Malicious code is detected
Malware, ransomware, and other malicious code remain the most common cause of significant security incidents. Without endpoint detection, an attacker can establish persistence, exfiltrate data, or encrypt your systems before anyone notices anything is wrong. Modern endpoint detection and response tools catch threats that traditional antivirus misses by analyzing behavior rather than relying solely on known signatures.
Implementation steps
- 1
Deploy EDR on all endpoints and servers
Install an endpoint detection and response agent on every company device: laptops, desktops, and servers. Confirm coverage through your management console and set up alerts for any unprotected endpoints.
crowdstrikesentinelonemicrosoft-defendercarbon-black - 2
Enable real-time protection and behavioral detection
Ensure your EDR is configured for real-time scanning, not just scheduled scans. Enable behavioral analysis features that detect code executing in unexpected ways, not just known-bad file signatures.
crowdstrikesentinelonemicrosoft-defender - 3
Configure automated response and alerting
Set the EDR to automatically quarantine detected threats and alert your security team immediately. Connect EDR alerts to your SIEM or alerting platform so detections are visible alongside other security events.
crowdstrikepagerdutysplunkdatadog - 4
Review detection coverage and tune policies
Monthly, review your EDR dashboard for missed detections, false positives, and endpoints that dropped off coverage. Tune exclusion policies carefully to avoid creating blind spots.
crowdstrikesentinelone
Evidence required
EDR deployment coverage report
Report showing what percentage of endpoints have the EDR agent installed and active.
- · CrowdStrike Falcon dashboard showing sensor coverage
- · SentinelOne management console endpoint list
- · Microsoft Defender for Endpoint device inventory
Detection and alert configuration
Screenshots showing real-time protection is enabled and alerts are routed to the security team.
- · EDR policy configuration showing real-time scanning enabled
- · SIEM integration showing EDR alerts flowing in
- · PagerDuty or Slack alert showing a recent EDR detection
Recent detection or scan log
Log or report showing the EDR is actively detecting and scanning, even if no threats were found.
- · EDR activity log from the past 30 days
- · Threat detection report showing clean or quarantined items
- · Scheduled scan completion logs
Related controls
Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events
Continuous Monitoring
Networks and network services are monitored to detect adverse events
Continuous Monitoring
The physical environment is monitored to detect potential cybersecurity events
Continuous Monitoring
Personnel activity and technology usage are monitored to detect potentially adverse events
Continuous Monitoring