Telemetry

The Telemetry page collects and aggregates various types of monitored forensic information from devices, which users can use to conduct malware-related investigations more efficiently.

note

If a device loses network connectivity or the Coro agent is inactive, Coro EDR preserves your telemetry data. This saved data becomes accessible once the device re-establishes connection or the Coro agent resumes operation.

Telemetry is built from:

  • macOS logs : macOS uses the application console to collect logs generated by your macOS device. Account activity logs collected in the application console are crucial for diagnosing device issues and potentially malicious user account activity.
  • Windows event logs : The Windows event log is a comprehensive and chronological record of system, security, and application notifications stored by the Windows operating system, which network administrators use to diagnose system problems and predict future issues.

    For Windows devices, when Tamper Protection is enabled, Coro EDR safeguards against malicious attempts to disable the Windows Event Viewer, which is critical for gathering Windows event log telemetry data.

    When a malicious process disables the Windows Event Viewer, The Coro agent immediately restarts the service, and the following notification appears:

    Windows Event Log tampering

note

When a process interacts with a telemetry source monitored by Coro EDR, the associated telemetry information of that process is available on the Telemetry page.

This article discusses the following topics:

Accessing the Telemetry page

To access the Telemetry page:

  1. Sign in to the Coro console and select Control Panel from the toolbar:

    Control Panel

  2. Select EDR :

    EDR

  3. Select the Telemetry tab:

    Telemetry tab

    The Telemetry page appears:

    Telemetry page

The forensic information is displayed as a list of monitored telemetry data. The list contains the following columns:

  • Forensic : The telemetry type, event name, and the timestamp when the event was created.
  • Device : The Coro ID of the device associated with the telemetry event. Select the device name to open the Devices page, filtered by the device ID.
  • Process : The process name related to the telemetry event.

Types of telemetry data monitored by Coro

The Telemetry page collects and monitors the following types of event log information:

Expand each type to display additional information. Filter for data types using the Type filter.

Account event

Account events are specific actions or activities related to user accounts and their interactions within a device’s operating system (OS) environment. These events are logged by the event log system of the OS, and are crucial for security monitoring, troubleshooting, and auditing purposes. Account events provide insights into user behavior, account management, and potential security threats.

note

Coro monitors Account events for both Windows and macOS devices.

The Telemetry page collects and monitors information related to the following account events:

  • A user account was created
  • A user account was enabled
  • An attempt was made to change an account's password
  • An attempt was made to reset an account's password
  • A user account was disabled
  • A user account was deleted
  • A user account was changed
  • The name of an account was changed
  • An account was successfully logged on
  • An account failed to log on
  • An account was logged off
  • A logon was attempted using explicit credentials
  • A user account was locked out

Account event

Expand an Account event record using the dropdown. Coro displays the following additional fields and process information:

  • User name : The user account associated with the forensic event.
  • Process name : The name of the process executable.
  • Hash : The unique process identifier.
  • Command line : The full command used to start the process, including the path to the executable file and any passed arguments or parameters.
  • Parent process name : The name of the parent process executable that initiated another process.
  • Hash (parent): The unique parent process identifier that initiated another process.

Account event detailed process info

note

Coro displays additional fields depending on the Account event type and the OS of the device.

Registry key

Registry keys are hierarchical data structures in the Windows operating system registry. They serve as containers that store configuration settings and information about software, hardware, and system preferences. Each key can contain subkeys and values, facilitating the organization and retrieval of crucial system data.

note

Coro monitors Registry keys events for Windows devices.

The Telemetry page collects and monitors information related to the addition, modification, and deletion of the following Registry keys:

  • HKEYLOCALMACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon
  • HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\BootExecute
  • HKLM\System\CurrentControlSet\Services
  • HKLM\System\CurrentControlSet\Services
  • HKLM\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
  • HKCU\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
  • HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices
  • HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices
  • HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify
  • HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit
  • HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell
  • HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell
  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
  • HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce
  • HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnceEx
  • HKLM\Software\Microsoft\Windows\CurrentVersion\Run
  • HKLM\Software\Microsoft\Windows\CurrentVersion\RunEx
  • HKCU\Software\Microsoft\Windows\CurrentVersion\Run
  • HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce
  • HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
  • HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
  • HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\load
  • HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows
  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler (XP, NT, W2k only)
  • HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs

Registry key

Expand a Registry key record using the dropdown. Coro displays the following additional fields and process information:

  • Current value : The new registry key value, classification symbol, and timestamp.
  • Old value : The old registry key value.
  • Operation type : The type of operation performed with the registry key value. These operations are:
    • New Registry Value created
    • Registry Value deleted
    • Existing Registry Value modified
  • Process name : The name of the process executable.
  • Hash : The unique process identifier.
  • Parent process name : The name of the parent process executable that initiated another process.
  • Hash (parent): The unique parent process identifier that initiated another process.

Registry key detailed process info

Scheduled task

Scheduled Tasks are automated processes that run on a predetermined schedule in operating systems or applications. They perform specific actions at regular intervals, such as hourly, daily, or weekly, without manual intervention. These tasks are crucial for automating routine operations, data backups, updates, and maintenance, enhancing efficiency and ensuring timely execution of critical functions.

note

Coro monitors Scheduled task events for Windows devices.

The Telemetry page collects and monitors information related to the addition of Scheduled tasks:

Scheduled tasks

Expand a Scheduled task record using the dropdown. Coro displays the following additional fields and process information:

  • User name : The user account associated with the forensic event.
  • Action : The executable action of the task.
  • Trigger : Specifies the action which initiates the event, for example, Calendar specifies a calendar based action.
  • Operation type : The type of operation performed with the task, for example, Scheduled task was updated .
  • Process name : The name of the process executable.
  • Hash : The unique process identifier.
  • Command line : The full command used to start the process, including the path to the executable file and any passed arguments or parameters.
  • Parent process name : The name of the parent process executable that initiated another process.
  • Hash : (parent): The unique parent process identifier that initiated another process.
  • Command line : (parent): The full parent command used to initiate the event that triggered another process.
    note

    Coro EDR automatically decodes base64-encoded command lines, rendering them understandable for the user.

Scheduled task detailed process info

USB Device Activity

Monitoring USB device activity provides insight that supports investigations and mitigates threats by identifying potential sources of malware infections. For example, if malware is suspected to have infected a device via a USB drive, admin users with sufficient permissions can use this forensic information to respond to the incident and trace the infection’s origin.

note

Coro monitors USB Device Activity events for Windows devices.

The Telemetry page collects and monitors information related to the following USB device activities:

  • USB device connected
  • USB device disconnected

USB Device Activity

Expand a USB Device Activity record using the dropdown. The following additional fields and detailed process information displays:

  • User name : The user account associated with the forensic event.
  • Friendly name : The descriptive label for the USB device.
  • USB device : The unique USB device identifier.
  • Process name : The name of the process executable responsible for managing drivers and communication with the connected USB device.
  • Hash : The unique process identifier.
  • Command line : The full command used to start the process, including the path to the executable file and any passed arguments or parameters.

USB device activity detailed process info

Telemetry actions

Each process listed on the Telemetry tab has a set of actions that can be applied to a monitored telemetry data record:

Telemetry actions

The following telemetry actions are available:

  • Isolate affected device from network (applicable to Registry keys and Scheduled tasks ): Used in the case of severe attacks. The action isolates selected devices from the network. An isolated device cannot communicate with any resource on the network or the internet. The Coro process remains functional in order to communicate with the Coro server.
    note

    Reconnect isolated devices to the network from the Devices page.

    note

    You can isolate a process if at least one of the associated devices has either:

    MacOS agent v2.1 or higher installed.

    Windows agent v2.2 or higher installed.

  • Shutdown Devices : Shuts down selected devices.
  • Reboot Devices : Reboots selected devices.
  • Block Process : Blocks a process and adds an item to the list on the Allow/Block page of the Endpoint Security module:

    Block process

    For further information on blocking processes, see EDR Allow/Block lists and Endpoint Security Allow/Block lists

  • View full log : Displays the raw XML (for Windows ) and JSON (for macOS ) log related to the telemetry entry, as received from the agent in the tab:

    Full log xml

Filtering telemetry records

Filter the Telemetry page records by using the following two filters:

Type filter

The telemetry Types filter enables you to filter telemetry records by:

  • Registry key
  • Scheduled task
  • Account events
  • USB Device Activity

Telemetry type filter

Time period filter

The telemetry time period filter enables you to filter telemetry records by specific dates and time intervals.

To apply a time period filter:

  1. Select the During dropdown.

    The date and time picker appears:

    Telemetry time period filter

  2. Select the start and end date:

    Telemetry time period filter date interval selected

  3. (Optional) Use the time picker to refine your search by adjusting the hour or minute value:

    Telemetry time period filter increase

    Telemetry time period filter decrease

    Alternatively select the current hour or minute value:

    Telemetry time period filter decrease

    Select the hour or minute value:

    Telemetry time period filter select value

  4. Select SELECT :

    Telemetry time period filter apply

    The filter is applied to the telemetry records and the current filter values appear in the During dropdown:

    Telemetry time period filter applied

Searching telemetry records

The Search box enables you to search and filter telemetry records using two methods:

Prefixed search

A prefixed search enables you to search by one or more telemetry fields or forensic values.

Search by the following prefixed telemetry fields:

  • Main entry : The forensic event.
  • Device : The name of the device linked to the forensic record.
  • Coro Device ID : The device ID associated with the device.
  • Process : The name of the process.
  • Process hash : The unique process identifier.
  • User name : The user account associated with the forensic event.
  • Event ID : The ID associated with a specific event.

Select More search options to further refine your search according forensic values corresponding to a specific telemetry type:

  • Registry key :
    • Current value : The current registry key value.
    • Old value : The previous registry key value.
    • Operation type : The action performed on the registry key.
  • Scheduled task :
    • Action : The specific task or action being executed by the scheduled task.
    • Operation type : the specific action that was performed on the scheduled task.
  • Account event :
    • Target account : The user or system account associated with the account event.
    • Account domain : The domain where the user account exists.

To perform a prefixed search:

  1. Select the search box and then select the prefixed search item (telemetry property or forensic value):

    Search by

  2. Select the search operator from the Add operator dropdown:

    Add operator

  3. Enter the value for the telemetry field or forensic value and then select Enter.

    Each entered value is formatted as a chip:

    Chip

    note

    Select the X on an individual chip to remove it from the search box.

  4. Select SEARCH :

    Search

    The telemetry list is filtered by the searched criteria:

    Search results

note

Prefixed searches use exact matches for the selected prefixed term value entered.

Free text search

Free text search lets you search telemetry data without prefixed terms, filtering across multiple fields and forensic values to pinpoint specific terms:

Free search

note

Free text searches support partial matches.

Recent searches

Coro saves your five most recent searches, allowing you to select and reapply them as needed.

To apply a recent search:

  1. Select the Recent Searches dropdown:

    Recent searches

  2. Select the search:

    Recent searches entry

    The selected search is applied and the telemetry list is filtered by the searched criteria:

    Search results

    note

    Select Clear recent searches from the Recent Searches dropdown to remove all previous recent search entries.