MDE Tutorial -13 - Endpoint Detection and Response (EDR) in Microsoft Defender for Endpoints

Harvansh Singh
26 Nov 202217:01

Summary

TLDRThis video tutorial delves into Microsoft Defender for Endpoint's Endpoint Detection and Response (EDR) feature. It explains EDR's role in identifying and responding to threats on various devices, including laptops and servers. The tutorial covers creating an EDR policy in block mode, testing it on a device, and validating EDR and antivirus status. It also discusses the process of alerts converting to incidents and the importance of keeping antivirus software up to date. Viewers are guided through policy creation in the Microsoft Endpoint Manager and testing the policy's effectiveness.

Takeaways

  • 😀 The video is a tutorial on Microsoft Defender for Endpoint, focusing on Endpoint Detection and Response (EDR).
  • 🔍 EDR stands for Endpoint Detection and Response, a security solution that prioritizes alerts and provides visibility into malicious attacks on devices like laptops, desktops, and servers.
  • đŸ›Ąïž EDR operates in block mode to provide additional protection when other antivirus solutions are active, even if Microsoft Defender Antivirus is not running.
  • 📝 The tutorial covers creating a policy for EDR in block mode, testing the policy on a device, and validating EDR and antivirus status.
  • 🚹 EDR can trigger alerts based on the severity of the threat, categorizing them as high, medium, or non-impactful, and providing full visibility into the attack process.
  • 🔄 EDR automatically takes action to remediate threats detected by security analytics, creating incidents when similar alerts occur from multiple machines.
  • 🔄 The video explains the process of how EDR works, moving from detection to response, prediction, and prevention of threats.
  • 📋 EDR in block mode allows Microsoft Defender Antivirus to take action on breach behavior detections and respects existing exclusions set in the antivirus.
  • đŸ’» The tutorial demonstrates creating an EDR policy in the Microsoft Endpoint Manager console, including settings for sample sharing and telemetry reporting.
  • 🔄 The presenter shows how to validate the EDR and antivirus status using command prompts and PowerShell, including checking the running mode of EDR.
  • 🔄 The video concludes with practical steps to sync the policy on a test machine and verify the EDR block mode settings in the Microsoft Security Center.

Q & A

  • What does EDR stand for and what is its primary focus?

    -EDR stands for Endpoint Detection and Response. Its primary focus is on detecting and responding to threats on endpoint environments such as laptops, desktops, servers, and tablets.

  • How does EDR prioritize alerts when a malicious attack occurs?

    -EDR prioritizes alerts based on the level of threat, categorizing them as high, medium, or low impact, and provides visibility into the full scope of the breach.

  • What actions does EDR take when a threat is detected?

    -When a threat is detected, EDR triggers an alert and can take automatic actions to remediate the threat, providing complete visibility into how the attack happened and what processes were involved.

  • Can EDR work alongside other antivirus solutions?

    -Yes, EDR can work with other antivirus solutions, including Microsoft Defender Antivirus, providing additional protection when the primary antivirus solution misses something or in case of post-breach detection.

  • What is the purpose of EDR block mode?

    -EDR block mode provides additional protection against malware when the primary antivirus is running in passive mode or if another antivirus is active on the machine.

  • How can existing exclusions in antivirus software affect EDR?

    -Existing exclusions in antivirus software will be respected during EDR scanning. If a file or application is excluded in the antivirus settings, EDR will not affect those exclusions.

  • What command can be used to check the status of Microsoft Defender Antivirus and EDR?

    -The command 'sc query windefend' can be used in the command prompt to check if the Microsoft Defender Antivirus service is running. For EDR status, PowerShell command 'Get-MpComputerStatus | Select AVRunningMode' can be used.

  • How long does it take to disable EDR block mode once the decision is made?

    -It takes 30 minutes to disable EDR block mode once the decision to disable it has been made.

  • What is the process for creating an EDR policy in Microsoft Endpoint Manager?

    -To create an EDR policy, navigate to Endpoint Security in Microsoft Endpoint Manager, select Endpoint Detection and Response, and follow the steps to create a policy, including naming it, setting options, assigning it to a group, and validating the policy.

  • How can you test if EDR block mode is enabled on a device?

    -You can test if EDR block mode is enabled on a device by using the PowerShell command mentioned earlier. If EDR is in block mode while another antivirus is running, the command will output 'EDR in block mode'.

  • What is the role of scope tags in EDR policy creation?

    -Scope tags in EDR policy creation allow administrators to define specific groups or organizational units to which the policy should apply, ensuring that the policy is targeted to the correct devices or users.

Outlines

00:00

đŸ›Ąïž Endpoint Detection and Response (EDR) Overview

This paragraph introduces the concept of Endpoint Detection and Response (EDR), emphasizing its focus on detecting and responding to threats on endpoint devices such as laptops, desktops, and servers. EDR prioritizes alerts based on the severity of threats and provides full visibility into the attack's scope, processes involved, and remediation actions. It operates automatically to remediate threats and can work alongside other antivirus solutions, even when they are not active, offering additional protection. The paragraph also explains how EDR generates alerts and incidents from similar alerts, with a promise to cover incident handling in an upcoming video.

05:03

🔒 EDR in Block Mode and Policy Validation

The second paragraph delves into how EDR operates in block mode, providing extra security when the primary antivirus solution might have missed something or in the case of a post-breach detection. It explains that EDR can work with other antivirus software, including Microsoft Defender, and respects existing exclusions set in those programs. The paragraph also covers how to validate the EDR and antivirus status using command prompt and PowerShell commands, providing specific examples of the commands and expected outputs based on the configuration.

10:03

📝 Creating and Assigning EDR Policies

This paragraph outlines the process of creating an EDR policy within the Microsoft Endpoint Manager console. It details navigating to the endpoint security section and selecting the appropriate options for creating an EDR policy, including choosing the correct platform version. The paragraph discusses settings such as block sample sharing, telemetry reporting frequency, and the use of scope tags. It also explains how to assign the policy to specific groups and validate the policy deployment, including waiting for the policy to sync with end-user devices and checking the policy status in the security center console.

15:03

🔄 Testing EDR Policy and Syncing Settings

The final paragraph focuses on testing the deployed EDR policy and ensuring it is synced on test machines. It describes syncing the policy through account settings and checking the security center console to verify if EDR is enabled in block mode. The paragraph provides PowerShell commands to check the status of EDR and the running mode of the antivirus, explaining the expected outputs for different antivirus configurations. It concludes with an invitation for viewers to comment with any questions and a teaser for the next video on a different topic.

Mindmap

Keywords

💡EDR

EDR stands for Endpoint Detection and Response, which is a security solution focused on detecting and responding to threats on endpoint devices such as laptops, desktops, and servers. In the video, EDR is the central theme, as it discusses how EDR can prioritize alerts and provide visibility into malicious attacks, as well as automatically remediate threats. The script mentions EDR in various contexts, such as EDR in block mode and its integration with other antivirus solutions.

💡Antivirus

Antivirus software is designed to detect, prevent, and remove malicious software. In the script, the term 'antivirus' is used to refer to both Microsoft Defender Antivirus and third-party solutions like McAfee or Trend Micro. The video explains how EDR can work in conjunction with antivirus software, even when the primary antivirus solution misses a threat, providing an additional layer of protection.

💡Endpoint

An endpoint refers to a remote node in a network, such as a laptop, desktop, or server. The video discusses EDR's focus on endpoint devices, emphasizing the importance of detecting and responding to threats at these points of potential vulnerability within an IT infrastructure.

💡Security Analytics

Security analytics involves the use of data, algorithms, and machine learning to identify and respond to cyber threats. The script mentions how EDR uses security analytics to prioritize alerts efficiently, providing a clear example of its application in the context of EDR's functionality.

💡Alerts

In the context of the video, alerts are notifications generated by the EDR system when a potential threat is detected. The script explains how these alerts can be prioritized based on the level of threat, such as high, medium, or low, and how they can be investigated for further action.

💡Incidents

Incidents in the script refer to a series of similar alerts that have been grouped together, often indicating a continuous or widespread threat. The video mentions that similar alerts from multiple machines can convert into incidents, which will be covered in more depth in a future video.

💡Block Mode

Block mode is a feature of EDR that provides additional protection against threats, even when another antivirus is active. The script explains that EDR in block mode can take action when the primary antivirus solution misses something or in the case of post-breach detection.

💡Policy

In the context of the video, a policy refers to a set of rules or guidelines that dictate how EDR and other security measures should be implemented and managed. The script walks through the process of creating an EDR policy in the Microsoft Endpoint Manager, illustrating how policies can be assigned to specific groups to ensure compliance and security.

💡Microsoft Endpoint Manager

Microsoft Endpoint Manager is a unified platform for managing all endpoint devices. The script describes using this platform to create and assign EDR policies, demonstrating its role in the administration of security measures across an organization's devices.

💡Sync

Syncing in the script refers to the process of updating a device with the latest policies and settings from the Microsoft Endpoint Manager. The video explains how to sync a device to ensure that the newly created EDR policy is applied and active on the endpoint.

💡Telemetry Reporting

Telemetry reporting involves the collection and transmission of data from devices back to a central system for analysis. The script mentions the option to expedite telemetry reporting in EDR, which would increase the frequency of logs sent to the security center for more frequent analysis and visibility.

Highlights

Introduction to Microsoft Defender for Endpoint and the EDR (Endpoint Detection and Response) feature.

Explanation of EDR's focus on critical detection and response in endpoint environments like laptops, desktops, and servers.

How EDR security analytics prioritize alerts based on the severity of the threat.

Visibility into the full scope of breach when a malicious attack occurs, including the processes involved.

EDR's automatic action to remediate threats detected by the system.

The creation of alerts in the system for further analysis when a threat is detected.

Conversion of similar alerts into incidents for continuous or widespread threats.

Understanding the logical workflow of EDR from detection to response, prediction, and prevention.

How EDR in block mode provides additional protection when the primary antivirus solution is passive or active.

The compatibility of EDR block mode with other antivirus solutions, including third-party options.

Instructions on how to enable EDR block mode and its implications for existing exclusions.

The importance of keeping the antivirus up to date when using EDR.

The process to disable EDR block mode and the time it takes for the change to take effect.

Validation methods for EDR and antivirus status using command prompt and PowerShell.

Demonstration of creating a policy for EDR in the Microsoft Endpoint Manager console.

Details on policy settings, including block mode, sample sharing, and telemetry reporting.

Assignment of the EDR policy to specific groups and validation of policy application.

Practical lab demonstration of syncing the policy on a test machine and checking the EDR status.

How to enable EDR in block mode from the Microsoft Defender Security Center settings.

Testing the EDR status using PowerShell commands to confirm the operational mode.

Transcripts

play00:00

hi guys welcome back to my other YouTube

play00:02

channel for mde tutorial Microsoft

play00:05

Defender for endpoint and today we are

play00:08

going to cover up the endpoint detection

play00:09

and the response that's called the EDR

play00:12

so let's get started this video

play00:16

now here is the content the EDR feature

play00:19

what we're going to cover up in this

play00:21

video that is EDR features EDR in a

play00:24

block mode create a PDR task policy then

play00:28

uh we'll test the policy on a device and

play00:31

finally we'll validate the EDR and the

play00:34

antivirus status and we will see the

play00:36

smoke that troubleshooting steps so

play00:39

let's understand what is the EDR first

play00:41

so EDR stands for the end point

play00:44

detection and response the EDR is

play00:47

focused on crit detection and their

play00:50

response on the endpoint environment

play00:53

especially such as on a uh laptop

play00:57

desktop servers tablet and the other

play00:59

devices so what we understood on this

play01:01

sentence especially it EDR work on the

play01:05

end user tab prices

play01:07

if there is any malicious the EDR

play01:11

security analytics can prioritize the

play01:13

alert very efficiently the gain

play01:16

visibility into the full scope of the

play01:18

bridge when there is any malicious

play01:21

attack happen then it will trigger an

play01:23

alert and that alert also can be the

play01:27

prioritize whether it's a high level

play01:29

high alert low medium or like a

play01:32

non-impactic and it will gain the

play01:34

visibility in the into the full scope of

play01:36

the preach so whatever preaches happen

play01:39

it will give you the complete visibility

play01:41

in the intact how that malicious attack

play01:45

happened and what are the process was

play01:48

involved in that

play01:50

and to take the action to remediate the

play01:53

truth so this EDR will take at

play01:55

automatically action to remediate the

play01:57

threat

play01:58

now when it Creed is detected alerts are

play02:01

created into the system foray analytics

play02:04

to investigate so when any malicious

play02:07

attack happen or the any threats is

play02:09

detected only the machine then

play02:12

automatically alerts will check need in

play02:14

the system and then that the alert will

play02:17

send you to for the investigation

play02:19

the similar alerts will convert into

play02:22

incidence when we have the similar

play02:25

alerts from the many machines or the one

play02:27

machine is continuously sending the

play02:29

similar alerts then that alerts will

play02:33

convert into a incidents so for this

play02:35

Allied anti incidents I will be covering

play02:37

up in my upcoming video in the very in

play02:40

depth to understand how the Allies

play02:43

generated how to fix it and evolve the

play02:46

incidence as well

play02:47

so now let's understand how this uh this

play02:52

logically works so when any malicious or

play02:56

any three that attacked so first this

play02:58

will go to the detect mode then it will

play03:00

uh go to the respond then predict and

play03:04

then it will prevent that means

play03:06

remediate and prevent your extra

play03:10

foreign

play03:11

so now let's understand the EDR in block

play03:14

mode how the EDR in block mode is

play03:17

working so EDR in a block mode will

play03:20

provide the additional protection for

play03:23

the malicious when the defender

play03:24

antivirus in or running or the passive

play03:27

mode in in running on the passive mode

play03:30

or on the active mode that means is if

play03:34

you have the Microsoft Defender EDR

play03:36

activated on your machine and suppose

play03:39

your Defender antivirus is not working

play03:41

any of the cement Type marker Cloud

play03:44

strike or any other antivirus is working

play03:46

in that scenario also your EDR can work

play03:50

with the other my uh other antivirus

play03:54

like a known Microsoft antivirus so in

play03:57

the EDR uh block mode will provide you

play04:00

the additional protection when you are

play04:04

the malicious malicious happen and you

play04:06

are any other antivirus is working

play04:08

either it can be Microsoft defender or

play04:10

any other antivirus

play04:12

so EDR block mode work if the primary

play04:15

antivirus solution missed something or

play04:19

if there is any post breach deduction

play04:21

happen so that means EDR can work if

play04:25

you're the primary antivirus as I

play04:27

explained primary antivirus can be a

play04:29

Microsoft defender or can be a third

play04:31

party solution like the cement tecma

play04:34

cafe or any other thing in that scenario

play04:36

also if you are the primary antivirus is

play04:39

missed something then you are the EDR

play04:41

will take that

play04:43

now EDR in a block mode allow Defender

play04:46

antivirus to take action on the breach

play04:49

Behavior area detections

play04:52

no existing now let's I write it here

play04:56

the few answers like the existing

play04:59

exclusions will work in the EDR if the

play05:02

ADR in block mode suppose you are

play05:04

running a Microsoft Defender and you put

play05:07

it some exclusion so that exclusion with

play05:10

Implement during the EDR uh scanning and

play05:14

when you are the EDR in a block mode and

play05:17

the similar way if you have uh semantic

play05:20

antivirus my cafe or trying micro or any

play05:22

other thing and you put some exclusion

play05:24

in that so EDR will exclude that

play05:27

particular files

play05:30

EDR will not effect with the existing

play05:32

antivirus if it is a defender or any

play05:36

other antivirus so EDR is not going to

play05:38

touch the antivirus part

play05:40

it won't be different

play05:42

in fact

play05:43

EDR Defender antivirus detect and the

play05:46

remediate malicious itself it important

play05:49

to keep it up to date so you are if you

play05:52

are using the Microsoft antivirus so

play05:54

it's mandatory your antivirus should be

play05:57

in up to date

play05:59

if you used to disable the EDR mode EDR

play06:03

in a block mode if you choose to disable

play06:05

and if you want to disable the EDR uh in

play06:09

a block mod to be disabled then it will

play06:11

take 30 minutes to disable that

play06:14

now here is a validation of your the

play06:17

validate the EDR and the antivirus

play06:19

status so you can uh just simply go to

play06:22

the command prompt CMT and type the SC

play06:25

query uh the wind Defender that if the

play06:28

service is sold is running that means

play06:31

you are the defender antiviruses or

play06:33

running mode

play06:34

and here is a command with the

play06:37

Powershell so get a MP computer status

play06:39

select MP running mode so this will give

play06:43

you the EDR status uh mode whether the

play06:46

EDR is running in a normal or not if you

play06:50

have the defender antivirus and you are

play06:52

checking the uh EDR block mode then it

play06:56

will give you the is output normal if

play06:59

suppose you enable the EDR on that

play07:01

machine and you are running a different

play07:03

antivirus like semantic time Micromax if

play07:05

you or any other thing then it will give

play07:07

you the output EDR in a block mode

play07:11

so that's how you can test it

play07:14

now let's move it to the Practical lab

play07:17

and uh we'll start to creating a policy

play07:21

so now I am in the mem console Microsoft

play07:24

endpoint manager and here let's go to

play07:28

the endpoint security portion

play07:32

and here will be creating the policy

play07:35

okay so I am under the endpoint security

play07:38

and here is the option endpoint

play07:40

detection and the response so first

play07:43

let's create a EDR policy here and then

play07:46

we'll go to the EDR in a plot mode so

play07:49

now go to the

play07:52

create policy and here we have the three

play07:55

options

play07:56

Windows 10 servers Windows 10 and letter

play08:00

window 10 and the for the SQ so let's

play08:03

take a Windows 10 and the letters we are

play08:05

not going to implement on the servers

play08:09

and now let's select this Windows 10 and

play08:11

later and the endpoint detection

play08:13

response if you want to implement on

play08:15

Windows 10 11 and the servers you can

play08:17

select this if you have the SCM then you

play08:20

can select this so let us go with the

play08:22

Windows 10 and letters now created

play08:26

and here let me just copy paste and

play08:29

named it and you can give the name based

play08:33

on your convenience now let's go to the

play08:35

next

play08:36

and see what are the settings we have

play08:38

over here

play08:43

it's loading

play08:46

so now here we have the two options only

play08:49

if you select the servers as well then

play08:52

this console is changed now block uh

play08:56

sample sharing or all the files so that

play08:59

means is your security center from the

play09:02

security Center you cannot see are the

play09:04

all the files if you say yes and uh that

play09:08

will block your the files

play09:10

why because might you have the some

play09:13

sensitive application running in your

play09:16

info and due to your policy you don't

play09:18

want to see are all the files with the

play09:21

Microsoft so you can block that and here

play09:23

is a expedite in the Telemetry reporting

play09:26

the frequently so if you have selected

play09:29

then the uh your the logs frequency

play09:32

frequency will increase to Central locks

play09:35

in the security Center

play09:37

so if you want to increase it you can

play09:40

increase expedite uh the Microsoft

play09:42

Defender security Telemetry reporting

play09:44

frequently the very frequently it will

play09:47

send a lot and here is a block if you

play09:50

click on the iconic button it will be a

play09:52

return or the setup of the Microsoft the

play09:55

Microsoft for the endpoint sample

play09:57

sharing the configuration parameters so

play10:01

if you don't want to share all the

play10:02

applications to Microsoft then it just

play10:06

say yes the most of the infrastructure

play10:08

choose a CS why because the all the

play10:11

files is not meant to send whichever

play10:14

file is impacted and you want to share

play10:16

you can send it to manually for the

play10:18

website investigation

play10:20

so that's how you can follow now let's

play10:23

go to the next

play10:25

if you are using any scope tags so you

play10:28

can Define it here I don't have any

play10:30

scope tab it's it's by default so you

play10:33

can use the scope of tags

play10:35

now let's go to the next and we are

play10:37

under the assignment so just include a

play10:40

group where you want to enable this

play10:42

policy so now let's go

play10:45

and just select the other group here

play10:49

okay so here I created a uh EDR activate

play10:53

group now go and just select it

play10:57

foreign

play11:00

the size of members on where you want to

play11:03

apply this

play11:08

now it's going to be applied here okay

play11:10

so now here it calculated like one

play11:13

device or and the user zero users I have

play11:16

added only the one user in my the core

play11:19

of the ETR activate now let's go to next

play11:21

and here is your the overview

play11:24

and now here it's going to create the

play11:26

policy so here is a message like a

play11:28

policy uh the profile created and now

play11:31

you can go back to again your endpoint

play11:33

security

play11:34

go here

play11:36

and you can validate your policies

play11:41

let's create it or not

play11:48

so now after assigning this policy uh

play11:52

just wait for couple of minutes or the

play11:55

hours when this policy is reached to the

play11:58

end user typewise so here you can go to

play12:00

the property

play12:04

um sorry let's go to the overview and

play12:06

here we'll get the uh your report status

play12:09

via this policies applied or not so just

play12:14

let's wait for some time

play12:19

okay so here data will be populated on

play12:23

in after couple of hours and meanwhile

play12:26

let's go to the our test machine and uh

play12:29

let's sync the policy so here I have a

play12:33

my windows 11 machine where I activated

play12:36

my the defender so let's go to the

play12:38

account settings and sync the policy so

play12:41

immediate uh policy will sync and that

play12:44

will get the latest policy from the

play12:47

defender

play12:50

so now here go to the accounts

play12:55

and here is a access work or school

play12:59

let's go here

play13:01

and now here's the account go to the

play13:03

info

play13:05

and here you can sync your the device

play13:12

and once this device is synced then we

play13:16

can test it over the policy

play13:20

so let's wait for some time okay so we

play13:23

have the one more Point uh to show you

play13:26

about the EDR so this policy has synced

play13:28

up and let's go to the uh the security

play13:32

center console and let's see about our

play13:36

the defender PDR in a block mode so

play13:39

let's go to the SEC settings I am under

play13:41

the security.microsoft DOT

play13:44

and here go to the settings under the

play13:48

settings we have the end points so let's

play13:50

go to here and check the EDR in a plot

play13:54

mode how you can activate that

play14:00

so just wait for some time

play14:05

console has

play14:16

so now this Advanced feature is on uh go

play14:20

to the under Advanced feature and here

play14:22

let's uh search for the EDR uh enable

play14:27

the EDR in a block Mark it's already

play14:28

enabled I enabled it the last time but

play14:31

if it is in in off mode then you just

play14:34

click and enable

play14:36

enable this PDR in a block mode so once

play14:39

you've done it then save the preferences

play14:41

and that's all so this only the one

play14:44

settings which you can do it

play14:46

uh from this add one security so once

play14:49

you've done it that means is you are the

play14:51

EDR uh will work in a block mode as well

play14:55

and now let's move it quickly to the our

play14:58

test machine let me do the sync again

play15:00

it's already it was synced and my the

play15:03

EDR was in a block mode so now let's

play15:06

test it or we can test it from the Power

play15:08

share so this is the command which will

play15:11

show you uh get MP status select AV

play15:14

running mode so it will show you uh is

play15:18

your the EDR in a block mod or not so

play15:20

it's showing in this is a normal why

play15:23

because I have the defender antivirus on

play15:26

this machine what if if it is if they

play15:28

are any some other antivirus like

play15:31

cementec McAfee train micro clouder

play15:33

strike then it will Source uh it will

play15:36

give you an output uh this uh Defender

play15:41

is in a oh sorry EDR in a block mode so

play15:45

you will be getting the output like that

play15:47

and if you want to test it you are the

play15:49

antivirus so here I chose the command uh

play15:52

SC with Defender so this will give you

play15:55

the status whether your Defender client

play15:58

is running or not so client Defender is

play16:01

running on this machine and you are

play16:04

another block mode that's why you have

play16:06

the output as in normal if not you

play16:10

should get the output uh the EDR in a

play16:13

block mode as I showed you in mega PPD

play16:16

here

play16:17

so you will be getting the output here

play16:19

if there's some third party uh antivirus

play16:22

is running on this

play16:25

so guys if you have any any problem you

play16:29

can give me the comment and uh once this

play16:32

policy has succeed uh actually already I

play16:35

deployed it and I deleted so that's why

play16:37

uh it was showing that in that way

play16:41

so now uh guys if you have any questions

play16:43

please comment on my the in this video

play16:47

and then I can answer you the pattern

play16:51

so guys thank you for watching this

play16:53

video see you soon in my the next video

play16:55

with some uh other topic in tip type

play16:58

thank you see you soon in my next

Rate This
★
★
★
★
★

5.0 / 5 (0 votes)

Étiquettes Connexes
EDR FeaturesEndpoint SecurityMicrosoft DefenderAntivirus StatusThreat DetectionResponse PolicySecurity AnalyticsIncident ManagementPolicy TestingDevice Protection
Besoin d'un résumé en anglais ?