Skip to content

Incident Response Playbook: EDR Alert Triage

1. Alert Comprehension (Contextualization)

Section titled “1. Alert Comprehension (Contextualization)”

The initial phase requires analysts to understand what the EDR sensor detected without introducing cognitive bias.

  1. Analyze Alert Metadata:
    • Identify the exact detection name (e.g., “Malicious PowerShell Command”, “LSASS Memory Access”).
    • Assess the vendor-assigned severity (Low, Medium, High, Critical).
    • Determine the detection mechanism: Is it a signature-based detection (a known hash/IOC) or a behavioral heuristic (an Indicator of Attack - IOA)?
  2. Identify Impacted Entities:
    • Endpoint: Hostname, Operating System, IP address. Differentiate between a standard user workstation and a critical infrastructure server.
    • User Account: The security context under which the activity occurred. Is it a standard domain user, a local administrator, or a highly privileged service account (e.g., SYSTEM)?

Understanding the execution context is the most critical step in EDR triage. The Process Tree visualizes the parent-child relationships that led to the alert.

DFIR analysts must look for logical inconsistencies in the execution chain.

Suspicious Lineage (Anomalies)

  • outlook.exewinword.exepowershell.exe (Classic Phishing / Macro Execution)
  • httpd.exe or nginxcmd.exe (Web Server Exploitation / Web Shell)
  • services.exeRundll32.exe without legitimate arguments.
  • Any unsigned binary spawning built-in system administration tools.

Benign Lineage (Expected)

  • explorer.execmd.exe (User manually launching a command prompt)
  • services.exeSCCM_agent.exeupdate.exe (Legitimate software deployment via IT management tools)

Once the lineage is established, analysts must determine the intent behind the executed action.

The command line arguments represent the source of truth for intent. Analysts must scrutinize the telemetry for:

  • Reconnaissance Commands: Usage of Living Off The Land Binaries (LOLBAS) such as whoami, net user, nltest, or ipconfig.
  • Obfuscation: Base64 encoded payloads (e.g., powershell -enc ... or powershell -w hidden -e ...).
  • Execution Bypass: Attempts to bypass execution policies (e.g., ExecutionPolicy Bypass).
  • Network Connections: Did the flagged process initiate outbound network connections? If so, query the destination IP against Threat Intelligence feeds. Check if the connection was dropped by the perimeter firewall or successfully established.
  • File & Registry Operations: Did the process drop executable files in world-writable directories (e.g., C:\Users\Public\ or %TEMP%)? Did it modify persistence registry keys (e.g., HKCU\Software\Microsoft\Windows\CurrentVersion\Run)?

The final phase involves enriching the raw data to make a definitive, auditable triage decision.

Extract all relevant Indicators of Compromise (IOCs) from the EDR telemetry:

  • Submit File Hashes (SHA256) to platforms like VirusTotal or internal malware repositories.
  • Query IP Addresses and Domains on reputation platforms (AbuseIPDB, Talos Intelligence, GreyNoise).

Based on the enriched data, the analyst must apply one of the following verdicts:

  1. False Positive: The activity is completely legitimate and expected within the specific business context (e.g., an IT administrator running a known maintenance script).
    • Action: Close the alert. Create a granular exclusion rule in the EDR console to prevent future alert fatigue.
  2. True Positive - Benign: A user performed an unusual but non-malicious action that triggered a heuristic rule (e.g., a developer manually running whoami or nmap for testing purposes).
    • Action: Close the alert. Optionally, contact the user to confirm the activity and reinforce security policies.
  3. True Positive - Malicious (Incident): The analysis reveals an abnormal process lineage, obfuscated command lines, and/or confirmed malicious IOCs.