1) Agent-Based or Agent Less
2) Ability to Monitor/Scan Files and Network Connections
3) Whitelisting/ Blacklisting Files
4) Integration of EDR with other security solutions such as Firewall/IPS/SIEM
5) Ability to prevent malware on the system
6) Ability to implement IOC and Yara Rules
7) Applying the policies based upon group or Individuals
8) Ability to detect the attacks based upon PowerShell scripts and Registries.
0 comments:
Post a Comment