Endpoint Detection and Response (EDR) for Australian SMBs: Why Antivirus Isn't Enough
Most Australian small and medium businesses have antivirus installed. For a long time that was adequate. It no longer is.
Attackers targeting Australian businesses today — including those with fewer than 50 staff — are using techniques that traditional antivirus was never designed to detect. Signature-based tools cannot catch malware that lives entirely in memory, and they cannot flag the abuse of legitimate Windows tools that has become one of the most common attack methods in the country. The result is that businesses operating with antivirus as their primary endpoint defence may have a false sense of security: their tool is running, it is not reporting problems, and yet an attacker may already be active on the network.
Endpoint Detection and Response, or EDR, is the technology that fills this gap. It is now available to Australian SMBs at a price point that makes it accessible — and in many cases, businesses are already paying for it without realising it is available to them through their existing Microsoft 365 subscription.
This article explains what EDR is, why it matters, how it compares to what you may already have, and what a practical deployment looks like for an Australian business.
What Is Endpoint Detection and Response (EDR)?
An endpoint is any device that connects to your network: laptops, desktop computers, servers, smartphones, and tablets. Every device is a potential entry point for an attacker.
Traditional antivirus protects endpoints by maintaining a database of known malware signatures — digital fingerprints of malicious files. When a scan finds a match, the file is flagged or quarantined. This works reasonably well against old, documented malware. It fails against anything modified to avoid detection, anything that operates without creating a file, and anything that uses legitimate OS tools rather than malicious programs.
EDR takes a different approach. Rather than scanning files for known signatures, EDR runs continuously on every protected endpoint and records all activity: every process that starts, every file created or modified, every network connection made, every command executed. It builds a behavioural baseline for each device and continuously analyses activity against that baseline and against known attack patterns.
When EDR detects something suspicious — a PowerShell script spawning an unusual child process, a command consistent with credential theft, file operations matching ransomware encryption — it can take immediate automated action: isolating the affected device from the network, terminating the malicious process, or alerting security staff for investigation.
EDR also generates forensic telemetry: a detailed record of everything that occurred before, during, and after a detected event. This is critical for understanding how an attacker got in, what they accessed, and what remediation is required. For businesses subject to the Privacy Act's notifiable data breach scheme, this telemetry also provides the evidence base needed to assess whether a reportable breach has occurred and to support any mandatory notification to the OAIC.
Why Traditional Antivirus Is No Longer Sufficient
Understanding why antivirus alone is inadequate requires understanding how modern attacks actually work.
Signature evasion is trivial. Modifying malware to change its signature — a process that can be largely automated — is enough to bypass signature-based detection entirely. Every major ransomware group routinely produces new variants to evade antivirus tools. The ACSC's annual cyber threat reports have consistently noted that Australian businesses are being targeted with modified or novel malware variants that evade traditional defences.
Living-off-the-land attacks use tools already on your computer. PowerShell, Windows Management Instrumentation (WMI), certutil, and dozens of other built-in Windows utilities have legitimate administrative uses — and they are also effective attack tools. An attacker who uses PowerShell to download a payload, establish persistence, and exfiltrate data introduces no malicious software that antivirus can scan. Antivirus cannot flag the abuse of built-in OS tools.
Fileless malware operates entirely in memory. A growing category of malware never writes a file to disk. It executes in system memory using legitimate processes as hosts. Because antivirus scans files and there is no file to scan, it sees nothing.
Dwell time is the attacker's greatest advantage. In antivirus-only environments, attackers who gain initial access can remain undetected for weeks or months. They use this time to establish persistence, map the environment, steal credentials, and position themselves to deploy ransomware when ready.
ACSC data on ransomware incidents shows a consistent pattern: in the majority of cases, the attacker was present for days to weeks before the final payload was deployed. The encryption event a business notices is rarely the start of the attack — it is the end of a prolonged intrusion, during which data has likely already been exfiltrated and a Privacy Act notifiable breach triggered.
This is the environment antivirus was not built to handle. EDR was.
What EDR Actually Does — Key Capabilities
| Capability | What It Does | Why It Matters |
|---|---|---|
| Continuous monitoring | Records all process activity, file changes, registry modifications, and network connections on every endpoint | Creates the behavioural baseline needed to detect anomalies — no gap in visibility |
| Behavioural detection | Flags activity patterns associated with attacks, such as PowerShell spawning unusual child processes or mass file encryption | Catches novel malware, fileless attacks, and living-off-the-land techniques that antivirus cannot see |
| Automated response | Isolates the affected endpoint from the network and kills malicious processes | Contains damage within seconds, before an attack can spread laterally |
| Threat hunting | Allows security analysts to query historical telemetry for indicators of compromise | Finds attackers who evaded automated alerts — only possible because the telemetry exists |
| Forensic telemetry | Records a complete timeline of events before, during, and after a security incident | Supports incident investigation and OAIC notifiable data breach assessments |
| Integration with SIEM and SOC | Feeds alerts and telemetry to a security operations centre for analyst review | Enables human oversight of automated detections, reducing false positives |
The combination of automated response and forensic telemetry is what distinguishes EDR from both antivirus (which lacks both) and basic monitoring tools (which alert but cannot automatically contain a threat).
EDR vs Antivirus vs XDR — What's the Difference?
The endpoint security market has accumulated acronyms that can confuse non-technical buyers. Here is a plain-English explanation of the four terms you are most likely to encounter.
Antivirus (AV)
Signature-based detection of known malicious files. Scans files on disk and in some cases email attachments or web downloads. Minimal automated response capability beyond quarantining a detected file. Cannot detect fileless malware, living-off-the-land attacks, or novel variants not yet in the signature database. For most businesses today, antivirus alone is insufficient.
EDR (Endpoint Detection and Response)
Continuously monitors endpoint behaviour, detects anomalous activity patterns, and provides automated containment and forensic telemetry. Operates on the individual device and is not dependent on signature matching. Modern EDR platforms include antivirus capability as a subset, so deploying EDR does not require maintaining a separate antivirus product. EDR is the current baseline expectation for businesses that take endpoint security seriously.
XDR (Extended Detection and Response)
Extends the EDR model beyond the endpoint to encompass email, network traffic, identity systems, and cloud workloads. XDR correlates signals across all attack surfaces to identify threats not visible from endpoint data alone. For example, a suspicious Azure Active Directory login correlated with an unusual outbound connection and a PowerShell anomaly on the same device may trigger a detection that no single signal alone would catch. XDR is most relevant for businesses with complex multi-cloud and on-premises environments.
MDR (Managed Detection and Response)
Not a technology but a service. An MDR provider operates an EDR or XDR platform on your behalf and provides 24/7 security operations centre coverage — human analysts monitoring your environment, investigating alerts, and responding to confirmed threats. For most Australian SMBs without in-house security staff, MDR is the most practical model for achieving genuine EDR capability.
EDR for Australian SMBs — Practical Options
EDR is no longer an enterprise-only tool. Several credible options exist at price points appropriate for smaller businesses.
Microsoft Defender for Business is included in the Microsoft 365 Business Premium licence tier. It is a full EDR platform — not basic antivirus — and most Australian SMBs using M365 are already paying for a licence that may include it. For businesses already on Business Premium, deploying EDR is a configuration exercise rather than a new purchase. Defender for Business includes continuous monitoring, behavioural detection, automated investigation and response, and integration with the Microsoft security portal. Combined with patch management and device compliance policies through Intune, it provides a strong baseline security posture.
Microsoft Defender for Endpoint Plan 2 is the enterprise-grade tier. It adds advanced threat hunting, deeper forensic tooling, and broader integration with Microsoft Sentinel. Appropriate for larger organisations or those in regulated industries; for most businesses with fewer than 50 staff, Defender for Business is sufficient.
CrowdStrike Falcon is widely used in Australian regulated industries including financial services and healthcare. Falcon Go and Falcon Pro provide strong EDR capability with an intuitive management console and well-regarded threat intelligence integration. It carries additional cost compared to Defender for Business but is common in environments requiring vendor diversity or operating outside the Microsoft security ecosystem.
SentinelOne Singularity is known for its autonomous response capabilities — detecting and responding to threats without requiring human intervention or cloud connectivity. It is frequently used as the underlying platform in managed EDR service offerings.
MDR services are the most practical path for SMBs without security staff. Deploying EDR without anyone reviewing the alert stream is substantially less effective than a managed service with active analyst coverage. The key questions when evaluating MDR providers are whether the service includes 24/7 monitoring, what the guaranteed response time is, and whether the provider can take automated or guided action to contain threats on your behalf.
EDR and the ACSC Essential Eight
The Australian Cyber Security Centre's Essential Eight is the most widely referenced security framework for Australian businesses, outlining eight mitigation strategies across three maturity levels. Compliance is increasingly expected by insurers, enterprise clients, and government procurement processes.
EDR is not named explicitly as an Essential Eight control, but it directly supports several of them and is considered best practice at Maturity Level 2 and above.
Application control — one of the Essential Eight's prioritised mitigations — requires that only approved applications can execute on endpoints. EDR platforms including Microsoft Defender for Business include application control and allowlisting capabilities that contribute to meeting this control. EDR's ability to detect and alert on privilege escalation attempts also supports the Essential Eight's requirement to restrict administrative privileges.
EDR cannot substitute for patch management, but effective EDR deployment typically occurs alongside a broader endpoint management programme including automated patch deployment. When these controls are combined with multi-factor authentication, businesses significantly reduce both the likelihood of initial compromise and the damage if one occurs.
For businesses seeking cyber insurance, insurers are increasingly distinguishing between basic antivirus and EDR when assessing risk and setting premiums. Having EDR deployed — particularly via Microsoft Defender for Business under a well-configured M365 Business Premium environment — is increasingly a baseline expectation rather than a differentiator. For businesses seeking assurance from enterprise clients or government agencies, demonstrating EDR alongside Essential Eight progress is becoming relevant to procurement and vendor assessment.
What to Look for When Evaluating EDR for Your Business
Coverage across all endpoint types. Most EDR platforms provide strong Windows coverage; macOS, iOS, and Android coverage varies and should be confirmed if those platforms are in your fleet.
Automated response capability. Can the platform isolate a device without human intervention? Ransomware propagation can outpace human response times, and a platform that waits for a click before acting may allow significant lateral spread in the gap.
Integration with your existing stack. If your business uses Microsoft 365, a platform integrating natively with Defender for Business, Intune, and Entra ID will typically be simpler to deploy and manage than a separate tool with its own console and data pipeline.
Managed option availability. For businesses without in-house security staff, the ability to add managed monitoring is essential. Confirm whether the vendor's platform can be run by an MDR provider.
Reporting and visibility. Can you see what is happening across your environment without needing a security analyst to interpret raw telemetry? Meaningful reporting that surfaces threats detected, devices with issues, and policy compliance is important for business owners who need visibility without needing to become security experts.
Australian data residency. Security telemetry can contain sensitive information about your business and users. Microsoft's Australian data centres provide local residency for Defender telemetry under Business Premium configurations. For regulated businesses or those with data sovereignty requirements, this warrants confirmation before selecting a platform.
How Pickle Deploys and Manages EDR for Australian SMBs
Pickle's managed IT services for Australian SMBs include endpoint security deployment and ongoing management as a core component. For businesses on Microsoft 365 Business Premium, Pickle configures and manages Microsoft Defender for Business as part of a fully managed endpoint security programme — covering policy deployment, alert monitoring, automated response configuration, and regular reporting.
For businesses on a lower M365 licence tier, Pickle can assess whether upgrading to Business Premium is appropriate. In many cases the upgrade cost is significantly less than purchasing a separate EDR product, and Business Premium includes several other security and productivity features that justify the step up on their own.
For businesses with higher risk profiles, regulatory requirements, or a need for 24/7 SOC-backed managed detection and response, Pickle can assess and deploy MDR options suited to the organisation's size and requirements.
To discuss endpoint security for your business, call Pickle on 1300 688 588 or email [email protected].
Frequently Asked Questions
Q: Does Microsoft 365 include EDR?
A: It depends on your licence tier. Microsoft Defender for Business — a full EDR platform — is included in Microsoft 365 Business Premium. It is not included in Business Basic or Business Standard, which provide only basic antivirus. Upgrading to Business Premium unlocks EDR capability along with Intune device management and Azure AD Premium. If you are unsure which tier you are on, your IT provider can confirm this quickly.
Q: Is EDR worth it for a small business with fewer than 20 staff?
A: Yes — and it is often already within reach. If your business is on Microsoft 365 Business Premium, EDR capability is already included and simply needs to be configured. For businesses on lower tiers, the cost of upgrading should be weighed against the risk of operating without EDR. The ACSC consistently notes that small businesses are targeted because they are less likely to have advanced defences in place. The cost of a single ransomware incident — downtime, recovery, breach notification obligations, and reputational damage — far exceeds the annual cost of EDR protection.
Q: What is the difference between EDR and MDR?
A: EDR is the technology: the software that monitors endpoints, detects threats, and provides automated response capability. MDR is a service: a provider that operates an EDR or XDR platform on your behalf, with human analysts monitoring alerts around the clock. Most Australian SMBs lack in-house staff to monitor EDR alerts and investigate incidents. For those businesses, deploying EDR without a managed service risks having an effective platform that nobody is actively watching. MDR combines the technology with the expertise needed to act on what it finds.
Q: How does EDR know what is a threat vs normal activity?
A: EDR platforms use several techniques in combination. They maintain databases of known attack behaviours — credential theft patterns, lateral movement techniques, ransomware preparation sequences — and flag matching activity. They build a behavioural baseline for each endpoint over time and alert on significant deviations. They also apply machine learning models trained on large volumes of attack data to identify novel threats that do not match known patterns. Well-configured EDR platforms generate relatively few false positives because they combine multiple signals before triggering an alert. Human analyst review in a managed service adds a further layer of judgement.
Q: Can EDR stop a ransomware attack in progress?
A: In many cases, yes. The rapid, systematic encryption of large numbers of files is a distinctive pattern that EDR can identify quickly. When detected, the platform can automatically isolate the affected device from the network, preventing spread to shared drives and other endpoints, and terminate the encryption process. Ransomware can encrypt thousands of files per minute, so automated containment measured in seconds can limit damage substantially. EDR cannot reverse encryption that has already occurred, which is why tested backups remain an essential separate control. The combination of EDR for detection and containment plus clean and tested backups for recovery is current best practice for ransomware resilience for Australian SMBs.