This repo provides a list of telemetry features from EDR products and other endpoint agents such as Sysmon broken down by category.
The main motivation behind this project is to enable security practitioners to compare and evaluate the telemetry potential from those tools while encouraging EDR vendors to be more transparent about the telemetry features they do provide to their users and customers.
Besides compliance, investigations and forensics benefits, rich log telemetry empowers cyber defense teams to develop custom hunting, detection and analytics capabilities tailored to their needs.
Read details about this project in the initial release blog post here.
There are many types of telemetry when it comes to Security Instrumentation.
Here we focus on agents or sensors generating telemetry in the form of log data, regardless of the format (json, key-value, csv), as long as the data is automatically generated and transmitted or streamed in near real-time.
Please check our FAQ page to know more and feel free to get in contact in case you cannot find an answer there.
In case you ware willing to contribute, please check the Contributions page.
The telemetry of the EDR products below could improve with time. The last_updated
field is the last time the data sources have been updated.
This might NOT always be up to date with the current telemetry capabilities of each product.
The data below do not represent the capability of each of the EDR products to detect or prevent a threat.
This is ONLY a comparison regarding the available telemetry for each product.
Some products, such as Elastic EDR, make additional telemetry available in free or paid modules.
Add-on modules, as well as signals, will not be taken into consideration for this project. Please read more about this on our FAQ page here.
This script evaluates and scores Endpoint Detection and Response (EDR) Solutions based on their capabilities.
It reads data from the main JSON file (EDR_telem.json
), which contains information about various EDRs and their features.
The script then calculates a score for each EDR based on the presence and absence of certain features, as well as the category of the feature.
This scoring algorithm allows us to quantitatively compare different EDRs based on their capabilities.
The higher the score, the more capable the EDR is. The weights can be adjusted as needed to reflect changes in the importance of different features or categories.
For more information click here.
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…