Skip to content
This repository was archived by the owner on Jan 13, 2025. It is now read-only.

Latest commit

 

History

History
52 lines (39 loc) · 1.65 KB

Lab 8 - Triaging with EDR.md

File metadata and controls

52 lines (39 loc) · 1.65 KB
title description author created achievements duration range applications external
Triaging with EDR
Introduce post-compromise attack behaviors and EDR defenses
Chris Gerritz, Datto
02/19/2023
40
None
Browser
Datto EDR
rightofboom.infocyte.com

Description

The purpose of these labs is to introduce post-compromise attack behaviors and EDR defenses.

This next section will have us log into the Datto EDR console and review the attack behaviors we just conducted from the defender's point of view.

s> EDR is not perfect so we have to temper our expectations. A Windows host is buzzing with millions of internal, hidden events every minute. EDR, as a technology, has to be specific on what events to capture and to what level of detail. Process information we will review today is one of the most effective sources of information, especially for attacks involving malicious behaviors of known good operating systems utilities.

Objectives

  1. Understand the role of EDR in monitoring networks and attacker behaviors
  2. Understand the difference between malware and behaviors
  3. Demonstrate triage of alerts related to a potential attack

Requirements

Range None
Applications Browser
Needed Files None

Instructions

  1. In another browser window (outside the lab enviroment), log into the Datto EDR console: