and manage responses.
Relationship: Sensors gather data and send it to the analytics platform, which flags potential threats. The dashboard allows analysts to view and act on these alerts, making all components essential for comprehensive threat detection and response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does EDR differ from SIEM (Security Information and Event Management) systems in functionality, and how can the two be integrated to improve overall security?

A

EDR focuses on monitoring endpoint-specific threats, whereas SIEM (Security Information and Event Management) integrates logs from multiple sources, providing broader network visibility. EDR and SIEM can work together by:
Feeding EDR alerts and endpoint data into SIEM, offering a combined view of both network and endpoint-level incidents.
SIEM supports deeper analysis, while EDR allows faster endpoint-specific responses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Compare and contrast the benefits and limitations of using EDR versus MDR (Managed Detection and Response) for a mid-sized business.

A

EDR: Allows in-house teams to control endpoint security, making it suitable if there’s a dedicated IT team. However, it may require significant resources and expertise to manage.
MDR: Offers outsourced, round-the-clock monitoring and expert analysis, ideal for mid-sized businesses without large security teams. However, it may be costlier and less customizable than EDR.
Conclusion: MDR may be more effective for a mid-sized business, providing expertise and continuous support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Evaluate the effectiveness of an EDR solution in a small business with limited IT resources. What challenges might they face, and what features would be essential for success?

A

An EDR solution can enhance security in a small business by detecting endpoint-level threats early. Challenges may include limited IT support for managing alerts and analyzing data, making automation and ease of use essential. The best EDR solution for small businesses should include automated response features and minimal configuration requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Design an EDR strategy for a financial institution that deals with sensitive customer data. Include at least three specific features or practices you would implement to protect against advanced threats.

A

For a financial institution:
Behavioral Analytics: Detects anomalies in access to financial records or confidential data.
Privileged Access Monitoring: Flags unusual access by users with elevated privileges, as these accounts are high-risk.
Integration with Compliance Auditing: Provides logs that support regulatory requirements like PCI DSS to meet compliance.
Conclusion: These features help detect early threats, secure sensitive data, and maintain compliance in a high-risk sector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Propose two new features that could be added to EDR systems to enhance security in a remote work environment. Explain how these features would address remote work challenges.

A

For remote work environments:
Enhanced User Behavior Analytics: Monitors remote access patterns and flags anomalies, such as unusual login times or access from new locations.
VPN and Cloud Application Monitoring: Extends EDR capabilities to monitor VPN connections and cloud-based applications that remote employees frequently use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly