This repo provides a list of telemetry features from EDR products and other endpoint agents such as Sysmon broken down by category.
The main motivation behind this project is to enable security practitioners to compare and evaluate the telemetry potential from those tools while encouraging EDR vendors to be more transparent about the telemetry features they do provide to their users and customers.
Besides compliance, investigations and forensics benefits, rich log telemetry empowers cyber defense teams to develop custom hunting, detection and analytics capabilities tailored to their needs.
Read details about this project in the initial release blog post here.
There are many types of telemetry when it comes to Security Instrumentation.
Here we focus on agents or sensors generating telemetry in the form of log data, regardless of the format (json, key-value, csv), as long as the data is automatically generated and transmitted or streamed in near real-time.
Please check our FAQ page to know more and feel free to get in contact in case you cannot find an answer there.
In case you ware willing to contribute, please check the Contributions page.
The telemetry of the EDR products below could improve with time. The last_updated
field is the last time the data sources have been updated.
This might NOT always be up to date with the current telemetry capabilities of each product.
The data below do not represent the capability of each of the EDR products to detect or prevent a threat.
This is ONLY a comparison regarding the available telemetry for each product.
Some products, such as Elastic EDR, make additional telemetry available in free or paid modules.
Add-on modules, as well as signals, will not be taken into consideration for this project. Please read more about this on our FAQ page here.
This script evaluates and scores Endpoint Detection and Response (EDR) Solutions based on their capabilities.
It reads data from the main JSON file (EDR_telem.json
), which contains information about various EDRs and their features.
The script then calculates a score for each EDR based on the presence and absence of certain features, as well as the category of the feature.
This scoring algorithm allows us to quantitatively compare different EDRs based on their capabilities.
The higher the score, the more capable the EDR is. The weights can be adjusted as needed to reflect changes in the importance of different features or categories.
For more information click here.
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…