Endpoint detection and response (EDR) data
Endpoint Detection and Response (EDR) solutions monitor endpoints (servers, laptops, desktops, and mobile devices) for suspicious activity like malware and other cyber threats that are more complex than a simple signature or pattern and evade traditional anti-virus/anti-malware. Endpoints provide critical forensic data including process actions, file access information, network events, and endpoint configuration changes. The EDR can filter, enrich and monitor the data for signs of malicious behavior.
By installing clients on laptops or other wireless and mobile devices, endpoint security software can monitor activity and provide security teams with warnings of devices attempting to spread malware or pose other threats. In this context, endpoint refers to the security client software or agent installed on a client device that logs security-related activity from the client OS, login, logout, shutdown events and various applications such as the browser (Explorer, Edge), mail client (Outlook) and Office applications. In the Common Information Model, endpoint data is typically mapped to the Endpoint data model.
Common data sources
Use cases for the Splunk platform
- Detecting recurring malware on a host
- Monitoring for signs of Windows privilege escalation attack
- Checking for files created on a system
- Detecting the disabling of security tools
- Detecting Windows file extension abuse
- Visualizing processes and their parent/child relationships
- Running common General Data Privacy Regulation compliance searches
- Monitoring NIST SP 800-53 rev5 control families
Use cases for Splunk security products
Be sure to explore the Splunk Security Content site to see what detections you can run in Splunk Enterprise Security with endpoint data.