The choice of cybersecurity tools, such as an EDR, must be consistent with the technical context, depending on whether an…