https://github.com/nasbench/sedr-internals
Symantec EDR Internals
https://github.com/nasbench/sedr-internals
detection edr endpoint endpoint-detection-response internals sedr symantec windows
Last synced: 2 months ago
JSON representation
Symantec EDR Internals
- Host: GitHub
- URL: https://github.com/nasbench/sedr-internals
- Owner: nasbench
- Created: 2021-04-04T22:18:12.000Z (about 4 years ago)
- Default Branch: main
- Last Pushed: 2021-10-12T00:06:58.000Z (over 3 years ago)
- Last Synced: 2025-03-18T20:40:46.048Z (2 months ago)
- Topics: detection, edr, endpoint, endpoint-detection-response, internals, sedr, symantec, windows
- Homepage:
- Size: 25.4 KB
- Stars: 26
- Watchers: 4
- Forks: 8
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# SEDR-Internals
This is a place where I put everything related to my research on Symantec EDR Internals. Currently it contains the following:
* **[Enrichment-Rules](https://github.com/nasbench/SEDR-Internals/blob/main/Signatures/Enrichment-Rules.txt)** : A list of Symantec EDR data enrichment rules with a short description for each.
* **[Heuristics](https://github.com/nasbench/SEDR-Internals/blob/main/Signatures/Heuristics.txt)** : A list of Symantec EDR heuristics signatures with a description for each. Plus an inclusion of the corresponding "threat.id" value for usage with Symantec EDR (SEDR) search queries.
* **[SONAR](https://github.com/nasbench/SEDR-Internals/blob/main/Signatures/SONAR.txt)** : A list of Symantec SONAR signatures with a description of each signature. Plus an inclusion of the corresponding "bash.virus_id" value for usage with Symantec EDR (SEDR) search queries.
* **[ATP-Rules-Regex](https://github.com/nasbench/SEDR-Internals/blob/main/Signatures/ATP-Rules-Regex.txt)** : A file that contains some example regular expressions used by SEDR to detect and enrich events.
## Blog
I wrote a couple of blog posts describing different component of SEDR which you can find here:
* **[Symantec EDR Internals — Criterion](https://nasbench.medium.com/symantec-edr-internals-criterion-fa49be4e21af)**
* **[Symantec EDR Internals — Event Enrichment Rules (Part I)](https://nasbench.medium.com/symantec-edr-internals-event-enrichment-rules-part-i-b5e4340041a7)**
* **[Forensic Artifacts — Symantec EDR “localdatastore” Folder](https://nasbench.medium.com/forensics-artifacts-symantec-edr-localdatastore-folder-9bff91d2876d)**
* **[Forensic Artifacts — Parsing Symantec EDR “localdatastore” LevelDB Files](https://nasbench.medium.com/forensics-artifacts-parsing-symantec-edr-localdatastore-leveldb-files-86f5c75736d5)**## Tools
These are some of the tools I wrote that can help you understand a little bit about the internals of SEDR and how it works:
* **[sedr-localdatastore-parser](https://github.com/nasbench/sedr-localdatastore-parser)**