Most modern EDRs combine both real-time and post-event capabilities for layered defense.
Real-time is used to prevent known techniques.
Post-event is used for detection of novel or obfuscated behavior.
Cloud ML models for delayed anomaly detection.
Correlation across users/machines for pattern recognition.
Timeline reconstruction and actor attribution.
Last updated 8 months ago