2023-08-07T09:46:00Z

What is the best way to work with EDR security as a SOC consultant?

Hello peers, 

I am a System Administrator at a large tech vendor. I am currently researching EDR tools and wish to learn more about them.

What is your experience with EDR solutions? What is the best way to work with EDR security as a SOC consultant?

Thank you for your help.

SK
System Administrator at Navisite
  • 5
  • 59
4
PeerSpot user
4 Answers
Harish (Kumar) - PeerSpot reviewer
Cyber Security and IT Head at Aeren
Real User
Top 5Leaderboard
2023-08-16T08:03:57Z
Aug 16, 2023

Working with EDR security as a SOC consultant, you must aware for these:


1. Assessment and Planning:


Evaluate client's security needs, devise an EDR deployment plan, and set goals.


2. Vendor Evaluation:


Choose an EDR solution that fits scalability, integration, and compliance requirements.


3. Deployment and Configuration:


Install and configure EDR on endpoints, customize rules for optimal performance.


4. Data Collection:


Gather endpoint data while optimizing for visibility and resource efficiency.


5. Threat Detection:


Monitor for anomalies and threats using EDR's analytics and machine learning.


6. Incident Response:


Develop and follow an incident response plan, automate actions for faster resolution.


7. Threat Hunting:


Actively seek advanced threats using threat intelligence and historical data.


8. Collaboration and Reporting:


Work with client teams, share insights, and provide detailed incident reports.


9. Training:


Educate client's teams on EDR use, threat analysis, and incident response.


10. Continuous Improvement:


Stay vigilant, adapt detection rules, and keep up with emerging threats.


11. Compliance:


Ensure EDR implementation aligns with industry regulations.


By following these steps, you create a robust EDR strategy to enhance your client's cybersecurity posture and effectively manage endpoint threats.

Search for a product comparison in EDR (Endpoint Detection and Response)
MV
IT Manager at Telecorp Inc.
Real User
2023-08-09T15:17:09Z
Aug 9, 2023

Ok, When EDR first came out there were only a few vendors. Now the field is vast and almost every company has one. I've gone through most and here's what I found. You will also want an MDR to go with your EDR solution. You will want to work with the MDR to make sure they are not too aggressive. I had one remove a client's CSR app on 150 machines and have crazy issues with Adobe and Adobe knock offs. The MDR is so you can sleep. Most attacks happen either immediately or very early in the morning. If the EDR has tripped the machine the machine stays locked but has the ability to be compromised until you get the alert and respond. An MDR will take care of it when it happens. It's expensive but you're starting from scratch so it's worth it. I use one on some sites and not on others.

You will want to test the service for 2 months with your worst user and more productive user. They do not catch browser takeover "viruses".  The ones that scream you watch porn the cops are coming call this number to remove it. They do not stop phishing. They do a great job on hackers and apps that phone home or try to sideways access computers as well as normal viruses or ransomware.  Choosing the EDR you will want to test it and you need to understand how to tune it and call support during the testing. Use those support calls to evaluate how they respond. If they stink when there no issues they will really stink when an outbreak occurs. Remember everyone has their own opinion. I've used CrowdStrike, Sentinal One, Black Ice, Bit Defender Gravity Zone, Norton total security, and I'm currently using Malware bytes OneView. I like its reporting and it seems to report catches that the other didn't. I had one situation where a machine with Norton got hacked and it destroyed the machine but not the network. They all work great and have different price points and features. Don't get caught up in any feature that can't be proven out. If it says it protects you from bad websites and you go on one. Then it didn't work. At the same time if you whitelist a website and it won't let you access it then it again doesn't work. In most cases, I moved on for various reasons. It's best to get one that works with your RMM. If you don't have an RMM you will want one. Besides remote access, they also keep your machines up to date. The integration will help with deployment. You will also want to look at DNS and Web filtering and phishing filters.  There's more but your probably asleep by now. I hope this helps.

FD
key principal at TECND
User
Sep 10, 2023

@Marc Vazquez Great guidance on what to get. 

PeerSpot user
SS
Technical Engineer at a tech services company with 1,001-5,000 employees
Real User
Top 5
2023-08-09T11:03:09Z
Aug 9, 2023

Hi, EDR is the emerging technology that will help you to do RCA of any environment, and EDR does have the capabilities to detect unknown, script base or fileless attacks, even some of the EDR vendors have the capabilities to prevent the ongoing attack. It totally works on behaviour base analysis and the EDR agent will monitor everything individual process which are running in your endpoints. I do feel that every organisation should put the EDR to their environment because attacks are very sophisticated nowadays. It has the capability to do Incident Response as well which typically allows users to take remote access to endpoints and run some commands in order to do remote remediation.

Gerald Mbewa - PeerSpot reviewer
Cyber Security Analyst at DIgital Sentry Ltd
Real User
Top 5Leaderboard
2023-08-09T07:56:54Z
Aug 9, 2023

Working with Endpoint Detection and Response (EDR) security as a Security Operations Center (SOC) consultant involves a strategic and hands-on approach to effectively manage and respond to potential security threats and incidents. To effectively work with EDR security:



      1. Configure Tools: Set up EDR tools to monitor endpoints efficiently.


      2. Customize Rules: Tailor detection rules for specific threats.


      3. Monitor Continuously: Keep a watchful eye on endpoint activities in real time.


      4. Proactively Hunt: Actively seek hidden threats beyond automated alerts.


      5. Use Threat Intel: Integrate threat intelligence to enhance detection.


      6. Respond Swiftly: Quickly assess, contain, and mitigate incidents.


      7. Automate Tasks: Use automation for faster responses.


      8. Collaborate: Communicate and work with other teams.


      9. Analyze Post-Incident: Review incidents to learn and improve.


      10. Stay Updated: Regularly train and adapt to new threats.


      11. Iterate: Continuously refine strategies for better protection.






Learn what your peers think about Cisco Secure Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: September 2023.
734,963 professionals have used our research since 2012.
Related Questions
NV
Content Editor at a tech company with 51-200 employees
Aug 9, 2023
Hi community, Why is EDR (Endpoint Detection and Response) important for companies? Share your thoughts with the rest of the community.
See 2 answers
NV
Content Editor at a tech company with 51-200 employees
Jul 19, 2023
EDR (Endpoint Detection and Response) is important for companies because:-It provides real-time visibility into endpoint activities, allowing companies to detect and respond to potential threats quickly.-EDR software helps in identifying and investigating security incidents, enabling companies to understand the scope and impact of an attack.-It enhances threat-hunting capabilities by continuously monitoring endpoints for suspicious behavior and indicators of compromise.-EDR solutions offer advanced threat detection and prevention mechanisms, including behavioral analysis and machine learning algorithms.-It helps in reducing the dwell time of threats by quickly identifying and containing malicious activities on endpoints.-EDR software assists in compliance management by providing detailed endpoint activity logs and reports.-It enables companies to proactively protect their endpoints against emerging threats and zero-day vulnerabilities.-EDR solutions can integrate with other security tools and systems, enhancing the overall security posture of the organization.-It aids in incident response and remediation by providing actionable insights and facilitating the isolation and removal of threats.-EDR software helps in improving the overall cybersecurity posture of the company, safeguarding sensitive data, and preventing financial losses.
Gerald Mbewa - PeerSpot reviewer
Cyber Security Analyst at DIgital Sentry Ltd
Aug 9, 2023
EDR (Endpoint Detection and Response) is vital for companies due to its ability to quickly detect, respond to, and prevent advanced cyber threats at the endpoint level. It offers real-time visibility, advanced threat detection, proactive threat hunting, swift incident response, and detailed endpoint insights. EDR strengthens security, reduces damage, aids compliance, and adapts well to remote work scenarios.
NV
Content Editor at a tech company with 51-200 employees
Jul 19, 2023
Hi community, When evaluating EDR (Endpoint Detection and Response) solutions, what aspects are the most important to look for? Share your thoughts with the rest of the community.
See 1 answer
NV
Content Editor at a tech company with 51-200 employees
Jul 19, 2023
The most important aspects to look for when evaluating EDR (Endpoint Detection and Response) solutions are:-Detection capabilities: The software should have advanced and effective detection mechanisms to identify and alert potential threats and malicious activities in real-time.-Response capabilities: It should provide a range of response actions to mitigate and contain threats, such as isolating affected endpoints, terminating malicious processes, or blocking suspicious network connections.-Integration and compatibility: The solution should seamlessly integrate with existing security infrastructure and be compatible with various operating systems and endpoint devices.-Scalability and performance: It should be able to handle a large number of endpoints without compromising performance, ensuring efficient monitoring and response across the entire network.-User-friendly interface: The software should have an intuitive and easy-to-use interface, allowing security teams to quickly navigate and analyze data, and initiate response actions.-Threat intelligence and analytics: It should leverage threat intelligence feeds and advanced analytics to enhance detection accuracy and provide actionable insights for proactive threat hunting.-Incident investigation and forensics: The solution should offer comprehensive incident investigation capabilities, including detailed endpoint activity logs, file analysis, and forensic data collection for post-incident analysis.-Reporting and compliance: It should provide customizable reporting features to generate compliance reports, security metrics, and executive summaries for effective communication and auditing purposes.-Continuous updates and support: The software should have a dedicated team that regularly updates the solution with the latest threat intelligence and provides timely support for any issues or queries.
Related Articles
EB
Director of Community at PeerSpot (formerly IT Central Station)
Aug 17, 2022
Hi dear community members, In this edition of PeerSpot's Community Spotlight, you can find out what your peers are discussing and join in the conversation. Ask and answer questions on the topics that interest you most! Read and respond to articles or contribute your own! Trending These are the topics your peers are talking about on PeerSpot this week How do I estimate the requir...
See 1 comment
EB
Director of Community at PeerSpot (formerly IT Central Station)
Aug 17, 2022
Thank you to all the community members who share their knowledge with other peers! Also, special thanks to the articles' contributors included in this Community Spotlight: @Janet Staver, @Abhirup Sarkar, @Manoj Narayanan, @Beth Safire and @Shibu Babuchandran.
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
Aug 9, 2022
If you’re weighing your options for endpoint security solutions, there are many options out there. However, solutions vary greatly in terms of how effectively they can protect your network. I want to help you make the best decision possible, so here are some questions to ask before buying an endpoint security solution, and why they are important. 1) Does the solution employ Foundational Tech...
EB
Director of Community at PeerSpot (formerly IT Central Station)
Aug 2, 2022
Dear professionals, Welcome back to PeerSpot's Community Spotlight! Below you can find the latest hot topics posted by your fellow PeerSpot Community members. Read articles, answer questions, and contribute to discussions that are relevant to you and your expertise. Or ask your peers for insight on topics that interest you! Trending Here are some topics that your peers are discussi...
See 1 comment
EB
Director of Community at PeerSpot (formerly IT Central Station)
Aug 2, 2022
@Chris Childerhose, @PraveenKambhampati, @Deena Nouril, @Shibu Babuchandran and @reviewer1925439, Thank you for contributing your articles and sharing your professional knowledge with 618K PeerSpot community members around the globe as well as with a much bigger readers audience!
EB
Director of Community at PeerSpot (formerly IT Central Station)
May 2, 2022
Hi peers, We're happy to share our new bi-weekly Community Spotlight with you. Here you'll find recent contributions by PeerSpot community members: questions, articles and trending discussions. Trending See what your peers are discussing at the moment! What to choose: an endpoint antivirus, an EDR solution, or both? What is your recommended IT Service Management (ITSM) tool in 2022? W...
EB
Director of Community at PeerSpot (formerly IT Central Station)
Feb 4, 2022
Hi dear community members, This is our latest community digest. It helps you catch up on recent contributions by community members. Comment below with your feedback and suggestions! Trending What are the Top 5 cybersecurity trends in 2022? What are the main benefits of modern IT Asset Discovery tools? Tip Post an educational article from your Home feed and receive 20 point...
See 1 comment
reviewer1577907 - PeerSpot reviewer
Manager at PeerSpot
Feb 4, 2022
Thank you, these community Spotlights are very handy!
Related Articles
EB
Director of Community at PeerSpot (formerly IT Central Station)
Aug 17, 2022
Community Spotlight #20
Hi dear community members, In this edition of PeerSpot's Community Spotlight, you can find out w...
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
Aug 9, 2022
8 Questions to Ask While Selecting an Endpoint Security Solution for Your Business
If you’re weighing your options for endpoint security solutions, there are many options out there...
Download Free Report
Download our free Cisco Secure Endpoint Report and get advice and tips from experienced pros sharing their opinions. Updated: September 2023.
DOWNLOAD NOW
734,963 professionals have used our research since 2012.