The Components of an EDRThe AgentTelemetrySensorsDetectionsThe Challenges of EDR EvasionIdentifying Malicious ActivityConsidering ContextApplying Brittle vs. Robust DetectionsExploring Elastic Detection RulesAgent DesignBasicIntermediateAdvancedTypes of BypassesLinking Evasion Techniques: An Example AttackConclusion