• GreyBeard@lemmy.one
    link
    fedilink
    English
    arrow-up
    0
    ·
    4 months ago

    I know there is a lot of marketing fluff, but yes, it is an EDR. Which means instead of just checking file signatures against a database if known bad stuff, it actually examines what applications do and makes a sort of judgement on if it is acting maliciously or not. I use a similar product. Although the false positives can sometimes be baffling, it honestly can catch a legit program misbehaving.

    On top of that, everything is logged. Every file, network connection, or registry key that every process on the computer touches is logged. That means when something happens, you can see the full and complete list of actions taken by the malicious system. Thus can actually be a drain on the computer, but modern systems handle it well enough.

      • GreyBeard@lemmy.one
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 months ago

        SentinelOne. They are more reseller/MSP friendly, but the product is very similar to CrowdStrike.

        • ditty@lemm.ee
          link
          fedilink
          English
          arrow-up
          0
          ·
          4 months ago

          We also use S1 and while it does often flag false positives, that’s a whole heck of a lot better than the alternative. Also I have not noticed it being very resource intensive.

          • GreyBeard@lemmy.one
            link
            fedilink
            English
            arrow-up
            0
            ·
            4 months ago

            It’s overhead is more subtle than task manager can tell. Because of all its watching and monitoring, it slows down applications themselves. Task take longer. Sometime it is by a trivial amount, but I’ve been able to measure a notable difference in some task with and without S1, even if task manager says all is well.