EDR Telemetry Categories
Understanding the different types of endpoint data collected for threat detection
Process Execution
Monitors and analyzes process creation and execution across endpoints
Purpose
This category focuses on the telemetry associated with the lifecycle and manipulation of processes on the system. It is foundational for establishing visibility into execution flow, child-parent relationships, and process-based techniques such as injection or tampering.
Data Collected
Process creation events, process termination, process access, image/library loading, remote thread creation, process tampering activity, and process call stacks.
Security Benefits
Provides the foundation for execution visibility. Used to map process trees, identify suspicious binaries, track execution lineage, and detect process injection techniques.
Detection Examples
Malicious process creation, suspicious parent-child relationships, process injection, code execution, and lateral movement techniques.
Network Connections
Tracks inbound and outbound network connections from endpoints
Purpose
This category tracks outbound and inbound connections, name resolution, and download behavior to establish context around external communication and potential command-and-control.
Data Collected
TCP connections, UDP connections, URLs accessed, DNS queries, and file downloads from external sources.
Security Benefits
Allows tracking of command-and-control infrastructure, lateral movement via network connections, and data exfiltration attempts.
Detection Examples
Malware beaconing, suspicious domain access, data exfiltration, and lateral movement through the network.
File Operations
Monitors file creation, modification, and deletion activities
Purpose
This category tracks file-level interactions which are essential for uncovering persistence mechanisms, staging activity, payload delivery, and destructive actions.
Data Collected
File creation, file opening, file deletion, file modification, and file renaming events.
Security Benefits
Identifies artifact creation associated with malware staging, configuration drops, script deployment, and potential evidence wiping.
Detection Examples
Ransomware file encryption, malicious script creation, configuration file tampering, and data staging for exfiltration.
Registry Changes
Tracks modifications to the Windows registry
Purpose
This category includes telemetry on registry operations that can indicate persistence mechanisms, configuration changes, and attacker tooling setup.
Data Collected
Registry key/value creation, modification, and deletion events.
Security Benefits
Supports detection of persistence setup, software installation behavior, and malicious tampering with system configuration.
Detection Examples
Autorun registry modifications, malware persistence mechanisms, and system configuration tampering.
User Account Activity
Monitors changes to local user accounts and authentication events
Purpose
This category provides insight into changes to local user accounts and authentication events. Useful for privilege escalation, persistence, and lateral movement tracking.
Data Collected
Local account creation, modification, deletion, login events, and logoff events.
Security Benefits
Identifies unauthorized access setup, privilege escalation attempts, and suspicious authentication patterns.
Detection Examples
Creation of rogue accounts, privilege escalation through group membership changes, and anomalous login activity.
Hash Algorithms
Fingerprinting of files or memory regions using hashing algorithms
Purpose
This category focuses on the fingerprinting of files or memory regions using hashing algorithms to allow deduplication, integrity checks, and malware correlation.
Data Collected
MD5, SHA1, SHA256, and IMPHASH values of files and memory regions.
Security Benefits
Enables matching against known threat indicators and helps identify malware families through import table similarity.
Detection Examples
Identification of known malicious files, grouping of malware variants, and integrity verification of system files.
Scheduled Task Activity
Monitors creation and modification of scheduled tasks
Purpose
This category captures telemetry related to scheduled tasks, a common persistence and execution mechanism.
Data Collected
Scheduled task creation, modification, and deletion events.
Security Benefits
Provides insight into persistence mechanisms and automated execution setups.
Detection Examples
Malware establishing persistence through scheduled tasks, tampering with existing tasks, and cleanup activities.
Service Activity
Tracks Windows service changes for persistence or execution
Purpose
This category tracks Windows service changes that are often used for persistence or execution.
Data Collected
Service creation, modification, and deletion events.
Security Benefits
Useful for tracking persistent system-level execution points and detecting malicious service configurations.
Detection Examples
Malware installing backdoor services, modifying legitimate services for malicious purposes, and service-based persistence mechanisms.
Driver/Module Activity
Monitors kernel-level drivers and modules
Purpose
This category monitors kernel-level drivers and modules that may affect the stability, security, or integrity of the system.
Data Collected
Driver loading, modification, and unloading events.
Security Benefits
Key for rootkit detection and monitoring signed/unsigned driver behavior.
Detection Examples
Rootkit installation, kernel-level exploits, and driver tampering for persistence or privilege escalation.
Device Operations
Tracks physical and virtual device activities
Purpose
This category provides telemetry related to physical and virtual devices, especially removable or mountable media.
Data Collected
Virtual disk mount events, USB device mount and unmount events.
Security Benefits
Monitors for data exfiltration, unauthorized device usage, and staging behavior.
Detection Examples
Data exfiltration via USB devices, malware delivery through removable media, and use of virtual disks for hiding malicious content.
Named Pipe Activity
Monitors inter-process communication channels
Purpose
Named pipes are a common method for inter-process communication (IPC) and are often used in lateral movement and evasion.
Data Collected
Pipe creation and connection events.
Security Benefits
Helps identify malicious IPC channels, staging behavior, and post-exploitation frameworks.
Detection Examples
Malware command and control channels, lateral movement techniques, and post-exploitation activity.
EDR SysOps
Tracks EDR agent lifecycle and health
Purpose
This category includes operational telemetry from the EDR agent itself to track its lifecycle and health.
Data Collected
Agent start, stop, install, uninstall, keep-alive, and error events.
Security Benefits
Critical for detecting tampering or evasion attempts and ensuring continuous protection.
Detection Examples
EDR tampering, agent disabling, and security control evasion techniques.
WMI Activity
Monitors Windows Management Instrumentation activity
Purpose
This category focuses on Windows Management Instrumentation activity, which is often abused for persistence, execution, and reconnaissance.
Data Collected
WMI event consumer to filter binding, event consumer creation/modification, and event filter creation/modification.
Security Benefits
Crucial for understanding execution triggers and persistence setup through WMI.
Detection Examples
Fileless malware persistence, WMI-based lateral movement, and stealthy execution techniques.
BITS Jobs Activity
Tracks Background Intelligent Transfer Service operations
Purpose
This category covers telemetry related to Background Intelligent Transfer Service (BITS), a mechanism sometimes used by attackers for stealthy downloads or task scheduling.
Data Collected
BITS job creation, update, and execution events.
Security Benefits
Helps detect covert tasking and stealthy download operations.
Detection Examples
Malware using BITS for stealthy downloads, persistence through BITS jobs, and covert command and control channels.
PowerShell Activity
Monitors PowerShell script execution
Purpose
This category provides visibility into PowerShell script execution, an essential component of modern threat actor toolkits.
Data Collected
PowerShell script-block activity, including raw script content and metadata.
Security Benefits
Provides deep inspection capability of executed scripts, even those that are obfuscated or multi-stage.
Detection Examples
Fileless malware, obfuscated PowerShell attacks, credential theft scripts, and post-exploitation frameworks.
Group Policy Modification
Tracks changes to group policy objects or local policy settings
Purpose
This event offers supplementary visibility into critical system-level changes or access points.
Data Collected
Changes made to group policy objects or local policy settings.
Security Benefits
Important for tracking unauthorized configuration changes or policy abuse.
Detection Examples
Security policy weakening, privilege escalation through policy changes, and enterprise-wide malicious configuration deployment.