Gartner Blog Network


Using EDR For Remediation?

by Anton Chuvakin  |  March 11, 2016  |  11 Comments

“Do you believe in bible? – Totally, man, I’ve seen one!”

OK, do you believe in APT automatic remediation? In fact, have you seen one done successfully? BTW, here we define “remediation” as “putting it the way it was.”

My point is that automated remediation of compromised systems – however much desired – is also generally hopeless, especially in cases of real APT malware. Even with well-designed kernel-level EDR that records “everything” [or: the one uses fancy VM introspection approaches], making sure – and I mean 100.0% sure – that all the traces of the attacker or its creation [malware] are found and cleaned is impossible. Sure, the anti-virus guys can remediate commodity malware with decent certainty, but even there success is often incomplete or not assured…

Frankly, “APT remediation” is nuking it from orbit aka disk reimaging. In fact, given firmware persistence mechanisms, maybe this would be the only truly reliable “remediation” tool:

bulldozer-remediation

img src: https://flic.kr/p/pqScwo CC license

The practical conclusion of this, if you are getting EDR, don’t insist too hard on remediation features, you either won’t use them much or you won’t trust them….

Related blog posts on EDR:

Category: etdr  security  

Anton Chuvakin
Research VP
5+ years with Gartner
16 years IT industry

Anton Chuvakin is a research VP at Gartner's GTP Security and Risk Management group. Before Mr. Chuvakin joined Gartner, his job responsibilities included security product management, evangelist… Read Full Bio


Thoughts on Using EDR For Remediation?


  1. […] Anton Chuvakin “Do you believe in bible? – Totally, man, I’ve seen one!”OK, do you believe in APT […]

  2. Matthew Gardiner says:

    Frankly if you can get detect & investigate (as in full understanding) right with a true “APT” you have solved 99% of the problem. Automated remediation is for commodity attacks.

    • >Automated remediation is for commodity attacks.

      100%, exactly, absolutely our view :-)

    • Dori Fisher says:

      As with young children who cannot identify the intimate couple in a picture because they do not have prior memory associated with such a scenario, SOC personal have the same issue with understanding what they are seeing (APT) even after getting an alert something is wrong. Like looking hard at petri dish when you do not have the relevant experience and / or credentials.

  3. Paul Stamp says:

    NIST talks about remediation as containment, eradication & recovery. EDR can help with containment, and has some role in helping with eradication, but recovery? I think not.

    EDR has a role, but any vendor that says its tool “will remediate your APT” is being utterly disingenuous.

    In the security market as a whole though, it’s difficult to have a nuanced, accurate position that folks will understand and differentiate from the wild claims.

  4. Scott Gainey says:

    Sorry, I don’t agree. I do believe it’s possible to fully remediate a machine without having to a painful reimaging. We do this today on Windows. I’m going to set up a briefing with you so we can show you how it works on SentinelOne.

    • OK, so you think it is possible to record everything [and I do mean *EVERYTHING*] dangerous that the attacker may have done to the machine, including what implications his/her manipulation of [say] raw memory have cause. But HOW do you plan to do that?!

  5. Paul Stamp says:

    Sure. If you narrow the definition of “remediation” and “APT” enough you could make that argument.

    In reality though, remediation goes way beyond anything to do with an endpoint – particularly if the attacker has legitimate credentials.

    We would be l doing a disservice to customers by mis-setting expectations.

    • Exactly – in this post I am am taking a more narrow view of remediation [put the endpoint to a KNOWN safe state]. Not ‘likely safe’, not safer, but KNOWN SAFE.



Comments are closed

Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.