Endpoint Detection & Response Flashcards
1
Q
What is Endpoint Detection and Response?
A
Endpoint Detection and Response Solutions, is designed to detect, malicious activity on endpoints like computers, servers, tablets and mobile devices.
2
Q
What are the top 8 ways EDR Identifies threats?
A
- Behavioral Analysis
- Signature-Based Detection
- Heuristic Analysis
- Machine Learning (ML) & AI
- Real-Time Monitoring & Event Correlation
- Indicators of Compromise (IOCs)
- Automated Response and Remediation
- Threat Intelligence Integration
3
Q
What is Behavioral Analysis?
A
- Anomaly Detection: EDR tools monitor endpoint activities for unusual behavior that deviates from the baseline of normal operations. For instance, a user accessing unusual files or running unknown processes may trigger alerts.
- Threat Hunting: EDR allows proactive searching for potential threats by correlating behavior with known attack patterns, techniques, or tactics (e.g., MITRE ATT&CK framework).
4
Q
What is Signature-Based Detection
A
- EDR will use known malware signatures, things like (hashes, file patterns) to identify threats. This is similar to traditional antivirus solutions, but EDR typically combines it with other detection methods.
5
Q
What is Heuristic Analysis? ie, (Self problem solving or Discovery)
A
- Analyzes code structure and file behavior.
- EDR solutions can detect suspicious elements even if they don’t match a known malware signatures.
- Heuristics can help identify polymorphic malware that changes its code to evade detection.
6
Q
What is Machine Learning (ML) & AI?
A
- EDR uses ML models to identify emerging threats by analyzing vast amounts of data.
- It will scan for learning patterns, and flag potential threats based on predictive analysis.
7
Q
What is Real-Time Monitoring & Event Correlation?
A
- EDR solutions continuously monitor endpoints, logging various events such as file modifications, network connections, and process executions. These events are then correlated in real time to detect threats. For example, if a process tries to escalate privileges and connects to an external server, EDR might flag this as a potential attack.
8
Q
What is Indicators of Compromise (IOCs)?
A
- EDR can detect threats by comparing endpoint activity against a database of IOCs. These include specific artifacts like IP addresses, domains, file hashes, and registry changes known to be associated with attacks.
9
Q
What is Automated Response and Remediation?
A
- Once a threat is detected, EDR solutions may take automated actions like isolating the endpoint, killing processes, or rolling back changes to prevent further damage.
10
Q
What is Threat Intelligence Integration?
A
- EDR solutions often integrate with global threat intelligence feeds that provide up-to-date information on new malware, attack vectors, and threat actor activities. This helps detect threats based on intelligence gathered from other environments.