Best practices for using Incydr with EDR software

Overview

Incydr complements the functionality of many security endpoint detection and response (EDR) applications. Typically these applications work seamlessly with Incydr and do not require any configuration changes.

However, if an EDR application generates a false positive alert that appears to be caused by Incydr, use this article to determine whether you need to create any exceptions in your EDR. 

Third-party applications
Example endpoint detection and response (EDR) applications include: Carbon Black, CrowdStrike, ESET, Kaspersky, McAfee, SentinelOne, Sophos, and Symantec. For consistency, the term EDR tools is used throughout this article to describe these types of applications, and includes antivirus applications. 
Non-Incydr products
​Information about products from other manufacturers is intended as a resource to help you get the most out of our products. However, our Technical Support Engineers cannot provide direct assistance for these products. For assistance with products not developed by Incydr, contact the product's manufacturer.

Considerations

  • The exact set of agent paths and files will change from release to release.
  • The user detection execution during agent deployment can trigger an alert for some systems (due to a shell execution in PowerShell or batch script). User detection only occurs during deployment and has several mitigations that do not require setting global exceptions. 

Incydr's EDR support policy

Incydr agents do not require specific exceptions or configuration in EDR tools in order to function. Your best practice is to:

  • Inform your security and endpoint management teams about the agent at deployment time. Tell them to refer to this article if they have questions.
  • Do not proactively create exclusions for the agent.

If you encounter false positive alerts that appear to occur because of the agent, use this article to identify agent file paths and executable names. Then use that information to help you decide if you need to create any exceptions based on the specific event in your environment. Avoid adding wholesale exceptions for all Incydr folders.

EDR policies, practices, and configurations are very complex and subjective to each organization's goals, objectives and risk tolerance. While we are the expert on how our agent is packaged, distributed, and how it operates at runtime, we cannot advise on other solutions. We can assist in diagnosing legitimate behavior, but it is not our goal to dictate how to manage other vendors' products.

Why might Incydr generate EDR false positive alerts?

The agent requires full disk access, reads many files, and auto-updates itself. These are all valuable features that enable Incydr to provide continuous monitoring. However, these activities may initially be identified as suspicious behavior by EDR tools that use heuristics and machine learning to augment content definitions and policy. 

In most cases, EDR tools don't necessarily categorize the agent as malware or a virus, but Incydr activity without context may appear suspicious enough to generate an alert the first time it occurs. Depending on how your EDR tool is configured and how you respond to the initial alert, the tool may learn to correctly categorize Incydr activity as approved and trusted behavior, or it may incorrectly generate more alerts.

False positive alerts are not unique to the agent. Many other endpoint applications are subject to this same scrutiny by EDR tools and may require administrator action upon initial installation or after an upgrade. If other endpoint applications in your environment require similar permissions as Incydr, you may be able to use them as a template for responding to alerts and applying exceptions for the agent.

Add EDR exceptions

If you decide to create exceptions in your EDR applications, use the following guidelines.

Insider risk agent

Backup agent