EDR (Endpoint Detection & Response)
EDR (Endpoint Detection & Response)
What is EDR?
According to Gartner, Endpoint Detection and Response (EDR) is defined as a
solution that “records and stores endpoint-system-level behaviors, use various data
analytics techniques to detect suspicious system behavior, provide contextual
information, block malicious activity, and provide remediation suggestions to restore
affected systems.
DoS &
PUAs Ransomware Rootkits
DDoS
Malware
Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network.
When endpoint protection is considered, malicious software programs (malware) is often the primary concern.
Malware includes both known as well as never-seen-before malware. Often, solutions struggle to detect the
unknown malware.
File-less Attacks(Memory Attacks)
File-less malware is a type of malicious activity that uses native, legitimate tools built into a system to execute a cyber
attack. Unlike traditional malware, file-less malware does not require an attacker to install any code on a target’s system,
making it hard to detect.
This file-less technique of using native tools to conduct a malicious attack is called “living off the land”.
Trojans
A Trojan horse is a type of malware that downloads onto a computer disguised as a legitimate program. A Trojan
horse is so-called due to its delivery method, which typically sees an attacker use social engineering to hide
malicious code within legitimate software. However, unlike computer viruses or worms, a Trojan does not self-
replicate, so it needs to be installed by a valid user.
How Do Trojans Work?
Unlike computer viruses, a Trojan horse cannot manifest by itself, so it needs a user to download the
server side of the application for it to work. This means the executable (.exe) file should be
implemented and the program installed for the Trojan to attack a device’s system.
A Trojan virus spreads through legitimate-looking emails and files attached to emails, which are
spammed to reach the inboxes of as many people as possible. When the email is opened and the
malicious attachment is downloaded, the Trojan server will install and automatically run every time
the infected device is turned on.
Ransomware
Ransomware is a type of malware attack in which the attacker locks and encrypts the victim’s data and then
demands a payment to unlock and decrypt the data.
The two primary types of ransomware are file encryptors and disk encryptors (wipers). File encryptors are the most
common, which encrypt the victim’s files and holds them for ransom. Disk encryptors lock up the victim's entire hard
drive, not just the files, or wipes it completely
WannaCry
NotPetya
and Petya
Ryuk
Adware , Spyware & PUAs
By “adware” we consider any software that is designed to track data of your browsing habits and, based on that,
show you advertisements and pop-ups. Adware collects data with your consent — and is even a legitimate source
of income for companies that allow users to try their software for free, but with advertisements showing while
using the software.
Spyware works similarly to adware, but is installed on your computer without your knowledge. It can contain
keyloggers that record personal information including email addresses, passwords, even credit card numbers,
making it dangerous because of the high risk of identity theft.
A DDoS attack is similar to a DoS attack, except that while a DoS attack uses one computer or network to spawn
an attack, a DDoS attack uses multiple. DDoS attacks are launched from multiple systems, while DOS (denial-of-
service) attacks originate from just one system. DDoS attacks are faster and harder to block than DOS attacks.
DOS attacks are easier to block because there is only one attacking machine to identify.
Rootkits
A Rootkit is defined as a malicious computer software hidden deep inside a PC and remains undetectable.
Although this software on their own may not be harmful, they hide worms, bot & malware. Attackers can have ‘root’
access to the user’s computer using a harmful software. Hence, it is considered extremely dangerous for user’s privacy
and PC users need an anti-rootkit software.
Endpoint Security
Techniques
Modern Techniques vs. Traditionnel Techniques
Anti-Virus solutions have been around for a while and are proven to be very effective against known threats.
There are a variety of foundational techniques that traditional endpoint protection solutions have relied on.
However, as the threat landscape has shifted, unknown threats, such as malware that has never been seen
before, have become more and more common.
Foundational Capabilities
Anti-malware/antivirus: Signature-based detection of known malware. Malware engines should have the ability to
inspect not just executables but also other code such as malicious JavaScript found on
websites.
Application lockdown : Preventing malicious behaviors of applications, like a weaponized Office document that
installs another application and runs it.
Behavioral monitoring/Host : This foundational technology protects computers from unidentified viruses and suspicious
Intrusion Prevention behavior. It should include both pre-execution and runtime behavior analysis.
Systems (HIPS):
Web protection URL lookup and blocking of known malicious websites. Blocked sites should include those
that may run JavaScript to perform cryptomining, and sites that harvest user authentication
credentials and other sensitive data.
Endpoint web filtering allows administrators to define which file types a user can download
Web control
from the internet.
If an adversary is able to go unnoticed, DLP capabilities would be able to detect and prevent
Data loss prevention (DLP): the last stage of some attacks, when the attacker is attempting to exfiltrate data. This is
achieved by monitoring a variety of sensitive data types.
Modern Capabilities
Machine learning: There are multiple types of machine learning methods, including deep learning neural
networks, random forest, bayesian, and clustering. Regardless of the methodology,
machine learning malware detection engines should be built to detect both known and
unknown malware without relying on signatures. The advantage of machine learning is
that it can detect malware that has never been seen before, ideally increasing the overall
malware detection rate. Organizations should evaluate the detection rate, the false
positive rate, and the performance impact of machine learning-based solutions
Anti-exploit: Anti-exploit technology is designed to deny attackers by preventing the tools and
techniques they rely on in the attack chain. For example, exploits like EternalBlue and
DoublePulsar were used to execute the NotPetya and WannaCry ransomware. Anti-exploit
technology stops the relatively small collection of techniques used to spread malware and
conduct attacks, warding off many zero-day attacks without having seen them previously
Ransomware-specific: Some solutions contain techniques specifically designed to prevent the malicious
encryption of data by ransomware. Often ransomware specific techniques will also
remediate any impacted files. Ransomware solutions should not only stop file
ransomware, but also disk ransomware used in destructive wiper attacks that tamper
with the master boot record.
Modern Capabilities-Contd’
Credential theft protection Technology designed to prevent the theft of authentication passwords and hash
information from memory, registry, and off the hard disk.
Process protection (privilege Protection built to determine when a process has a privileged authentication token
escalation) inserted into it to elevate privileges as part of an active adversary attack. This should be
effective regardless of what vulnerability, known or unknown, was used to steal the
authentication token in the first place
Process protection (code Prevents use of techniques such as code cave and AtomBombing often used by
cave): adversaries looking to take advantage of the presence of legitimate applications.
Adversaries can abuse these calls to get another process to execute their code.
Endpoint detection and EDR solutions should be able to provide detailed information when hunting down
response (EDR): evasive threats, keeping IT security operations hygiene in excellent health and analyzing
detected incidents. It is important to match the size and skillset of your team with the
complexity and ease of use of the tool being considered. For example, selecting a
solution that provides detailed threat intelligence and guidance, making it quick and
easy to respond to a threat..
Modern Capabilities-Contd’
Incident Endpoint tools should at a minimum provide insight into what has occurred to help avoid
response/Synchronized future incidents. Ideally, they would automatically respond to incidents, without a need for
Security analyst intervention, to stop threats from spreading or causing more damage. It is
important that incident response tools communicate with other endpoint security tools as
well as network security tools.
Managed Threat Response MTR delivers 24/7 threat hunting, detection and response delivered by a team of experts
(MTR) as a fully managed service. Analysts should be able to respond to potential threats, look
for indicators of compromise and provide detailed analysis on events that took place,
where, when, how and why.
The ”power of the plus”: combining multiple techniques for comprehensive endpoint security.
SOPHOS Central Endpoint & Server Protection
History
Sophos Group plc is a British security software and hardware company.
Sophos develops products for communication endpoint, encryption,
network security, email security, mobile security and unified threat
management.
Sophos was founded by Jan Hruska and Peter Lammer and began
producing its first antivirus and encryption products in 1985.
Sophos Endpoint Protection makes it simple to secure your Windows, Mac and
Linux systems against malware and other endpoint threats.
Highlights
Proven protection including anti-malware, HIPS and malicious traffic detection
Web, application, device and data control for comprehensive policy enforcement
Web filtering enforced on the endpoint whether users are on or off the corporate
network .
Forensic-level system cleanup
Choose cloud-based Sophos Central to manage your deployment
Automatically respond to incidents by synchronizing security between your
endpoints and your firewall
Sophos in Gartner
Product Matrix
Central Endpoint Protection
Intercept X Intercept X Advanced (Endpoints)
Intercept X Advanced with EDR (Endpoints)
Intercept X Advanced for Server
Intercept X Advanced for Server with EDR
Sophos Central
Innovative protection
Complete control
Lightning performance
Sophisticated simplicity
Flexible licensing and deployment
Intercept X Advanced, Intercept X Advanced with EDR and Intercept X
Advanced with MTR
Sophos Intercept X is the world’s best endpoint protection. It stops the latest
cybersecurity threats with a combination of deep learning AI, anti-ransomware
capabilities, exploit prevention and other techniques.
Intercept X Advanced for Server , Intercept X Advanced for Server with EDR
Secure your cloud, on-premises and virtual servers from never-seenbefore malware,
ransomware and fileless attacks and get unparalleled visibility across your entire estate
with EDR that streamlines threat hunting and IT operations tasks.
Stop the Latest Threats
Get Unparalleled Visibility
Take Control of Your Servers
Simplify Management and Deployment
Secure Your Entire Estate
Managed Threat Response (MTR)
Sophos Endpoint Protection Features
Sophos Server Protection Features
Sophos Central Endpoint & Server Protection Licensing
Hard disk space varies based on what Cryptoguard is doing with regards to file cache for
potential rollback. This fluctuates as we copy then release files that are being interacted with by
processes prior to conviction/exoneration.
CPU utilization
CPU
Description
utilization
< 0.1% When deployed and protecting a lightly used computer and recording activity for future Threat Case generation.
When actively monitoring a suspect activity like installing new software, evaluating a process for ransom
< 2%
conviction/exoneration, and recording activity for Threat Case.
Utilization immediately after detection as Threat Case data collection runs and cleanup is actively removing the
Up to 1%
components of the attack.
Memory utilization
Memory
Description
utilization
Most of this is the Sophos Data Recorder (100MB) that is collecting activity events for use when a Threat Case
150-200 MB
report is required
Notes: (on behavior when malware has been convicted and remediation is underway):
The Threat Case generation will often coincide with Sophos Clean; thus, more resources
will be used in these scenarios. Disk, CPU, and memory will all temporarily spike.
The Threat Case generation can consume up to 1 full core during this generation phase on
a typical laptop with 4 cores up to 25% of CPU.
Mac System Requirements
Platforms support Endpoint Protection Intercept X Advanced (MTR Included)
macOS 10.14, 10.15, 11
Intel-based Macs (64-bit) Disk space: 2 GB free Disk space: 2 GB free
macOS 11 (Rosetta 2 Emulation) RAM: 2 GB RAM: 2 GB
Arm-based Macs (M1)
CPU utilization
CPU
Description
utilization
< 01.% When deployed and protecting a lightly used machine and recording activity for future Threat Case generation.
When actively monitoring a suspect activity like installing new software, evaluating a process for ransom
< 2%
conviction/exoneration, and recording activity for Threat Case.
Utilization immediately after detection as Threat Case data collection runs and cleanup is actively removing the
Up to 1
components of the attack
Memory utilization
Memory
Description
utilization
Most of this is the Sophos Data Recorder (100MB) that is collecting activity events for use when a Threat Case
150-200 MB
report is required
Notes: (on behavior when malware has been convicted and remediation is underway):
The Threat Case generation will often coincide with Sophos Clean; thus, more resources
will be used in these scenarios. Disk, CPU, and memory will all temporarily spike.
The Threat Case generation can consume up to 1 full core during this generation phase on
a typical laptop with 4 cores up to 25% of CPU
Sophos Anti-Virus for Linux 10 offers additional capabilities which include Malicious
Traffic Detection and Sophos Security Heartbeat™ (applies to Central Server Protection
license).
Component Description
Sophos Anti-Virus This scans files for viruses, suspicious files and behaviors, spyware, adware, and unauthorized software.
Sophos Anti-Virus provides all the detection, disinfection, and reporting features on the workstations.
Sophos AutoUpdate This keeps endpoint components (including malware IDEntity files) up to date, including itself, whenever
there are newer versions available.
Will also download when the local AutoUpdate cache is incomplete or when the catalog in the share has
changed.
Sophos Management MCS on endpoint computers receives messages from the Sophos Cloud and routes them to other components
Communications System for implementing.
It also sends messages back to the server regarding the health and configuration of the endpoint installation
(Sophos Cloud and UTM Endpoint).
Sophos Endpoint Firewall You can monitor and configure Windows Firewall (and monitor other registered firewalls) on your
computers and servers using a Windows Firewall policy.
Sophos Network Threat Intercepts outgoing network traffic and then makes use of Sophos System Protection to determine the
Protection reputation of the destination.
Forwards the results to the HIPS system to determine any follow on actions.
Sophos Endpoint Defense This feature is focused on preventing undesired actions by administrators, for example stopping services and
(SED) killing processes.
Sophos Clean Cleanup of threats detected by Intercept X and Exploit Prevention. Also cleans threats for PE files.
Sophos HitmanPro Alert Advanced threat protection. Includes Ransomware protection (Cryptoguard)
Sophos File Scanner Used to scans files for reputation, deep learning, and Application ID.
Sophos Health Service Monitors the status of all existing Sophos services.
Sophos Endpoint UI Sophos user interface
Sophos Self Help Tool A tool to find, troubleshoot and resolve issues with Windows endpoints and servers using the Sophos
Endpoint Agent
Sophos Live Query Allows administrators to gain visibility into their environment and get immediate answers to any pressing
question. It allows direct access to a device to understand it's current running state and historic activity.
Sophos Live Response Allows administrators to remotely connect to devices and get access to the command-line interface to in
order to perform further investigation or take actions
Sophos Managed Threat Used by the Managed Threat Response service for threat hunting and monitoring for suspicious activity
Response
Sophos AMSI Protection The Sophos Antimalware Scan Interface (AMSI) Protection integrates into applications for Windows 10,
Windows Server 2016 and Windows Server 2019 and allows for the most common malware scanning and
protection techniques
Services
The following services run on the Sophos Central managed endpoints.
Sophos System SSPService.exe Gathers and records information from other Sophos components on the
Protection Service system and can look up information from Sophos cloud services.
The information gathered from multiple sources is used intelligently to
improve the detection of malicious files, processes, and traffic.
Sophos Web Control Swc_service.exe Manages Web Control policies.
Service Dependencies: RPC service.
Sophos Web Swi_service.exe Protects against threats from malicious websites.
Intelligence Service
Sophos Web Filter swi_filter.exe Ensures web usage is safe and consistent with policy. (Windows
8+/2012+ only).
HitmanPro.Alert hmpalert.exe Exploit mitigation and web browser intrusion detection, real-time, and
service behavior-based.
Sophos Managed SophosMTR.exe Threat hunting and monitoring for suspicious activity
Threat Response
Users, Groups & Roles
Users (People)
Adding Users
People are a key element of management in Sophos Central. Users can have policies
assigned to them,be associated with endpoints and be assigned administrative roles to
manage Sophos Central.
User Groups
People groups provide a way of applying policies to users with the same requirements and
can be manually created in Sophos Central as well as being synchronized from an Active
Directory.
A user can be a member of multiple groups and you can filter the ‘People Groups’ list to
show all groups, show your Sophos Central-managed groups or show your Active Directory
groups.
To add a new user group, navigate to People > Groups > Add Group
Role Management
When a user is manually created, by default they are given the role of ‘User’. This role can
be changed. Sophos Central supports role-based access control which is managed using
role management. This allows users to be given administrative rights by assigning them a
pre-defined role.
To view the pre-defined roles, navigate to Global Settings > Role Management.
Administration roles allow you to specify the responsibility level and security access of your
users.
The pre-defined roles cannot be edited or deleted.
Super Admin:-
The Super Admin role has access to everything in Sophos Central.
Only those assigned the Super Admin role can manage user roles.
The account you use to register for a Sophos Central account is automatically
assigned the Super Admin role.
Admin
The Admin role has access to almost everything in Sophos Central, apart
from the ability to manage roles and role assignments.
HelpDesk
Partial access
Can view sensitive logs and reports
Receives alerts and can clear them.
Can update Sophos Agent software
Can scan endpoints
Read only Access to settings
Read Only
Read only access
Can view sensitive logs and reports
Receives alerts
They are unable to assign policies, change settings, clear alerts, or update the Sophos Agent
software on endpoints.