All Controls
Security Control

Antivirus & Endpoint Detection and Response (EDR)

NIST ProtectPR.PT-1CIS Control 10: Malware Defenses

What This Control Means

Endpoint protection encompasses the security tools deployed on individual devices, laptops, desktops, servers, and mobile devices, to prevent, detect, and respond to malware, ransomware, and other threats. Traditional antivirus software relies on signature-based detection, matching files against a database of known threats. While still useful, signature-based detection alone is insufficient against modern threats that use fileless techniques, polymorphic code, and zero-day exploits.

Endpoint Detection and Response (EDR) represents the evolution of endpoint protection. EDR solutions continuously monitor endpoint activity, using behavioral analysis and machine learning to detect suspicious patterns that signature-based tools miss. When a threat is detected, EDR provides detailed forensic data about the attack chain and, in many cases, automated response capabilities such as isolating the compromised device from the network.

For small and mid-sized businesses, managed EDR solutions offer enterprise-grade protection without requiring in-house security expertise. Providers like SentinelOne, CrowdStrike, and Microsoft Defender for Endpoint include 24/7 monitoring by security analysts who investigate alerts and coordinate responses. This is significantly more effective than traditional antivirus running without human oversight.

Endpoint protection must be deployed consistently across all devices that access organizational resources. A single unprotected endpoint can serve as the initial entry point for an attack that spreads across the entire network. Centralized management consoles ensure that all endpoints are running current protection, policies are applied consistently, and security teams have visibility into the health of every device.

Why Insurers Care

Endpoint protection is a foundational requirement on virtually all cyber insurance applications. Insurers differentiate between traditional antivirus and modern EDR solutions, with many now requiring EDR specifically due to its superior detection capabilities. Organizations running only legacy antivirus may face higher premiums or limited coverage.

Managed EDR solutions are particularly valued by insurers because they include human analysts who can detect and respond to threats that automated tools alone might miss. The ability to demonstrate 24/7 managed endpoint protection is a significant factor in obtaining favorable insurance terms.

Industry-Specific Notes

Healthcare (HIPAA)

HIPAA requires technical safeguards to protect against malicious software under 45 CFR 164.308(a)(5)(ii)(B). Healthcare organizations must protect all devices that access ePHI, including clinical workstations, mobile devices, and medical IoT devices. EDR solutions with healthcare-specific configurations help manage the unique endpoint landscape in clinical environments.

Legal (ABA Guidelines)

Law firms are high-value targets for advanced persistent threats seeking privileged communications and confidential case information. Signature-based antivirus is inadequate against the targeted attacks firms face. EDR with managed detection and response provides the level of protection commensurate with the sensitivity of legal data.

Financial Services (GLBA/PCI-DSS)

FFIEC guidance requires financial institutions to maintain current malware protection on all systems. PCI-DSS Requirement 5 mandates anti-malware solutions on all systems commonly affected by malware. Financial regulators expect institutions to deploy solutions that address emerging threats, not just known signatures.

Retail / E-commerce (PCI-DSS)

PCI-DSS Requirement 5.1 requires anti-malware on all systems commonly affected by malicious software, particularly POS terminals and payment processing systems. Retail environments with distributed locations must ensure consistent endpoint protection across all sites, including seasonal or temporary locations.

Government / Defense (CMMC 2.0)

NIST 800-171 control SI.L2-3.14.2 requires malicious code protection at designated locations. CMMC assessors verify that endpoint protection is deployed on all endpoints within the CUI boundary. Government contractors handling CUI are increasingly expected to deploy EDR rather than traditional antivirus.

Implementation Steps

Deploy a modern EDR solution on all endpoints, including laptops, desktops, and servers

Configure centralized management to ensure consistent policy application and visibility across all devices

Enable automated response actions such as device isolation for high-confidence threat detections

Establish a process for reviewing and investigating EDR alerts within defined response timeframes

Ensure all endpoints are enrolled and reporting, with alerts for devices that lose connectivity or become non-compliant

Want to know how your organization measures up on this control?

Take the free assessment →