Further reading
To go into even further detail about some of the topics in this chapter, you can refer to the following online material:
- Fabian Bader’s research into tamper protection was mentioned in this chapter, and you can find that blog and an incredible level of depth into tamper protection here: cloudbrothers.info/en/current-limits-defender-av-tamper-protection
- Microsoft’s official blog has some additional details on how cloud-delivered protection comes together to benefit MDAV: microsoft.com/security/blog/2019/06/24/inside-out-get-to-know-the-advanced-technologies-at-the-core-of-microsoft-defender-atp-next-generation-protection
- This article, published in the Microsoft TechCommunity, provides an interesting real-life example of how EDR in block mode defends against threats: techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/introducing-edr-in-block-mode-stopping-attacks-in-their-tracks/ba-p/1596617