Quick Reference
EDR = Endpoint Detection and Response — agent-based software that continuously records endpoint activity and enables detection and response. AV = antivirus — signature-based scanning for known malware. EDR detects behavioral anomalies and unknown threats; AV primarily matches known signatures. XDR = Extended Detection and Response — EDR extended across network, cloud, email, and identity. MDR = Managed Detection and Response — EDR + human SOC analysts provided as a managed service.

Why Antivirus Isn't Enough

Traditional antivirus (AV) works by scanning files for signatures — patterns that match known malware. When malware first emerged, this was highly effective: virus signatures were shared among AV vendors, and signature updates kept defenses current. But the threat landscape has shifted dramatically:

Modern attacks use fileless malware that executes entirely in memory and never writes a file to disk — bypassing file-based AV scanning entirely. Attackers use living-off-the-land (LOTL) techniques that abuse legitimate system tools like PowerShell, WMI, and certutil rather than dropping custom malware. Polymorphic and metamorphic malware changes its signature with each infection. Against these techniques, signature-based AV generates no alerts — there's nothing matching the signature database.

EDR was developed specifically to address this gap. Where AV looks at files, EDR watches behavior.

How EDR Works

EDR consists of a lightweight agent installed on every endpoint (workstations, servers, laptops) that continuously records activity and streams telemetry to a central management platform. Unlike AV, which scans for bad things, EDR records everything and then hunts for suspicious patterns in that data.

EDR ComponentWhat It Does
Endpoint AgentInstalled on each device — monitors and records all activity in real time. Minimal performance impact is a key design goal. Communicates with cloud or on-premise management platform.
Telemetry CollectionRecords process creation/termination, parent-child process relationships, file system changes, registry modifications, network connections, user login events, memory operations, and DLL loading.
Detection EngineAnalyzes telemetry using behavioral rules (ATT&CK technique detection), machine learning models, IOC matching, and custom hunting queries to identify suspicious or malicious activity.
Response CapabilitiesAllows analysts to remotely isolate a host from the network, kill processes, delete files, collect forensic artifacts, capture memory dumps, and run live queries — without touching the machine physically.
Threat Hunting InterfaceQuery interface (often SQL-like) that lets analysts search across all endpoint telemetry — e.g., "show me all processes that ran PowerShell and made outbound network connections in the past 30 days."

EDR vs Antivirus — Side by Side

CapabilityTraditional AntivirusEDR
Detection MethodSignature matching (known malware patterns)Behavioral analysis + signatures + ML + IOC matching
Fileless Malware❌ Blind to file-less attacks✅ Detects suspicious memory behavior and process chains
LOTL Attacks❌ PowerShell abuse appears legitimate✅ Detects abnormal use of legitimate tools via behavior
Telemetry / VisibilityLimited — only file scan results and quarantine actionsRich — process trees, network connections, file changes, registry
Response ActionsQuarantine file, delete malwareIsolate host, kill process, collect forensics, run queries
Threat Hunting❌ No hunting capability✅ Full query interface over historical telemetry
Incident InvestigationVery limited — no contextFull attack chain reconstruction with process trees and timelines
ExamplesWindows Defender (basic), McAfee, Symantec EndpointCrowdStrike Falcon, SentinelOne, Microsoft Defender for Endpoint

What EDR Telemetry Reveals

The power of EDR lies in its telemetry richness. Here are key data points that EDR captures that AV never could:

🌳
Process Trees
Parent-child process relationships. Seeing winword.exe spawn cmd.exe which spawns powershell.exe is immediately suspicious — a classic macro malware indicator.
🌐
Network Connections
Which processes made outbound connections, to which IPs, on which ports. notepad.exe making a DNS query is extremely suspicious — no legitimate use case exists.
📝
Registry Changes
Modifications to persistence locations like HKCU\Software\Microsoft\Windows\CurrentVersion\Run. Malware writes here to survive reboots — EDR catches the write event.
💾
Memory Operations
Process injection, code injection into other processes, suspicious memory allocations. Fileless malware that only exists in memory is visible through EDR's memory telemetry.
💡 EDR Response Actions — Isolation vs. Containment

Host isolation: Completely cuts the endpoint from the network — blocks all inbound and outbound traffic except communication to the EDR management platform. Used when a host is confirmed compromised and you need to prevent lateral movement or data exfiltration. The machine stays on and the analyst can still investigate it remotely via the EDR agent.

Process kill: Terminates a specific malicious process without isolating the whole machine. Used for less severe cases where you want to stop the malicious activity without taking down the host entirely.

XDR — Extended Detection and Response

XDR extends the EDR model beyond the endpoint to correlate telemetry across multiple security layers: endpoint, network, email, cloud workloads, and identity systems. Instead of investigating alerts in separate tools (EDR for endpoint, email gateway for phishing, CASB for cloud), XDR aggregates all telemetry into a single platform with unified detection and response.

📝 EDR vs XDR vs MDR — Exam Tip

EDR: Endpoint Detection and Response — focused on endpoints only. Agent-based. Investigation and response at the endpoint layer.

XDR: Extended Detection and Response — EDR + network + email + cloud + identity. Broader visibility, fewer blind spots, unified investigation console.

MDR: Managed Detection and Response — EDR or XDR technology + human SOC analysts provided as a service. You get 24/7 monitoring and response without staffing your own SOC. Think of it as EDR-as-a-Service with human oversight.

Next-Gen Antivirus (NGAV)

You'll also see the term NGAV (Next-Generation Antivirus) on the exam and in vendor marketing. NGAV replaces signature-based scanning with machine learning and behavioral detection — it detects malicious behavior rather than matching known signatures. Many vendors bundle NGAV and EDR together in a single agent, which is why the terms are sometimes used interchangeably, but they're distinct:

NGAV = detection capability (is this bad?). EDR = detection + investigation telemetry + response actions. An endpoint with NGAV but no EDR can block threats but can't help you understand the full scope of a compromise or hunt for threats that slipped through.

Exam Scenarios

An attacker compromises a workstation using a PowerShell script that runs entirely in memory and never writes any files to disk. Traditional antivirus generates no alert. What type of attack is this, and what tool is designed to detect it?
Fileless malware attack, detected by EDR. Fileless malware bypasses file-based AV scanning by executing entirely in memory using legitimate system tools like PowerShell. EDR detects this through behavioral telemetry — unusual PowerShell execution parameters, memory injection, or suspicious parent-child process relationships — even though no malicious file ever touched the disk. This is a primary reason EDR has largely replaced traditional AV in enterprise environments.
A SOC analyst is investigating an alert on a workstation that shows winword.exe spawning cmd.exe, which then spawned powershell.exe that made an outbound connection to an unknown IP. What likely happened, and what type of malware technique does this represent?
Macro malware / document-based malware using a living-off-the-land technique. The process chain (Word → cmd → PowerShell → network connection) is the classic signature of a malicious Office macro that executes a PowerShell payload. Word doesn't legitimately spawn command prompts. The EDR's process tree telemetry makes this immediately visible — showing the full attack chain. The analyst should isolate the host, collect a forensic image, and investigate what the PowerShell command did.
A company wants 24/7 security monitoring and incident response for their endpoints but cannot afford to staff a full in-house SOC. What solution provides EDR capabilities with human oversight?
MDR (Managed Detection and Response). MDR provides EDR technology plus dedicated human SOC analysts who monitor alerts, investigate incidents, and provide response guidance — all delivered as a managed service subscription. This gives the company expert-level detection and response capability without the cost of hiring and training a 24/7 SOC team. MDR vendors typically guarantee response SLAs and provide regular reporting on threats detected and investigated.
An analyst needs to immediately stop a confirmed ransomware infection from spreading to other machines on the network while preserving the ability to investigate the compromised host. What EDR response action should they take?
Host isolation (network isolation). EDR host isolation cuts all network connections from the compromised endpoint — preventing the ransomware from spreading laterally or communicating with its C2 for encryption keys. Critically, the EDR agent itself maintains communication with the management platform even in isolation mode, so the analyst can continue to investigate the host remotely, collect forensic artifacts, and run threat hunting queries on the isolated machine.

Related Articles