Skip to main content

Telemetry Requirements

Purpose

Define the logs, fields, retention, and quality needed before a hunt or detection can be trusted.

Practitioner-Level Explanation

Detection quality depends on telemetry quality. A good CTI-derived detection states exactly which data sources and fields are required, what retention is needed, and where visibility gaps exist. Write telemetry requirements before detection logic, not after. Logic written against fields that do not exist is not detection — it is a placeholder.

Field-Level Telemetry Reference

The tables below list the data sources most commonly required for endpoint, network, identity, and cloud hunts. Every field must be validated in your environment before it appears in production detection logic.

Windows Security Event Log

Windows Security Event Log: Key Fields Reference

FieldExample ValueRequired For
EventID4624, 4688, 4698, 4776Logon, process creation, scheduled task, credential validation
SubjectUserNameDOMAIN\userIdentity correlation
TargetUserNameDOMAIN\victimLateral movement, privilege use
ProcessNameC:\Windows\System32\cmd.exeProcess execution
CommandLinepowershell.exe -enc ...Command-line behavior (requires audit policy enabled)
IpAddress10.1.2.3Remote logon source
LogonType3, 10Network vs. remote interactive

Common gap: CommandLine is not logged by default on most Windows versions. Requires Audit Process Creation with command-line inclusion via GPO or registry.

Sysmon (System Monitor)

Sysmon Event Reference

EventIDMeaningKey Fields
1Process CreateCommandLine, ParentImage, ParentCommandLine, Hashes, User
3Network ConnectionImage, DestinationIp, DestinationPort, Protocol
7Image LoadImage, ImageLoaded, Signed, SignatureStatus
11File CreateTargetFilename, Image
12/13Registry Create/SetTargetObject, Details
22DNS QueryQueryName, QueryResults, Image
23File DeleteTargetFilename

Common gap: Sysmon is not deployed by default. Configuration must enable the required event types and filters. Noisy rules without filters will generate excessive volume and cause tuning paralysis.

EDR Process Telemetry (platform-generic)

EDR Process Telemetry Reference (1)

EDR Process Telemetry Reference (2)

FieldNotes
process_nameExecutable filename
process_pathFull executable path
command_lineFull argument string
parent_process_nameParent executable
parent_command_lineParent argument string
userExecuting identity
hostEndpoint hostname
timestampUTC timestamp of event
hash_sha256File hash for threat-intel lookup

Common gap: Parent process chain may not be available in all EDR configurations. Verify whether your EDR records grandparent process context.

DNS Telemetry

DNS Telemetry Reference

FieldNotes
query_nameQueried domain name
query_typeA, AAAA, MX, TXT, CNAME
response_codeNOERROR, NXDOMAIN, SERVFAIL
source_ipQuerying host
timestampQuery time (UTC)
answerResolved IP or CNAME

Common gap: DNS logging is frequently incomplete. Recursive resolvers may not log internal resolution. Encrypted DNS (DoH, DoT) bypasses traditional DNS logging entirely.

Proxy / Web Gateway

Proxy / Web Gateway Telemetry Reference

FieldNotes
urlFull request URL
domainDestination domain
methodGET, POST, CONNECT
user_agentBrowser or tool identifier
source_ipRequesting host
destination_ipResolved server IP
response_codeHTTP response code
bytes_out / bytes_inData volume
timestampRequest time (UTC)

Common gap: TLS inspection may not be enabled, making encrypted channel contents invisible. User-agent fields can be spoofed and should not be used as primary detection criteria.

Identity Provider (Entra ID / Okta / similar)

Identity Provider Telemetry Reference

FieldNotes
user_principal_nameAuthenticating identity
app_display_nameTarget application
ip_addressSource IP of authentication
location_city / countryGeographic context
risk_levelIdP-assigned risk score
mfa_resultMFA challenge outcome
conditional_access_resultPolicy enforcement outcome
timestampAuthentication time (UTC)

Common gap: Legacy authentication protocols may not log MFA result or conditional access enforcement.

Cloud Audit Logs (AWS CloudTrail / Azure Monitor / GCP Audit Logs)

Cloud Audit Logs Reference

FieldNotes
eventName / operationNameAPI call or operation
userIdentity / principalNameCalling identity
sourceIPAddressSource IP
userAgentSDK, CLI, or console identifier
requestParametersAPI call parameters
responseElementsAPI call response
errorCodeFailed call indicator
eventTimeTimestamp (UTC)
resourcesAffected resource ARN/ID

Common gap: Management plane logs (e.g., CloudTrail) are separate from data plane logs (e.g., S3 object access). Both must be enabled if the detection requires full coverage.

CTI Relevance

This prevents detection engineering from building fragile rules against unavailable, inconsistent, or low-quality data. Every detection candidate must identify which data source, which fields, and what retention window are required before the rule is drafted.

Common Mistakes

  • Assuming fields are available because the data source exists.
  • Using generic field names without platform-specific validation.
  • Skipping retention and latency checks.
  • Building detection logic before confirming command-line or parent-process fields are populated.
  • Treating DNS or proxy logs as complete when TLS or DoH is in use.

Practical Workflow

  1. List the specific behavior to observe.
  2. Identify the data source platform.
  3. Name required fields by platform-specific name, not generic label.
  4. Confirm field is populated in your environment (not just present in schema).
  5. Check retention period and latency.
  6. Check parsing and normalization.
  7. Document gaps where fields are absent, unpopulated, or unreliable.
  8. Decide whether to hunt, detect, or defer to gap-collection.

Practical Workflow: Identify External Indicator from Unknown Location

Example: Telemetry Map for RMM Abuse Behavior

Behavior: New RMM tool installed on non-IT endpoint followed by external remote session.

Data SourceRequired FieldsGap Risk
EDR software inventoryproduct_name, install_time, host, userMay not capture all installers; depends on EDR policy
EDR processprocess_name, parent_process_name, command_line, userParent chain required; command_line must be enabled
Networkdestination_ip, destination_port, bytes_out, protocol, hostEgress logging coverage may be incomplete
Identityuser_principal_name, logon_time, source_ip, mfa_resultLegacy auth may not record MFA result
Ticketingticket_id, assigned_host, change_windowIntegration with EDR required for automated correlation

Example: Telemetry Map for RMM Abuse Behavior

Analyst Checklist

  • Is each required field validated as populated in the target environment?
  • Is retention sufficient for the lookback window?
  • Are command-line and parent-process fields confirmed?
  • Are encrypted channel or DoH gaps documented?
  • Is a gap registered for any required field that is missing?
  • Is readiness level honest?

Output Artifact

Behavior:
Data Source:
Platform:
Required Fields (platform-specific):
Confirmed Populated: Yes / No / Unknown
Retention:
Latency:
Normalization:
Known Gaps:
Decision: Hunt / Detect / Defer

References