EDR Is Great… But What Stops an Attacker Who Never Drops Malware?
Endpoint Detection and Response (EDR) is essential in any modern Windows environment. That part isn’t up for debate. If you operate Windows endpoints at scale without EDR, you are vulnerable to commodity threats by default.
But the problem isn’t that EDR is ineffective. The real issue is that EDR is only designed to monitor a specific portion of the attack surface — and modern attackers increasingly operate outside that visibility range.
EDR excels at detecting malicious execution. When no malware executes, detection becomes significantly harder. This isn’t a fringe scenario; it’s how a large percentage of real intrusions occur today.
Credentialed Access Changes the Threat Model Entirely
Most defensive tools assume the attacker starts outside the network. That assumption collapses the moment valid credentials are in play.
Once an attacker authenticates successfully:
- The threat model shifts from exploit prevention to abuse detection.
- Nearly everything the attacker does appears legitimate.
Typical attacker actions mirror normal admin behavior:
- VPN access — standard
- RDP logins — routine
- PowerShell execution — expected
- SMB access and Kerberos requests — normal Windows traffic
From an EDR perspective, there is no malicious artifact to anchor detection on. No exploit chain. No payload. No suspicious binary. The attacker isn’t trying to break in — they’re already inside.
Living Off the Land Is Safer for Attackers Than Malware
Attackers increasingly rely on native Windows tooling because it minimizes detection.
Common tools include:
- PowerShell
- WMI
- PSRemoting
- Scheduled tasks
- net.exe, dsquery, setspn, certutil
- Built‑in Windows APIs
These tools provide everything needed for reconnaissance, lateral movement, privilege escalation, and persistence.
You can’t simply block these tools — they’re core to administrative workflows. As a result, defenders end up implicitly trusting the same mechanisms attackers exploit.
Even when EDR logs PowerShell activity, it struggles to distinguish malicious intent from normal admin behavior. A PowerShell session querying Active Directory or enumerating shares isn’t inherently suspicious.
Attackers rely on that ambiguity.
Example: Share Enumeration Without Malware
One of the most effective internal techniques is simple SMB share enumeration combined with targeted file discovery — no malware required.
A PowerShell script can:
- Enumerate mapped drives and UNC paths
- Recursively traverse directories
- Filter for sensitive file types (e.g., configs, scripts, certs, keys)
- Stream output to avoid memory spikes
- Run in parallel for speed
From a defensive viewpoint, this is just authenticated SMB traffic and PowerShell file reads.
There is no exploit, no obfuscation, no child process, and no malware.
Yet this technique routinely reveals:
- Service account credentials
- API keys
- Backup passwords
- Weakly protected configuration data
And those findings often lead directly to privilege escalation.
Lateral Movement Looks Like Normal Administration
Once attackers obtain credentials, lateral movement blends seamlessly with legitimate IT activity:
- RDP into management hosts
- PSRemoting between servers
- SMB access to admin shares
- WMI for remote execution
These actions generate logs but rarely generate alerts. They use encrypted protocols, native tools, and workflows identical to everyday administration.
Endpoint telemetry alone simply doesn’t provide enough context to determine whether these actions are normal or malicious.
Active Directory Abuse Rarely Triggers Endpoint Alerts
Active Directory (AD) is the primary objective in most intrusions. Once attackers control AD, they control the environment.
Common AD abuse includes:
- Group membership changes
- ACL manipulation
- Delegation abuse
- Forged Kerberos tickets
None of these look like malware. Many occur entirely within directory services — and EDR has limited visibility into identity‑centric abuse.
Without identity‑focused monitoring, these actions often go undetected.
Why Network Telemetry (NDR) Matters
Network Detection and Response (NDR) fills the gaps EDR cannot.
NDR focuses on communication patterns, not processes. It identifies behaviors such as:
- Excessive LDAP queries
- Wide‑scope SMB traversal
- Authentication attempts across multiple hosts
- Accounts accessing unfamiliar resources
These patterns may seem harmless from a single endpoint’s perspective. Viewed across the network, they are unmistakably malicious.
Environments with strong network visibility detect attackers earlier — often before they escalate.
ITDR Focuses on What Attackers Actually Want: Identity
Identity Threat Detection and Response (ITDR) provides visibility EDR cannot.
High‑value ITDR signals include:
- Unusual privilege escalations
- Abnormal Kerberos activity
- Suspicious token lifetimes
- Service account misuse
- Unexpected delegation changes
These are identity problems — not endpoint problems.
Without ITDR, organizations lack visibility into the most valuable and frequently targeted attack surface.
Deception Technology Removes Ambiguity
Deception works because it eliminates guesswork.
High‑value deception assets include:
- Decoy accounts
- Honey credentials
- Deceptive file shares
- Fake services
No legitimate user interacts with these by accident. When an attacker touches a decoy, intent is confirmed. False positives are near zero.
Deception offers defenders something rare: high‑confidence alerts that deserve immediate action.
EDR Is Critical — but Not Sufficient
EDR remains a foundational component of modern security. It prevents countless attacks and raises the bar for adversaries.
But it cannot detect:
- Credentialed abuse
- Identity manipulation
- Lateral movement using native admin tools
- AD abuse that never touches the endpoint
- Reconnaissance performed through legitimate access
Attackers know this. They design their tradecraft accordingly.
If your defensive strategy assumes malware, you will miss attackers who don’t need it.
Effective defense requires visibility across endpoints, networks, and identities. Anything less creates blind spots attackers are actively exploiting.
Discover how advanced detection, identity protection, and deception technology strengthen your security stack. Explore our EDR solutions →