Considering various business workflows or deployment scope, printer manufacturers provide various solutions/configurations to counter misuse of resources, document security, along with ease of use. It is a challenge to track/flag a compromised device. Existing malicious activity detection approaches use either signature‐based detection or require a prior knowledge of specific IoC (indicators of compromise) characteristics or behaviours from manual identification based on network anomalies or SIEM (Security Information and Event Management) logs, etc. The proposed idea contributes to extended detection and response (XDR) within ecosystem of deployment. Solution is to keep monitoring all outgoing network traffic within the host, uniquely asse...