WikiGlossaryEndpoint Detection and Response
Security

Endpoint Detection and Response

Definition

Endpoint detection and response, often shortened to EDR, is a security capability used to monitor computers, servers, laptops, virtual machines, and other endpoints for signs of suspicious or malicious activity. EDR tools collect endpoint telemetry such as process activity, file changes, network connections, user behavior, command execution, and system events, then analyze that data to identify threats that may bypass preventive controls. When unusual activity is detected, EDR helps security teams investigate what happened, determine scope and impact, and take response actions such as isolating a device, stopping a process, quarantining a file, or preserving evidence for further analysis. In governance, risk, and compliance programs, EDR supports continuous security monitoring, incident response readiness, audit evidence, and control validation. It is not a replacement for secure configuration, patching, access control, or security awareness, but it provides visibility and response capability when endpoint-level threats occur.

Real-World Examples

Ransomware Behavior Detection

A security team detects rapid file encryption activity on a laptop, isolates the endpoint, and reviews EDR telemetry to determine which files and systems may be affected.

Suspicious Command Investigation

An analyst reviews endpoint activity after a server runs an unusual script, using process history and user context to determine whether the action was authorized.

Remote Workforce Monitoring

An organization monitors employee laptops for abnormal login behavior, unexpected network connections, and unauthorized software execution across remote locations.

Audit Evidence Collection

A company exports EDR coverage reports, alert history, and response records to demonstrate that endpoint monitoring and investigation procedures are operating.

Endpoint detection and response is a security capability that monitors endpoint devices for suspicious activity, supports investigation, and enables response actions when threats are detected. It helps organizations understand what happened on a device, how far an incident may have spread, and what steps are needed to contain or remediate it.

EDR means endpoint detection and response. In cybersecurity, it refers to tools and processes that collect endpoint activity data, analyze behavior for potential threats, and help security teams respond to incidents involving laptops, desktops, servers, and other endpoint systems.

Endpoint detection and response works by collecting telemetry from endpoint devices, analyzing activity for indicators of compromise or abnormal behavior, generating alerts, and supporting investigation workflows. Many EDR programs also allow response actions such as isolating a device, terminating a process, or quarantining a suspicious file.

EDR is important because endpoints are common entry points for phishing, malware, credential theft, unauthorized access, and misuse. EDR gives security teams visibility into endpoint activity so they can detect threats faster, investigate incidents more effectively, and reduce the likelihood of widespread compromise.

EDR can help detect threats such as malware execution, ransomware behavior, credential dumping, suspicious scripts, lateral movement, unauthorized remote access, unusual process activity, and abnormal network connections. Detection quality depends on configuration, telemetry coverage, alert tuning, and the maturity of the security monitoring process.

Traditional antivirus generally focuses on identifying and blocking known malicious files or signatures. EDR provides broader endpoint visibility, behavioral detection, investigation timelines, and response capabilities. Many organizations use both preventive endpoint protection and EDR-style monitoring as part of a layered security program.

Endpoint protection is a broad category that includes preventive controls such as malware blocking, device hardening, application control, and exploit prevention. EDR focuses more specifically on detection, investigation, and response after suspicious activity occurs. Some endpoint security platforms combine both capabilities.

Common EDR capabilities include endpoint telemetry collection, behavioral analytics, alerting, investigation timelines, threat hunting, device isolation, process termination, file quarantine, forensic data capture, reporting, and integration with broader security operations workflows. The exact capabilities vary by implementation and organizational needs.

Information Security & GRC requirements for EDR typically include documented endpoint monitoring coverage, alert handling procedures, incident response workflows, access controls for security tools, evidence retention, periodic review of alerts, and reporting that demonstrates endpoint detection and response activities are operating effectively.

Organizations should implement EDR by defining coverage requirements, deploying monitoring across in-scope endpoints, assigning alert response ownership, documenting investigation procedures, retaining relevant evidence, reviewing coverage gaps, and testing response workflows. For audit readiness, teams should keep clear records of alerts, actions taken, exceptions, and periodic control reviews.

VersionDateAuthorDescription
1.0.02026-05-07WatchDog GRC TeamInitial publication