Sophos Intercept X Edr Use Cases en
Sophos Intercept X Edr Use Cases en
This document highlights some of the most popular use cases for this powerful EDR functionality.
Ì Identify process that have recently modified files or registry keys Ì See which devices downloaded files from the phishing
site, remotely access them and perform cleanup
Ì Remotely access the device, examine the
changes and take appropriate action
Disguised processes
Some malicious processes can disguise themselves
in order to avoid detection. Examples include:
Ì Detect processes that have disguised themselves as ‘services.exe’
Ì Remotely access the device and terminate the
suspicious process and run forensic tools