Advice Request What is your keylogger defense in 2020?

Please provide comments and solutions that are helpful to the author of this topic.
So firewall is not optimum solution although it may prevent the data breach but will not detect the infection occured
Has keyloggers has some symptoms which may trigger certain AV module ?? And if which part 🤔🤔 ??
You can detect them through Windows Defender ATP, and AV isn't supposed to let it run in first place.

Keylogger needs elevated privileges or a known exploit to remain undetected, unless we talking Linux due to the fact everyone believes they don't need AV, nor they pack firewall by default, you can code one in seconds for it (with no need for elevated privileges), already done this multiple times in the past for science reasons.
 
You can detect them through Windows Defender ATP, and AV isn't supposed to let it run in first place.

Keylogger needs elevated privileges or a known exploit to remain undetected, unless we talking Linux due to the fact everyone believes they don't need AV, nor they pack firewall by default, you can code one in seconds for it (with no need for elevated privileges), already done this multiple times in the past for science reasons.

none of what you posted here is correct
there are ample cases where keylogging is done in ways that AV does not detect, powershell or wmic is a good place to start
no administrative permissions needed on Windows
no exploit required
 
Hmm...it 's repeted in some other places...int this forum also...that detection of some logger actions...not only key-logger...means that our defence is bypassed and next...in consequences...our plan/idea of builded security is invalid. I assume that such opinion is based on detection offered by AV/IS apps and its all featured that working on every possible black/block lists and signatures of AV engines...and that's why can't agree with it. AV is not the beginning and the end of security that we can have and there are a lot of others technolgies that can give us much more...that are a bit further from common apps but still can protect without bad effects.
 
You can look at some examples of below...a lot of info about malware
but about legal apliacation also
 
You can look at some examples of below...a lot of info about malware
but about legal apliacation also
Thanks a lot for the links @ichito i will take a look on them to gain more understanding