- Apr 9, 2018
- 214
Dear Users!
We have published a report on checking products with EDR-XDR functionalities based on simulated files attacks. The matter is simple in the case of rather well-known attacks. However, more complex attacks may not be noticed by the product. It's not a big deal if there are some minimal traces of the attack, some telemetry - that was the purpose of this test.
Based on the data collected, we believe that the most important thing is that the product records traces of attacks in the administrator console. It does not matter if these events are processed automatically or manually by a team of qualified employees. The product must provide visibility into system events along with telemetry that allows to understand the context of the attack and capture the necessary technical details.
We have published a report on checking products with EDR-XDR functionalities based on simulated files attacks. The matter is simple in the case of rather well-known attacks. However, more complex attacks may not be noticed by the product. It's not a big deal if there are some minimal traces of the attack, some telemetry - that was the purpose of this test.
Based on the data collected, we believe that the most important thing is that the product records traces of attacks in the administrator console. It does not matter if these events are processed automatically or manually by a team of qualified employees. The product must provide visibility into system events along with telemetry that allows to understand the context of the attack and capture the necessary technical details.
Testing solutions for business
The policy configuration for antivirus agents was usually default or included additional settings for more detailed telemetry. Importantly, we did not disable antivirus protection or any other features. Solutions that had to be assigned a predefined agent configuration after installation were configured with the most hardened settings possible to achieve detailed visibility into the attack chain and telemetry which was the goal of this test. At the request of the developers, we assigned the proposed settings.- Emsisoft Enterprise Security + EDR: default settings.
- Eset Protect Elite + XDR: default settings + all rules for EDR enabled.
- Microsoft Defender for Business + EDR: default settings.
- Metras: default settings.
- Xcitium Advanced + EDR: predefined policy 8.1.