April 13, 2020
Six Ways to Mature your EDR Program—from End to End

As organizational perimeters disappear and the number of devices required to conduct business increases, securing your company—and its associated end points—against escalating and evolving threats is more challenging than ever. A comprehensive Endpoint Detection and Response (EDR) program can help you discover issues, manage your endpoints, prevent security weaknesses, protect against malicious activity and reduce the time to remediation, which can instantly improve your security posture.

So, what does a modern, mature EDR program look like? It’s a combination of technology at its core, the most efficient software for your specific environment, as well as the disciplines and expertise of your IT teams. But where do you start? These six tenets should show you the way.

  1. Strive for persistent, accurate visibility
    When you truly see your endpoints, you will know exactly what you need to protect. Today, mere visibility into your endpoints isn’t enough. You also need to know how many endpoints you have, where they’re located, and what types they are (laptops, desktops, servers, etc.). And because these environments keep changing—often on a daily basis—your visibility must provide a dynamic view that accounts for, recognizes and even anticipates changes. This is a tricky proposition for most organizations that struggle to see their ever-changing networks. Companies that are most successful are the ones that are able to leverage technologies that are advanced enough to see all of this in a scalable, highly-efficient way. The good news is, today, a myriad of effective solutions exist with these capabilities already baked in, so companies have more options than ever.

As you establish persistent, accurate visibility, you will find you are uncovering potentially unmanaged assets. Today’s next-gen EDR tools are designed to help you recognize these miscellaneous items that you may not know existed. Many companies reveal thousands of unmanaged assets they didn’t know they had. And in seeing them, they can then set up ways to manage and protect those assets.

  1. Identify both indicators of compromise and indicators of attack

Companies establishing successful EDR programs will also look for ways to record and analyze not just indicators of compromise (ways you have already been compromised), but also indicators of attack (ongoing events).

Think of the analogy of a crime scene. An indicator of compromise would show you what happened after the crime took place. It’s a cold scene. The police would put together clues based on what they found at the scene—a weapon, maybe a broken window, missing files, or fingerprints. These are all indicators that you have been compromised or that an event has happened. An indicator of attack would have investigators showing up just before the crime happens—because they’ve done the analysis and forensics work—and knew enough to either witness the crime as it’s happening, or jump in and subvert it. When it comes to your cybersecurity, that’s an important distinction. And more and more, companies are considering both indicators of compromise and indicators of attack. They can do this because the tools are more advanced and financially accessible.

  1. Defend against previously unknown malware

Malware attacks are escalating, and destructive malware even more. Destructive malware target computer systems with the goal of destroying them and rendering them inoperable.

For successful EDR, organizations need tools and cybersecurity experts with the ability to seek out malware that never existed, or that at least has never been seen in the company’s environment. How do you make this happen? Start by looking for activity that might seem innocuous or “normal.” All it takes is a piece of malware to enter via email and arrive at the desk of a busy professional who clicks on it and accidentally opens a document—and then you’ve got an infected machine. At the start, that machine might not seem infected. Something can look like normal activity for quite a while. However, the next-generation EDR solution and savvy IT experts will have the ability to recognize the anomaly on any particular endpoint as quickly as possible.

The goal is to reduce the dwell time (the difference between point of entry versus point of discovery.) The shorter this time is, the better. Currently, companies measure dwell time in weeks and months—sometimes even years. This is bad news considering systems can be compromised within minutes after the point of entry. By continually striving to shrink dwell time, companies can significantly reduce their risk. Of course, the ultimate goal is zero dwell time, but the industry isn’t there yet.

How a Security Operations Center (SOC) can help
Since building, implementing, running and managing a 24/7 SOC is cost-prohibitive for most organizations, companies elect to engage an external SOC to help handle their various security operations functions, threat monitoring, detection and response needs. SOCs have historically been used by larger organizations with bigger budgets. However, according to a recent Gartner report, the escalating threat environment and the shift in security defense from prevent (alone) to prevent, detect and respond, have encouraged adoption of SOCs by a wider user base.1Many companies also find success through the more budget-friendly option of relying on managed security services (MSSs) to offset the cost of 24/7 SOC operations and fill coverage and skills gaps, either tactically or as part of their long-term strategies.

  1. Isolate ongoing attacks

Let’s say you found something in your environment. You have to be able to wrap your hands around it and corral all of the impacted assets—everything that could potentially be infected by malware. In order to accomplish this step effectively, companies need to reach beyond their outer edge. But how?

It goes back to that persistent, accurate view. When you see your portfolio of IT assets, you see what each asset does, what’s installed on it, how it’s configured, etc. These attributes you identified within your initial inventory will give you the information you need to prevent future attacks. For example, let’s say you detect malware on Machine A. If you know Machine B is configured in the exact same way, you can be fairly certain that Machine B will potentially be impacted by that same malware. When a company is able to isolate its ongoing attacks in this way, it can see the future potential impact at the same time as it sees the current impact.

  1. Conduct an in-depth, forensic analysis of all data

A smart IT team—whether internal, external or a combination of both—will be able to step back and look at all the data and evidence and draw conclusions about present and future impact. By doing an in-depth, forensic analysis of the data on hand, not only with EDR solution(s), but also with a myriad of other IT cybersecurity tools, your team will expertly determine the root cause of existing events as well as see how and why they actually happened.

  1. Leverage external threat intelligence for your internal network

This is known as persistent threat hunting. Threat hunting is the process of proactively searching and discovering cyberthreats—regardless of whether they pose a current or future threat. Threat hunting can be a demanding process. It requires a practical understanding of cyberthreats, strong critical thinking, acute problem-solving skills and deep technical expertise. In threat hunting, there are a variety of security-relevant datasets to investigate. The best practice is not to depend solely on one source, but to gather and analyze a variety of sources for a more complete, timely, and accurate picture. You will want to collect from multiple data sources to add context to your threat hunting activities. According to Cybersecurity Insiders 2019 Threat Hunting Report, the most widely-used data includes external threat intelligence feeds (57%), file activity data (51%), and system patch status (47%).2

Because there are hundreds of thousands of companies and millions of networks targeted all over the world, cybersecurity experts can look at this external traffic, noise, targets, malware and breaches and use the information to enhance their own cyber intelligence. Beyond reading the news, forums and blogs, you will want to look at the information you’re gathering and see how it relates to your company’s unique environment. Many companies find that subscription services with external threat intelligence feeds (that you pay for) are the most effective way to gather relevant information.

Look for threat intelligence feeds that give you extremely granular and technically detailed information. These are the specific facts you can use to immediately turn around and scan your own environment.

The EDR Bottom Line

Ideally, for an effective next generation EDR solution, you are going to want to deliver on some or all of these six attributes—in some capacity—in a highly scalable, flexible way—with minimal impact to end-users and administrators. And, if you have the time and budget to run a proof-of-concept of your proposed EDR solution within your live environment, you will significantly improve your program’s effectiveness.

Watch the EDR Webinar on Demand

Ready to learn more? Click here to watch our Integrating EDR Across the IT Ecosystem webinar on demand! 

Join CrowdStrike Sales Engineering Manager Adam Hogan and CBI Director of Managed Security Services Dan Gregory in this webinar on demand to deep dive and go beyond the basics to strengthen your overall cybersecurity posture while integrating EDR smoothly with your overall IT ecosystem.

Top Takeaways:

  • Crafting an EDR strategy to prevent attacks and reduce time to mediation
  • Selecting the best EDR solutions for your specific IT environment
  • Integrate EDR into your environment with efficiency and scalability


  1. Gartner, “Selecting the Right SOC Model for Your Organization,” September, 2018


  1. 2019 Threat Hunting Report, Cybersecurity Insiders,


Content Sponsored by
CrowdStrike, a global cybersecurity leader, is redefining security for the cloud era with an endpoint protection platform built from the ground up to stop breaches. The CrowdStrike Falcon® platform’s single lightweight-agent architecture leverages cloud-scale artificial intelligence (AI) and offers real-time protection and visibility across the enterprise, preventing attacks on endpoints on or off the network. Powered by the proprietary CrowdStrike Threat Graph®, CrowdStrike Falcon correlates over two trillion endpoint-related events per week in real time from across the globe, fueling one of the world’s most advanced data platforms for security. With CrowdStrike, customers benefit from better protection, better performance and immediate time-to-value delivered by the cloud-native Falcon platform. There’s only one thing to remember about CrowdStrike: We stop breaches. Learn more at www.crowdstrike.com
About the Authors
Dan Gregory
Dan Gregory
VP Solutions Architecture
Dan has more than 15 years of field experience in performing regulatory compliance controls assessments and policy review. Dan has extensive experience in development and internal process audits with a focus on the financial, healthcare, manufacturing, and retail industries. Dan has performed countless controls assessments and efficiently deploys solution-based integrations designed to protect critical infrastructure, data, brand confidence, and reputation.
Remote Access Assessment
With more employees working remotely than ever, executives are concerned about fending off cyberattacks and ensuring system performance, all while defending employees, customers and data. Find out how CBI’s Remote Access Assessment can help. Learn More
I Need To...