EDR Telemetry Categories

Understanding the different types of endpoint data collected for threat detection

tree

Process Execution

Monitors and analyzes process creation and execution across endpoints

Purpose

This category focuses on the telemetry associated with the lifecycle and manipulation of processes on the system. It is foundational for establishing visibility into execution flow, child-parent relationships, and process-based techniques such as injection or tampering.

Data Collected

Process creation events, process termination, process access, image/library loading, remote thread creation, process tampering activity, and process call stacks.

Security Benefits

Provides the foundation for execution visibility. Used to map process trees, identify suspicious binaries, track execution lineage, and detect process injection techniques.

Detection Examples

Malicious process creation, suspicious parent-child relationships, process injection, code execution, and lateral movement techniques.

Network Connections

Tracks inbound and outbound network connections from endpoints

Purpose

This category tracks outbound and inbound connections, name resolution, and download behavior to establish context around external communication and potential command-and-control.

Data Collected

TCP connections, UDP connections, URLs accessed, DNS queries, and file downloads from external sources.

Security Benefits

Allows tracking of command-and-control infrastructure, lateral movement via network connections, and data exfiltration attempts.

Detection Examples

Malware beaconing, suspicious domain access, data exfiltration, and lateral movement through the network.

File Operations

Monitors file creation, modification, and deletion activities

Purpose

This category tracks file-level interactions which are essential for uncovering persistence mechanisms, staging activity, payload delivery, and destructive actions.

Data Collected

File creation, file opening, file deletion, file modification, and file renaming events.

Security Benefits

Identifies artifact creation associated with malware staging, configuration drops, script deployment, and potential evidence wiping.

Detection Examples

Ransomware file encryption, malicious script creation, configuration file tampering, and data staging for exfiltration.

Registry Changes

Tracks modifications to the Windows registry

Purpose

This category includes telemetry on registry operations that can indicate persistence mechanisms, configuration changes, and attacker tooling setup.

Data Collected

Registry key/value creation, modification, and deletion events.

Security Benefits

Supports detection of persistence setup, software installation behavior, and malicious tampering with system configuration.

Detection Examples

Autorun registry modifications, malware persistence mechanisms, and system configuration tampering.

User Account Activity

Monitors changes to local user accounts and authentication events

Purpose

This category provides insight into changes to local user accounts and authentication events. Useful for privilege escalation, persistence, and lateral movement tracking.

Data Collected

Local account creation, modification, deletion, login events, and logoff events.

Security Benefits

Identifies unauthorized access setup, privilege escalation attempts, and suspicious authentication patterns.

Detection Examples

Creation of rogue accounts, privilege escalation through group membership changes, and anomalous login activity.

Hash Algorithms

Fingerprinting of files or memory regions using hashing algorithms

Purpose

This category focuses on the fingerprinting of files or memory regions using hashing algorithms to allow deduplication, integrity checks, and malware correlation.

Data Collected

MD5, SHA1, SHA256, and IMPHASH values of files and memory regions.

Security Benefits

Enables matching against known threat indicators and helps identify malware families through import table similarity.

Detection Examples

Identification of known malicious files, grouping of malware variants, and integrity verification of system files.

Scheduled Task Activity

Monitors creation and modification of scheduled tasks

Purpose

This category captures telemetry related to scheduled tasks, a common persistence and execution mechanism.

Data Collected

Scheduled task creation, modification, and deletion events.

Security Benefits

Provides insight into persistence mechanisms and automated execution setups.

Detection Examples

Malware establishing persistence through scheduled tasks, tampering with existing tasks, and cleanup activities.

Service Activity

Tracks Windows service changes for persistence or execution

Purpose

This category tracks Windows service changes that are often used for persistence or execution.

Data Collected

Service creation, modification, and deletion events.

Security Benefits

Useful for tracking persistent system-level execution points and detecting malicious service configurations.

Detection Examples

Malware installing backdoor services, modifying legitimate services for malicious purposes, and service-based persistence mechanisms.

Driver/Module Activity

Monitors kernel-level drivers and modules

Purpose

This category monitors kernel-level drivers and modules that may affect the stability, security, or integrity of the system.

Data Collected

Driver loading, modification, and unloading events.

Security Benefits

Key for rootkit detection and monitoring signed/unsigned driver behavior.

Detection Examples

Rootkit installation, kernel-level exploits, and driver tampering for persistence or privilege escalation.

Device Operations

Tracks physical and virtual device activities

Purpose

This category provides telemetry related to physical and virtual devices, especially removable or mountable media.

Data Collected

Virtual disk mount events, USB device mount and unmount events.

Security Benefits

Monitors for data exfiltration, unauthorized device usage, and staging behavior.

Detection Examples

Data exfiltration via USB devices, malware delivery through removable media, and use of virtual disks for hiding malicious content.

Named Pipe Activity

Monitors inter-process communication channels

Purpose

Named pipes are a common method for inter-process communication (IPC) and are often used in lateral movement and evasion.

Data Collected

Pipe creation and connection events.

Security Benefits

Helps identify malicious IPC channels, staging behavior, and post-exploitation frameworks.

Detection Examples

Malware command and control channels, lateral movement techniques, and post-exploitation activity.

EDR SysOps

Tracks EDR agent lifecycle and health

Purpose

This category includes operational telemetry from the EDR agent itself to track its lifecycle and health.

Data Collected

Agent start, stop, install, uninstall, keep-alive, and error events.

Security Benefits

Critical for detecting tampering or evasion attempts and ensuring continuous protection.

Detection Examples

EDR tampering, agent disabling, and security control evasion techniques.

WMI Activity

Monitors Windows Management Instrumentation activity

Purpose

This category focuses on Windows Management Instrumentation activity, which is often abused for persistence, execution, and reconnaissance.

Data Collected

WMI event consumer to filter binding, event consumer creation/modification, and event filter creation/modification.

Security Benefits

Crucial for understanding execution triggers and persistence setup through WMI.

Detection Examples

Fileless malware persistence, WMI-based lateral movement, and stealthy execution techniques.

BITS Jobs Activity

Tracks Background Intelligent Transfer Service operations

Purpose

This category covers telemetry related to Background Intelligent Transfer Service (BITS), a mechanism sometimes used by attackers for stealthy downloads or task scheduling.

Data Collected

BITS job creation, update, and execution events.

Security Benefits

Helps detect covert tasking and stealthy download operations.

Detection Examples

Malware using BITS for stealthy downloads, persistence through BITS jobs, and covert command and control channels.

PowerShell Activity

Monitors PowerShell script execution

Purpose

This category provides visibility into PowerShell script execution, an essential component of modern threat actor toolkits.

Data Collected

PowerShell script-block activity, including raw script content and metadata.

Security Benefits

Provides deep inspection capability of executed scripts, even those that are obfuscated or multi-stage.

Detection Examples

Fileless malware, obfuscated PowerShell attacks, credential theft scripts, and post-exploitation frameworks.

Group Policy Modification

Tracks changes to group policy objects or local policy settings

Purpose

This event offers supplementary visibility into critical system-level changes or access points.

Data Collected

Changes made to group policy objects or local policy settings.

Security Benefits

Important for tracking unauthorized configuration changes or policy abuse.

Detection Examples

Security policy weakening, privilege escalation through policy changes, and enterprise-wide malicious configuration deployment.