{"id":16810,"date":"2018-10-24T13:00:53","date_gmt":"2018-10-24T13:00:53","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=542173"},"modified":"2018-10-24T13:00:53","modified_gmt":"2018-10-24T13:00:53","slug":"best-practices-for-endpoint-detection-and-response","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/best-practices-for-endpoint-detection-and-response\/","title":{"rendered":"Best Practices for Endpoint Detection and Response"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/blog1-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\"\/><\/p>\n<p>There are many elements that can complicate\u00a0enterprise security efforts. From the increasing sophistication of cybercriminal strategies and activities to the wide range of components connected to the network, data protection and infrastructure security has become an uphill battle. Another key factor to consider here is the array of different endpoints connected to and communicating through the network. Previously, administrators needed only concern themselves with on-premise desktop computers. But with the rise of BYOD and enterprise mobility, endpoint protection and associated data security has become much more complex. What\u2019s more, it\u2019s not just endpoints that IT admins must worry about: Any device that connects and leverages the corporate network should be a part of detection and response strategies. Today, we take a closer look at detection and response, including from an endpoint perspective, and how organizations can utilize best practices to bridge internal gaps and better ensure that key assets and the overarching network are safeguarded.<\/p>\n<h3><strong>What is endpoint detection and response? How does it work?<\/strong><\/h3>\n<p>It\u2019s important to begin with the basics. As Digital Guardian contributor Nate Lord explained, the <a href=\"https:\/\/digitalguardian.com\/blog\/what-endpoint-detection-and-response-definition-endpoint-detection-response\">concept of endpoint detection and response<\/a> (EDR) first emerged in 2013 thanks to Gartner researcher Anton Chuvakin. He defined it as \u201cthe tools primarily focused on detecting and investigating suspicious activities (and traces of such) [and] other problems on hosts\/endpoints.\u201d In this way, detection and response centers around the ability to identify potential threats and activity that can point to possible intrusions or attacks, and responding to these problems or dangers. While different tools will work in their own unique ways \u2013 and include different features and capabilities \u2013 endpoint protection and response includes a few key processes:<\/p>\n<table>\n<tbody readability=\"4.5\">\n<tr readability=\"9\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li><strong>Monitoring:<\/strong> The cornerstone of this process is continual monitoring of activities and events taking place within the network. This includes the integration and use of different endpoints, software platforms, hardware elements or digital environments.<\/li>\n<li><strong>Recording events:<\/strong> Events taking place within the\u00a0network, through the array of different endpoints are recorded into a central database.<\/li>\n<li><strong>Analysis:<\/strong> The recorded events are then analyzed for potential threats and intelligence that can be leveraged to inform protection strategies. Analysis may also include or inform other processes like the investigation of detected threats, reporting and associated alerting.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u201cNot all endpoint detection and response tools work in precisely the same manner or offer the same spectrum of capabilities as others in the space,\u201d Lord noted. \u201c[B]ut all endpoint detection and response tools perform the same essential functions with the same purpose: to provide a means for continuous monitoring and analysis to more readily identify, detect and prevent advanced threats.\u201d<\/p>\n<h3><strong>Detection and response: Aligning with the NIST Cybersecurity Framework<\/strong><\/h3>\n<p>It\u2019s worth pointing out the commonalities between the essentials of an endpoint detection and response strategy and the NIST Cybersecurity Framework. The key processes involved with endpoint detection and response specifically align with certain critical functions within the NIST Cybersecurity Framework. The Framework includes five key functions: Identify, Protect, Detect, Respond and Recover. In this way, it can be beneficial to build detection and response planning around the particular functions and categories included in the NIST Cybersecurity Framework. To learn more about the Cybersecurity Framework and the ways in which it helps improve overall security, <a href=\"https:\/\/blog.trendmicro.com\/nist-cybersecurity-framework-series-part-1-identify\/\">check out our series<\/a>, including <a href=\"https:\/\/blog.trendmicro.com\/nist-cybersecurity-framework-series-part-3-detect\/\">Part 3: Detect<\/a>, and <a href=\"https:\/\/blog.trendmicro.com\/nist-cybersecurity-framework-series-part-4-respond\/\">Part 4: Respond<\/a>. <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-542174\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/blog.jpg\" alt=\"\" width=\"800\" height=\"629\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/blog.jpg 800w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/blog-300x236.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/blog-768x604.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/blog-640x503.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/blog-440x346.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/blog-380x299.jpg 380w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\"\/><\/p>\n<p><em>Endpoint detection and response is an important and multi-faceted process for today\u2019s enterprises.<\/em><\/p>\n<h3><strong>Considerations and best practices from the experts<\/strong><\/h3>\n<p>In addition to aligning endpoint protection and response with the functions and categories of the NIST Cybersecurity Framework, there are a few other considerations and key practices that enterprises and their IT teams should implement with their endpoint detection and response strategy.<\/p>\n<h3><strong>Focus on endpoints as well as users<\/strong><\/h3>\n<p>David Schroth, managing director of Design Compliance and Security, told Digital Guardian one of the weakest links involved with endpoint protection and response processes isn\u2019t necessarily the endpoints themselves, but <a href=\"https:\/\/digitalguardian.com\/blog\/endpoint-detection-response-edr-solutions\">the users leveraging them<\/a>. Enterprises can implement a variety of protection, detection and response strategies, but these should be deployed upon a foundation of user education and awareness. \u201cIn today\u2019s world, users are targeted by outsiders through the use of phishing, social engineering and other techniques that are designed to persuade a user to unlock the door to allow them to come in,\u201d Schroth noted. \u201cIf the users are not aware of these threats, then they may actively work against any technology based solution that you implement to protect your endpoints.\u201d It\u2019s imperative to include user training and awareness education with an organization\u2019s security posture. Users should be taught about the potential risks in the current threat environment and the possible impacts their actions can have on the business, it\u2019s reputation and its customers.<\/p>\n<h3><strong>Consider building upon EDR with root cause analysis<\/strong><\/h3>\n<p>Trend Micro\u2019s Steve Duncan recently sat down with Enterprise Security Group\u2019s Jon Oltsik, who noted that there is <a href=\"https:\/\/blog.trendmicro.com\/the-endpoint-detection-and-response-edr-conversation\/\">currently considerable buzz<\/a> surrounding not only endpoint detection, protection and response, but the ability to build on this with root cause analysis. In other words, not only do enterprises want tools to guard against and identify potential threats, but when a security event does take place, they want to understand how it happened and how they can prevent it in the future.<\/p>\n<p><iframe loading=\"lazy\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/xqt1t73Nq2c?feature=oembed\" frameborder=\"0\" allow=\"autoplay; encrypted-media\" allowfullscreen=\"\">[embedded content]<\/iframe><\/p>\n<h3><strong>EDR requires the right resources: Part of a larger security posture<\/strong><\/h3>\n<p>It\u2019s also important for enterprises to understand that endpoint detection and response should not be undertaken as an ad hoc strategy, and should be incorporated into larger, overarching security considerations. Cybersecurity expert and consultant Joseph Steinberg noted that a <a href=\"https:\/\/digitalguardian.com\/blog\/data-security-experts-answer-what-biggest-misconception-companies-have-about-endpoint-security\">failure to properly include endpoint security<\/a> into the company\u2019s main security program is a top error that many enterprises make. A contributing factor to this is the fact that a robust endpoint detection and response strategy can be particularly resource- and operationally-intensive, as Oltsik pointed out to Duncan, and it requires the right expertise and tools. \u201cThe downside of EDR is that it is operationally intensive,\u201d Oltsik noted. \u201cWhen you combine that with a global skills shortage in cybersecurity and the high level of skills needed to use the root cause tools, many customers can\u2019t keep with EDR.\u201d<\/p>\n<p>Trend Micro is working to address this issue with its Managed Detection and Response, which includes constant monitoring, alerting and threat hunting, as well as endpoint event recording, network metadata recording and root cause analysis. This service is ideal for organizations that\u00a0may not have the resources and capabilities internally to take on this critical process on their own.<\/p>\n<p>To find out more about Managed Detection and Response, <a href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/business\/products\/user-protection\/endpoint\/endpoint-sensor\/ds_managaed-detection-response-service.pdf\">check out our datasheet<\/a> and connect with the experts at Trend Micro today.<\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/best-practices-for-endpoint-detection-and-response\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are many elements that can complicate\u00a0enterprise security efforts. From the increasing sophistication of cybercriminal strategies and activities to the wide range of components connected to the network, data protection and infrastructure security has become an uphill battle. Another key factor to consider here is the array of different endpoints connected to and communicating through&#8230;<br \/>\nThe post Best Practices for Endpoint Detection and Response appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":16811,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[311,3406,4190,1413,4191,4192,4193,4194,307],"class_list":["post-16810","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-current-news","tag-detection","tag-detection-and-response","tag-endpoint","tag-endpoint-detection","tag-endpoint-detection-and-response","tag-endpoint-protection","tag-response","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Best Practices for Endpoint Detection and Response 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/best-practices-for-endpoint-detection-and-response\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Best Practices for Endpoint Detection and Response 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/best-practices-for-endpoint-detection-and-response\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-24T13:00:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/best-practices-for-endpoint-detection-and-response.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/best-practices-for-endpoint-detection-and-response\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/best-practices-for-endpoint-detection-and-response\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Best Practices for Endpoint Detection and Response\",\"datePublished\":\"2018-10-24T13:00:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/best-practices-for-endpoint-detection-and-response\\\/\"},\"wordCount\":1122,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/best-practices-for-endpoint-detection-and-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/best-practices-for-endpoint-detection-and-response.jpg\",\"keywords\":[\"Current News\",\"Detection\",\"Detection and Response\",\"Endpoint\",\"Endpoint Detection\",\"endpoint detection and response\",\"endpoint protection\",\"response\",\"Security\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/best-practices-for-endpoint-detection-and-response\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/best-practices-for-endpoint-detection-and-response\\\/\",\"name\":\"Best Practices for Endpoint Detection and Response 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/best-practices-for-endpoint-detection-and-response\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/best-practices-for-endpoint-detection-and-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/best-practices-for-endpoint-detection-and-response.jpg\",\"datePublished\":\"2018-10-24T13:00:53+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/best-practices-for-endpoint-detection-and-response\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/best-practices-for-endpoint-detection-and-response\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/best-practices-for-endpoint-detection-and-response\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/best-practices-for-endpoint-detection-and-response.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/best-practices-for-endpoint-detection-and-response.jpg\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/best-practices-for-endpoint-detection-and-response\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Current News\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/current-news\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Best Practices for Endpoint Detection and Response\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Best Practices for Endpoint Detection and Response 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/best-practices-for-endpoint-detection-and-response\/","og_locale":"en_US","og_type":"article","og_title":"Best Practices for Endpoint Detection and Response 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/best-practices-for-endpoint-detection-and-response\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-10-24T13:00:53+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/best-practices-for-endpoint-detection-and-response.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/best-practices-for-endpoint-detection-and-response\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/best-practices-for-endpoint-detection-and-response\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Best Practices for Endpoint Detection and Response","datePublished":"2018-10-24T13:00:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/best-practices-for-endpoint-detection-and-response\/"},"wordCount":1122,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/best-practices-for-endpoint-detection-and-response\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/best-practices-for-endpoint-detection-and-response.jpg","keywords":["Current News","Detection","Detection and Response","Endpoint","Endpoint Detection","endpoint detection and response","endpoint protection","response","Security"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/best-practices-for-endpoint-detection-and-response\/","url":"https:\/\/www.threatshub.org\/blog\/best-practices-for-endpoint-detection-and-response\/","name":"Best Practices for Endpoint Detection and Response 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/best-practices-for-endpoint-detection-and-response\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/best-practices-for-endpoint-detection-and-response\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/best-practices-for-endpoint-detection-and-response.jpg","datePublished":"2018-10-24T13:00:53+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/best-practices-for-endpoint-detection-and-response\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/best-practices-for-endpoint-detection-and-response\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/best-practices-for-endpoint-detection-and-response\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/best-practices-for-endpoint-detection-and-response.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/best-practices-for-endpoint-detection-and-response.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/best-practices-for-endpoint-detection-and-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Current News","item":"https:\/\/www.threatshub.org\/blog\/tag\/current-news\/"},{"@type":"ListItem","position":3,"name":"Best Practices for Endpoint Detection and Response"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/16810","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=16810"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/16810\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/16811"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=16810"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=16810"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=16810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}