Description
By: Matt Hand
EDR, demystified! Stay a step ahead of attackers with this comprehensive guide to understanding the attack-detection software running on Microsoft systems—and how to evade it.
Nearly every enterprise uses an Endpoint Detection and Response (EDR) agent to monitor the devices on their network for signs of an attack. But that doesn't mean security defenders grasp how these systems actually work. This book demystifies EDR, taking you on a deep dive into how EDRs detect adversary activity. Chapter by chapter, you’ll learn that EDR is not a magical black box—it’s just a complex software application built around a few easy-to-understand components.
The author uses his years of experience as a red team operator to investigate each of the most common sensor components, discussing their purpose, explaining their implementation, and showing the ways they collect various data points from the Microsoft operating system. In addition to covering the theory behind designing an effective EDR, each chapter also reveals documented evasion strategies for bypassing EDRs that red teamers can use in their engagements.
EDR, demystified! Stay a step ahead of attackers with this comprehensive guide to understanding the attack-detection software running on Microsoft systems—and how to evade it.
Nearly every enterprise uses an Endpoint Detection and Response (EDR) agent to monitor the devices on their network for signs of an attack. But that doesn't mean security defenders grasp how these systems actually work. This book demystifies EDR, taking you on a deep dive into how EDRs detect adversary activity. Chapter by chapter, you’ll learn that EDR is not a magical black box—it’s just a complex software application built around a few easy-to-understand components.
The author uses his years of experience as a red team operator to investigate each of the most common sensor components, discussing their purpose, explaining their implementation, and showing the ways they collect various data points from the Microsoft operating system. In addition to covering the theory behind designing an effective EDR, each chapter also reveals documented evasion strategies for bypassing EDRs that red teamers can use in their engagements.
You may also like
Top Trending
Dog Man 14: Dog Man: Big Jim Believes: A Graphic Novel (Dog Man #14)
Sale priceHK$85.00
Regular priceHK$150.00
In stock
Press Start! #17 The Super Jump Between Worlds! (Branches)
Sale priceHK$55.00
Regular priceHK$98.00
In stock
Darkstalker: A Graphic Novel (Wings of Fire: Legends Graphic Novel)
Sale priceHK$99.00
Regular priceHK$154.00
In stock
Harry Potter #4 and the Goblet of Fire (Interactive Illustrated Edition)
Sale priceHK$299.00
Regular priceHK$630.00
In stock
InvestiGators: Agents of S.U.I.T. #02: From Badger to Worse
Sale priceHK$79.00
Regular priceHK$99.00
In stock
Percy Jackson and the Olympians 5 Book Paperback Boxed Set (w/poster)
Sale priceHK$288.00
Regular priceHK$450.00
In stock
InvestiGators: Agents of S.U.I.T. #03: Wild Ghost Chase
Sale priceHK$69.00
Regular priceHK$140.00
In stock
Dragon Masters #29 (正版) Magic of the Wizard Dragon (Branches) (Tracey West)
Sale priceHK$48.00
Regular priceHK$69.00
In stock