Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen

Endpoint Security: EDR, EPP and holistic device protection

Endpoint security protects all endpoints—laptops, servers, and mobile devices. From traditional antivirus to EDR and XDR: technologies, detection methods, hardening measures, and choosing the right solution.

Table of Contents (7 sections)

Endpoints—laptops, workstations, servers, mobile devices, and virtual machines—are the primary target for cybercriminals. 80% of all security incidents begin at an endpoint. Endpoint security is therefore not an optional feature, but the foundation of any security architecture.

From Antivirus to EDR: The Evolution

Generation 1: Signature-Based Antivirus (1990s–2010s)

Traditional antivirus compares files against a database of known malware signatures. It works well for known malware—but fails completely against:

  • Zero-day exploits (no signature available)
  • Polymorphic and metamorphic malware (changes signature)
  • Fileless malware (no file on the hard drive)
  • Living-off-the-land techniques (legitimate system tools abused)

Status: Necessary as a foundation, but far from sufficient.

Generation 2: Endpoint Protection Platform (EPP)

EPP combines multiple detection methods:

  • Signature-based detection
  • Behavior-based heuristics (suspicious activity patterns)
  • Machine learning models
  • URL/reputation filters
  • Application whitelisting

EPP is reactive: It attempts to block malware upon entry.

Generation 3: Endpoint Detection and Response (EDR)

EDR goes a step further—it combines prevention with detection and response:

Continuous monitoring: EDR records all activity on every endpoint: processes, network connections, file operations, registry changes, memory accesses. This telemetry stream flows into a central cloud platform.

Threat detection: Behavior-based detection based on MITRE ATT&CK techniques. An EDR does not recognize "this is known malware"—but rather "this behavior corresponds to technique T1003 (Credential Dumping)."

Forensics and Investigation: After an alert: Complete process tree view—what the process did, which connections it established, which files it wrote. In minutes instead of hours.

Automated Response:

  • Automatically terminate the process
  • Isolate the host (disconnect from the network but maintain management connectivity)
  • Quarantine the file

Market Leaders (Gartner Magic Quadrant 2024): CrowdStrike Falcon, SentinelOne, Microsoft Defender for Endpoint, Palo Alto Cortex XDR, Sophos Intercept X, Trend Micro Vision One.

Generation 4: XDR (Extended Detection and Response)

XDR extends EDR with additional telemetry sources:

  • Endpoint (EDR)
  • Network (NDR)
  • Cloud workloads
  • Email
  • Identities (Active Directory, Entra ID)

Correlation across all sources enables: "Phishing email received → User clicks link → Browser launches PowerShell → PowerShell connects to C2 → Lateral movement to DC" – recognized as a coherent attack path, not as 5 separate alerts.

Endpoint Hardening

Hardening reduces the attack surface before malware even becomes active.

Windows Hardening (Essential Measures)

PowerShell Restrictions:

# Constrained Language Mode (prevents PowerShell from being used as an attack tool)
Set-ExecutionPolicy -ExecutionPolicy AllSigned -Scope LocalMachine

# Script Block Logging (for forensic analysis)
# Via GPO: Computer Configuration → Administrative Templates → Windows Components → PowerShell

Windows Defender Application Control (WDAC): Only signed and approved applications are allowed to run—application whitelisting at the kernel level. Prevents the execution of unauthorized binary files.

Credential Guard: Protects LSASS (Local Security Authority Subsystem) from credential dump attacks (Mimikatz). Stores credentials in an isolated Hyper-V environment.

# Check Credential Guard status
msinfo32 → System Summary → Virtualization-based security

Windows Defender Exploit Guard:

  • Attack Surface Reduction (ASR) Rules: Blocks common attack techniques (Office macros, script execution from Temp folders)
  • Controlled Folder Access: Prevents ransomware encryption (only authorized apps can write to files)
  • Network Protection: Blocks outbound connections to known malicious domains

LAPS (Local Administrator Password Solution): Every Windows computer is assigned a unique, rotating local admin password. Prevents pass-the-hash lateral movement (a compromised machine does not provide a password valid on 500 other machines).

UAC (User Account Control): Standard user privileges instead of admin rights for everyday use. Elevated privileges only upon explicit confirmation—prevents malware from automatically running with admin rights.

macOS Hardening

  • Gatekeeper: Only signed and notarized applications
  • System Integrity Protection (SIP): Protects critical system paths from tampering
  • FileVault: Full-disk encryption (similar to BitLocker)
  • Mobile Device Management (MDM): Enterprise management via Apple Business Manager

Mobile Endpoints (iOS/Android)

Mobile Device Management (MDM): Corporate policies for mobile devices: password requirements, app whitelist, remote wipe.

Mobile Application Management (MAM): Separation of personal and corporate apps/data on BYOD (Bring Your Own Device) devices.

Conditional Access: Only managed and compliant devices are granted access to corporate resources (Microsoft Intune, Jamf, VMware Workspace ONE).

Patch Management - A Critical Foundation

Unpatched systems are the most common attack vector. WannaCry (2017) exploited a two-month-old Windows vulnerability for which a patch existed—but had not been applied.

Patch SLAs as Best Practice:

CVSS ScoreSeverityPatch Deadline
9.0-10.0Critical24-48 hours
7.0-8.9High7 days
4.0–6.9Medium30 days
0–3.9Low90 days

Automation: Microsoft WSUS/Intune, Red Hat Satellite, Ansible, Puppet for automated patch deployment.

EDR and SIEM: Interaction

EDR provides high-quality endpoint telemetry. In the SIEM, this is correlated with other sources (network, DNS, AD logs, cloud):

EDR Alert: Suspicious PowerShell Command
     +
Active Directory: New domain admin created (unusual time)
     +
Firewall: Outbound connection to known C2 IP
     =
SIEM correlation: Active compromise incident → SOC Alert P1

Without SIEM correlation: 3 separate alerts that may be overlooked. With SIEM: A prioritized P1 alert with full context.

Endpoint Security for Remote Work

Working from home changes the threat model:

  • Devices are not within the protected perimeter
  • Private networks without an enterprise firewall
  • Mixed use (personal and professional)

Recommendations:

  • EDR on all corporate devices (including home office PCs)
  • VPN or ZTNA for corporate traffic
  • Conditional Access: Only compliant devices are granted access
  • Endpoint DLP (Data Loss Prevention): Prevents uncontrolled data leakage to personal USB drives
  • Mandatory disk encryption (BitLocker/FileVault)

Compliance Requirements

NIS2 Art. 21: "Detection of cybersecurity incidents" and "Protection of ICT systems" are explicit requirements—EDR is the technical implementation.

BSI IT-Grundschutz SYS.2.1: "General Client" contains detailed requirements for operating system hardening, antivirus protection, and patch management.

ISO 27001 A.8.7: "Protection against malware" as an explicit control.

PCI DSS 5.x: Anti-malware protection on all systems in the Cardholder Data Environment.

Endpoint as a Trust Anchor in Zero Trust

In Zero Trust architectures, the endpoint health status determines access:

User request to corporate app

Conditional Access checks:
  ✓ User identity (MFA passed?)
  ✓ Device compliance (MDM enrolled, antivirus active, OS patched?)
  ✓ Device status (EDR: no active alerts?)
  ✓ Location/network (trusted network or known IP?)

Access granted / denied / with additional MFA step

Only devices that pass all checks are granted access—regardless of network location.

Sources & References

  1. [1] Gartner Magic Quadrant for Endpoint Protection Platforms 2024 - Gartner
  2. [2] MITRE ATT&CK: Endpoint Techniques - MITRE Corporation
  3. [3] BSI: Empfehlungen für Endpoint-Sicherheit - BSI

Questions about this topic?

Our experts advise you free of charge and without obligation.

Free Consultation

About the Author

Chris Wojzechowski
Chris Wojzechowski

Geschäftsführender Gesellschafter

E-Mail

Geschäftsführender Gesellschafter der AWARE7 GmbH mit langjähriger Expertise in Informationssicherheit, Penetrationstesting und IT-Risikomanagement. Absolvent des Masterstudiengangs Internet-Sicherheit an der Westfälischen Hochschule (if(is), Prof. Norbert Pohlmann). Bestseller-Autor im Wiley-VCH Verlag und Lehrbeauftragter der ASW-Akademie. Einschätzungen zu Cybersecurity und digitaler Souveränität erschienen u.a. in Welt am Sonntag, WDR, Deutschlandfunk und Handelsblatt.

10 Publikationen
  • Einsatz von elektronischer Verschlüsselung - Hemmnisse für die Wirtschaft (2018)
  • Kompass IT-Verschlüsselung - Orientierungshilfen für KMU (2018)
  • IT Security Day 2025 - Live Hacking: KI in der Cybersicherheit (2025)
  • Live Hacking - Credential Stuffing: Finanzrisiken jenseits Ransomware (2025)
  • Keynote: Live Hacking Show - Ein Blick in die Welt der Cyberkriminalität (2025)
  • Analyse von Angriffsflächen bei Shared-Hosting-Anbietern (2024)
  • Gänsehaut garantiert: Die schaurigsten Funde aus dem Leben eines Pentesters (2022)
  • IT Security Zertifizierungen — CISSP, T.I.S.P. & Co (Live-Webinar) (2023)
  • Sicherheitsforum Online-Banking — Live Hacking (2021)
  • Nipster im Netz und das Ende der Kreidezeit (2017)
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)
This article was last edited on 04.03.2026. Responsible: Chris Wojzechowski, Geschäftsführender Gesellschafter at AWARE7 GmbH. License: CC BY 4.0 - free use with attribution: "AWARE7 GmbH, https://a7.de"

Cookielose Analyse via Matomo (selbst gehostet, kein Tracking-Cookie). Datenschutzerklärung