Good morning--
Over the years one of the concerns that our security team has had is around the use of "EDR bypass". If you're not familiar, EDR bypass is just as it sounds: hackers deploy tools to either turn off your Endpoint Detection and Response entirely or greatly diminish it's detection capabilities.
Today I came across a post from a trusted partner with a host of EDR bypass IOC's.
My question is two-fold:
1. What is the efficacy / practicality of building out a custom detection using only IOC's ( mostly hashes and .exes) in Chronicle? Is detecting this type of activity better accomplished using our hunting platform?
2. If building out a detection is the proper path, is it as easy as creating a list of the IOC's I'd like triggered on and then building the detecting to reference that list?
Thank you in advance for any help your able to provide.
