Evidence for Antivirus and EDR

Evidence TypeDescription / ExampleLocation / FormatRetention Period
Agent Status ReportSnapshot of all endpoints with agent status = “Active” and “Connected” from EDR console (e.g., CrowdStrike Falcon, Microsoft Defender for Endpoint). Filtered by last 24–48 hours.PDF or CSV export from console; stored in secure SharePoint or GRC platform3 years
Signature Update LogProof that signature definitions were updated within the last 24 hours (screenshot or log extract from EDR console).Console dashboard screenshot or automated report1 year
Patch Compliance ReportExport from the patch management tool + correlation with EDR update logsEmail thread or scanned,signed document3 years
Tabletop Exercise DocumentationEmail confirmation or signed approval form from IT, Security, and Management acknowledging receipt and review of the monthly report.Word/PDF template + meeting minutes3 years
KPI Report – % Endpoints ProtectedMonthly KPI dashboard showing: Total endpoints vs. active agents, coverage %, trend over time.BI dashboard (Power BI/Tableau) or Excel chart + dataOngoing + 3-year archive
Stakeholder Sign-off SheetEmail thread or scanned, signed documentReport showing OS/application patches applied before EDR agent updates (from SCCM, Intune, WSUS). Include date/time stamps.3 years
CMDB vs. EDR Inventory ReconciliationSpreadsheet or report comparing CMDB inventory vs. EDR endpoint list, with discrepancies resolved and remediated.Excel file with comments/audit trail2 years
Alert Logs / SIEM CorrelationSample alert logs showing detection → response → containment workflow triggered during tabletop or real event.SIEM export (e.g., Splunk, Sentinel) with timestamps and user actions1 year (or per retention policy)

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top