Skip to main content

EDR & Endpoint Management

The EDR (Endpoint Detection and Response) page provides visibility into connected endpoint inventory with capabilities for isolation, scanning, and live response.

Runtime Truth

AuroraSOC only shows showcase EDR endpoints in dummy mode. In dry_run and real modes, the page now derives endpoint rows from live host telemetry correlated with persisted SIEM and network-attack data. AuroraSOC still does not fabricate endpoint enforcement state outside dummy mode, so isolate and scan stay disabled until a dedicated live EDR integration is connected.

Endpoint Overview

The diagram below is conceptual. Today, dry_run and real mode inventory can already surface the AuroraSOC host from live telemetry correlation, while full isolate and scan enforcement still follows the intended integration path below.

Endpoint Table

ColumnDescription
HostnameSystem hostname
OSOperating system and version
IP AddressPrimary network address
Group / SourceInventory grouping or telemetry source that produced the row
Agent / IntegrationConnected EDR agent version or the live telemetry integration source
Risk ScoreCalculated risk (0–100)
Last ActivityMost recent live telemetry timestamp surfaced for the endpoint
IsolationIsolated / Connected
Open AlertsCount of unresolved alerts for this endpoint

Key Actions

Isolation and scan actions follow the same runtime truth as the endpoint table:

  • dummy mode: actions operate on showcase endpoints only.
  • dry_run mode: the page can show live host telemetry inventory, but it does not simulate endpoint enforcement.
  • real mode: the page can show live host telemetry inventory, but it does not fabricate endpoint actions.

Isolate Endpoint

Network isolation is a critical containment action:

Irreversible Action

Endpoint isolation cuts all network access except the EDR management channel. This will disconnect users and stop running services. Always verify the target hostname before executing.

Scan Endpoint

Trigger an on-demand security scan:

  • Quick Scan — Running processes, network connections, scheduled tasks
  • Full Scan — Complete filesystem scan, registry analysis, memory inspection
  • IOC Scan — Search for specific indicators (hashes, IPs, domains, file paths)

Live Response

For advanced investigation, launch a live response session:

  • Execute queries against the endpoint
  • Collect specific files as evidence
  • Enumerate running processes and network connections
  • Search for indicators across filesystem
  • Retrieve event logs

Endpoint Risk Scoring

Each endpoint receives a calculated risk score based on:

FactorWeightDescription
Open Alerts30%Count and severity of unresolved alerts
Patch Status25%Missing security updates
Configuration20%Deviation from hardening baseline
User Risk15%Risk score of logged-in user(s)
Historical10%Past incident history

Endpoints with risk scores above 75 are automatically flagged for review.

EDR Tools Available

The Endpoint Security agent has access to two primary MCP tools:

IsolateEndpoint

class IsolateEndpoint(AuroraTool):
"""Network-isolate a compromised host via the EDR platform."""
# Supports: hostname, isolation_type (full/selective), reason
# Returns: isolation status, timestamp, reversal instructions

ScanEndpoint

class ScanEndpoint(AuroraTool):
"""Execute an on-demand scan across endpoint telemetry."""
# Supports: hostname, scan_type (quick/full/ioc), targets
# Returns: findings, risk assessment, recommended actions

Both tools are invoked by AI agents during automated investigation but can only be triggered manually through the dashboard once a dedicated live EDR integration is connected.