Endpoint & Workload Protection · EP-Q03

Question: Is endpoint protection (anti-malware, EDR, or equivalent) deployed, monitored, and updated across all systems?

Why This Matters

Active protection detects and blocks known and emerging threats. Regular monitoring ensures coverage gaps and signature updates are quickly addressed.

Maturity

0 — Unaware
No anti-malware or EDR solution deployed.
1 — Ad Hoc
Standalone antivirus installed on some endpoints.
2 — Defined
Standard tool chosen; updates managed centrally.
3 — Managed
Coverage metrics tracked; alerts reviewed daily.
4 — Integrated
EDR integrated with SIEM; behavioral analytics active.
5 — Optimized
Adaptive defense with ML, sandboxing, and threat-intel enrichment.

How to Level Up

From → To Actions
0 → 1 Install reputable free AV on all systems.
1 → 2 Standardize one enterprise AV/EDR; enable auto-updates.
2 → 3 Deploy central console; track inactive agents and alerts.
3 → 4 Integrate EDR telemetry into SIEM; correlate with network logs.
4 → 5 Enable AI-based threat hunting; use MITRE ATT&CK mapping for detections.

Enablers

Evidence

KPIs

Low-Cost / Open-Source Options (MSME)

Purpose Tool Notes
Anti-malware Windows Defender / ClamAV Baseline free protection.
EDR framework Wazuh / Velociraptor Collect and analyze endpoint telemetry.
Threat intel MISP / OTX Community intelligence integration.

Common Pitfalls

Compliance Mapping

Standard Clauses / Notes
ISO/IEC 27001:2022 A.8.15 Malware Protection
CERT-In 2022 Section 6 (Malware and EDR Controls)
DPDP Act 2023 Sec 9 (Security Safeguards)
NIST CSF 2.0 PR.DS-08 / DE.CM-07
NIRMATA Mapping EP-Q03 mapped to SOC coverage metric ≥ 90 %.