Skip to main content
โ† All controls
CIS-13.2 / CIS-13.7 / SI-4 / A.8.16 CIS Controls v8

EDR on all endpoints + servers

Demonstrate that EDR solutions are deployed and operational on all in-scope endpoints and servers with adequate coverage, appropriate detection policies, and functional alerting mechanisms.

Description

What this control does

Endpoint Detection and Response (EDR) software is deployed on all workstations, laptops, and servers to provide continuous monitoring, threat detection, and automated response capabilities. EDR agents collect telemetry including process execution, network connections, file modifications, and registry changes, then correlate this data using behavioral analytics and threat intelligence to identify malicious activity. This control enables rapid detection of advanced threats that evade traditional antivirus, provides forensic capabilities for incident investigation, and supports containment actions such as process termination or network isolation.

Control objective

What auditing this proves

Demonstrate that EDR solutions are deployed and operational on all in-scope endpoints and servers with adequate coverage, appropriate detection policies, and functional alerting mechanisms.

Associated risks

Risks this control addresses

  • Advanced persistent threats (APTs) execute undetected on endpoints due to lack of behavioral monitoring and evade signature-based antivirus
  • Ransomware encrypts critical data before detection because traditional antivirus cannot identify novel or polymorphic variants
  • Lateral movement by attackers across the network goes unnoticed due to insufficient visibility into process-to-process communication and credential usage
  • Insider threats exfiltrate sensitive data without triggering alerts because file access and network egress patterns are not monitored
  • Compromised servers remain active for extended dwell times because malicious processes blend with normal activity without behavioral analysis
  • Incident response is delayed or incomplete due to lack of forensic telemetry for root cause analysis and scope determination
  • Zero-day exploits successfully compromise endpoints because heuristic and machine learning detection capabilities are absent

Testing procedure

How an auditor verifies this control

  1. Obtain a complete inventory of all endpoints (workstations, laptops) and servers from asset management systems or network discovery tools
  2. Export the list of all devices with active EDR agents from the EDR management console, including device names, installation dates, and agent versions
  3. Compare the asset inventory against the EDR agent deployment list to identify any devices without EDR coverage
  4. Select a representative sample of endpoints and servers (minimum 10-15 across different segments) and verify EDR agent operational status through the management console
  5. Review EDR detection policy configurations to confirm behavioral analytics, threat intelligence feeds, and automated response actions are enabled
  6. Examine alert logs from the past 90 days to verify that the EDR platform is generating and escalating security alerts appropriately
  7. Validate that EDR agents are configured to maintain persistence through reboots and have tamper protection enabled to prevent unauthorized uninstallation
  8. Test EDR response capabilities by reviewing evidence of at least one recent incident where the EDR system detected and contained a threat or triggered an alert for investigation
Evidence required EDR management console screenshots showing total deployed agents and coverage statistics; exported asset inventory with EDR installation status; configuration exports demonstrating detection policies, threat intelligence integration, and automated response rules; sample of security alert logs with timestamps, severity levels, and disposition actions; EDR agent health reports for sampled devices showing service status and last communication time; policy documentation defining EDR deployment scope and maintenance procedures.
Pass criteria At least 98% of all inventoried endpoints and servers have operational EDR agents installed, detection policies are actively enabled with behavioral analytics and threat intelligence feeds configured, and the EDR platform has generated verifiable security alerts within the audit period demonstrating functional detection capabilities.

Where this control is tested

Audit programs including this control