Endpoint Detection and Response (EDR)

Purpose and Overview

The Endpoint Detection and Response (EDR) service at Miami University provides advanced cybersecurity protection for university-owned devices, safeguarding institutional data and systems from cyber threats. EDR tools continuously monitor devices for suspicious activity and respond rapidly to potential security incidents, even in remote work environments.

Features and Benefits

Features:

  • Next-Generation Antivirus: Proactive malware detection and prevention.
  • Threat Intelligence: Real-time monitoring and response based on global threat intelligence.
  • 24/7 Detection and Response: Around-the-clock monitoring by security operations teams.
  • Behavioral Analysis: Detection of abnormal activities and potential intrusions.
  • Automated Response: Isolation of compromised devices to prevent further damage.

Benefits:

  • Enhanced security posture with continuous monitoring.
  • Rapid incident response to minimize disruptions.
  • Compliance with institutional security policies and standards.
  • Protection against malware, ransomware, and credential theft.
  • Visibility into device health and potential vulnerabilities.

Service Boundaries and Constraints

  • EDR is mandatory for all Miami University-owned devices, including desktops, laptops, and servers.
  • Compatibility may be limited for older operating systems and specialized devices.
  • Some legacy or specialized equipment may not support EDR deployment.

Eligibility and Audience

This service is integrated into our Institutional End User Computing service automatically for any devices owned and deployed by the university

Getting Started and Support

  1. Security Guidelines: Review best practices and security policies for endpoint protection.
  2. Report Security Issues: If you suspect a compromised device, report it to IT Help at miamioh.edu/itchat or by calling 513-529-7900

For assistance, visit miamioh.edu/itchat or contact IT Help at 513-529-7900