
This lesson requires Loopus Pro access. Upgrade to unlock all courses, labs, and challenges.
EDR platforms generate rich telemetry about endpoint activity. Effective investigation leverages this data to understand what happened, determine impact, and guide response.
EDR alerts trigger on suspicious behaviors rather than just signatures. A process spawning PowerShell is not inherently malicious, but Word spawning PowerShell downloading content might be.
Alerts include context: the process that triggered detection, its parent, command line arguments, network connections, file modifications, and registry changes. This context enables investigation without immediately pivoting to the endpoint.
Parent-child relationships reveal execution chains. Start from the alerting process and trace upward—what launched it? What launched that? Continue until you reach a user session or system process.
Suspicious patterns include:
Beyond process relationships, examine behaviors:
Network connections - What did the process connect to? Extract destination IPs and domains. Check threat intelligence.
File operations - What files were created, modified, or deleted? Look for staging in temp directories, drops in startup locations, or modification of existing binaries.
Registry modifications - Persistence in Run keys, scheduled tasks, or services.
Credential access - LSASS access, SAM queries, or Kerberos ticket requests.
EDR platforms often provide timeline views showing all activity on an endpoint over time. Use these to:
Investigation reveals IOCs for broader hunting:
What EDR detection methods exist?
What maps behaviors to known attacks?
How do you tune EDR alerts?
What term describes allowed software?