Blog Layout

Selecting EDR/XDR solution

Author name

When it comes to cybersecurity, endpoint detection and response (EDR) and extended detection and response (XDR) are two terms you may have heard thrown around. But what exactly do these terms mean and why should you care? In this blog post, we'll explore what EDR and XDR are, how they differ, and how to select the right software for your organization.


First, let's start with EDR. EDR refers to the process of detecting and responding to security incidents on endpoint devices such as laptops, servers, and mobile devices. EDR software typically monitors endpoint activity for suspicious behavior, such as the execution of malware, and provides the necessary tools for incident response, such as the ability to isolate or quarantine infected devices.


On the other hand, XDR is an extension of EDR, taking a more holistic approach to incident detection and response. Instead of focusing solely on endpoint devices, XDR considers security incidents across multiple points of the network, including cloud, network, and email. This allows for a more comprehensive view of an organization's security posture, enabling the detection of threats that may have otherwise gone unnoticed.

When it comes to selecting the right EDR or XDR software, there are a few key factors to consider:


  1. Platform coverage: Does the software cover the platforms and devices that are most relevant to your organization? Are you looking for support for Windows, Mac, and Linux systems, or do you need to monitor mobile devices as well?
  2. Detection and response capabilities: What types of threats does the software detect and how does it respond to them? Some EDR and XDR software may only detect known threats, while others use machine learning to detect unknown threats. Similarly, some software may only provide basic response capabilities, while others offer advanced options such as automated quarantine or forensic analysis.
  3. Integration: Does the software integrate with SIEM or SOC you are already using? For example, if you have a SIEM in place, can the EDR or XDR software send alerts to it?
  4. Pricing: What is the cost of the software, including any additional costs such as licensing fees or maintenance?
  5. Scalability: Does the software scale to match your organization's needs as it grows and expands?


As an example, there was a case with a listed company mainly using Windows computers only with traditional anti-virus software. This company looks for seamless migration toward EDR solution. It takes the following considerations to select right solution and deploy within 4 weeks.


  1. The effectiveness of the solution - detection of malicious activities and unknown threats
  2. Whether existing SaaS solution has included EDR solution. Please note that some vendor such as Microsoft 365 has incuded this option where you don't need to spend extra to buy additional licenses
  3. Whether the solution can easily integrated with the SOC provider, including whether there is custom detection rules on top of this solution


This company end up selecting Microsoft Defender for Endpoint as they have been using Microsoft 365 E5 which includes everything that satisify above selection criteria.


The other example is about which companies got security incident and need rapid deploying of EDR solution to help to relief the situation. We have seen that customer has used various options such as SentinelOne and CrowdStrike that fix the issue and meet the business need.


When selecting EDR or XDR software, it is important to take a holistic approach and consider all the key factors that are relevant to your organization. By doing so, you can select a solution that provides the right level of protection and allows you to effectively respond to incidents as they arise.


At Amazing Dino, we understand the importance of cybersecurity and have helped many organizations navigate the EDR and XDR landscape. If you're looking for professional guidance and support in selecting the right software for your organization, please don't hesitate to reach out to us. We're here to help you protect your business and ensure your peace of mind.

MIP dynammic content marking
October 19, 2023
At Amazing Dino Consulting, we recognize the importance of data classification and protection. With the influx of data coming in and out of organizations daily, safeguarding your sensitive information is more crucial than ever. Leveraging Microsoft Information Protection (MIP) provides an efficient way to classify and protect sensitive data based on its content. In this blog post, we'll explore dynamic content marking, a feature that can automate and tailor protection measures for your documents. What is Dynamic Content Marking? Dynamic content marking in MIP allows organizations to automatically append specific labels, headers, footers, or watermarks to documents based on predefined variables. This provides a layer of information about the document, enhancing data governance and compliance. How Does It Work? When you configure a sensitivity label for content markings in MIP, you can use variables in the text string for your header, footer, or watermark. The supported variables include: ${Item.Label} : Label display name of the label applied. Example: General ${Item.Name} : File name or email subject of the content being labeled. Example: Sales.docx ${Item.Location} : Path and file name of the document or the email subject for an email being labeled. Example: \Sales\2023\Q3\Report.docx ${User.Name} : Display name of the user applying the label. Example: Richard Simone ${User.PrincipalName} : Azure AD user principal name (UPN) of the user applying the label. Example: t est@amazingdino.testing ${Event.DateTime} : Date and time when the content is labeled, either in the local time zone of the user in Microsoft 365 apps or UTC for Office Online and auto-labeling policies. Example: 8/10/2023 1:30 PM Note: The syntax for these variables is case-sensitive. Demonstration First, go to compliance.microsoft.com->Information Protection->Labels and click "create a label". Then, enter the name and associate information.
By looka_production_101445564 July 2, 2023
Azure AD Applicaiton Proxy
email security, why third party email security is required, Avanna, Office 365
By looka_production_101445564 January 27, 2023
In this blog post, we discuss the basics of email security, the security features provided by Office 365, why third-party email security is still required. We state that while Office 365 provides a number of built-in security features, it is important to note that third-party email security is still required. We concludes the blog post and welcome anyone who is interested in learning more about the services to contact us.
Share by: