Telemetry
The Telemetry page collects and aggregates various types of monitored forensic information from devices, which users can use to conduct malware-related investigations more efficiently.
note
If a device loses network connectivity or the Coro agent is inactive, Coro EDR preserves your telemetry data. This saved data becomes accessible once the device re-establishes connection or the Coro agent resumes operation.
Telemetry is built from:
- macOS logs : macOS uses the application console to collect logs generated by your macOS device. Account activity logs collected in the application console are crucial for diagnosing device issues and potentially malicious user account activity.
-
Windows event logs
: The Windows event log is a comprehensive and chronological record of system, security, and application notifications stored by the Windows operating system, which network administrators use to diagnose system problems and predict future issues.
For Windows devices, when Tamper Protection is enabled, Coro EDR safeguards against malicious attempts to disable the Windows Event Viewer, which is critical for gathering Windows event log telemetry data.
When a malicious process disables the Windows Event Viewer, The Coro agent immediately restarts the service, and the following notification appears:
note
When a process interacts with a telemetry source monitored by Coro EDR, the associated telemetry information of that process is available on the Telemetry page.
This article discusses the following topics:
- Accessing the Telemetry page
- Types of telemetry data monitored by Coro
- Telemetry actions
- Filtering telemetry records
- Searching telemetry records
Accessing the Telemetry page
To access the Telemetry page:
-
Sign in to the Coro console
and select
Control Panel
from the toolbar:
-
Select
EDR
:
-
Select the
Telemetry
tab:
The Telemetry page appears:
The forensic information is displayed as a list of monitored telemetry data. The list contains the following columns:
- Forensic : The telemetry type, event name, and the timestamp when the event was created.
- Device : The Coro ID of the device associated with the telemetry event. Select the device name to open the Devices page, filtered by the device ID.
- Process : The process name related to the telemetry event.
Types of telemetry data monitored by Coro
The Telemetry page collects and monitors the following types of event log information:
- Account event ( Windows and macOS )
- Registry key ( Windows )
- Scheduled task ( Windows )
- USB Device Activity ( Windows )
Expand each type to display additional information. Filter for data types using the Type filter.
Account event
Account events are specific actions or activities related to user accounts and their interactions within a device’s operating system (OS) environment. These events are logged by the event log system of the OS, and are crucial for security monitoring, troubleshooting, and auditing purposes. Account events provide insights into user behavior, account management, and potential security threats.
note
Coro monitors Account events for both Windows and macOS devices.
The Telemetry page collects and monitors information related to the following account events:
- A user account was created
- A user account was enabled
- An attempt was made to change an account's password
- An attempt was made to reset an account's password
- A user account was disabled
- A user account was deleted
- A user account was changed
- The name of an account was changed
- An account was successfully logged on
- An account failed to log on
- An account was logged off
- A logon was attempted using explicit credentials
- A user account was locked out
Expand an Account event record using the dropdown. Coro displays the following additional fields and process information:
- User name : The user account associated with the forensic event.
- Process name : The name of the process executable.
- Hash : The unique process identifier.
- Command line : The full command used to start the process, including the path to the executable file and any passed arguments or parameters.
- Parent process name : The name of the parent process executable that initiated another process.
- Hash (parent): The unique parent process identifier that initiated another process.
note
Coro displays additional fields depending on the Account event type and the OS of the device.
Registry key
Registry keys are hierarchical data structures in the Windows operating system registry. They serve as containers that store configuration settings and information about software, hardware, and system preferences. Each key can contain subkeys and values, facilitating the organization and retrieval of crucial system data.
note
Coro monitors Registry keys events for Windows devices.
The Telemetry page collects and monitors information related to the addition, modification, and deletion of the following Registry keys:
- HKEYLOCALMACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon
- HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\BootExecute
- HKLM\System\CurrentControlSet\Services
- HKLM\System\CurrentControlSet\Services
- HKLM\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
- HKCU\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
- HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices
- HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices
- HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify
- HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit
- HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell
- HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell
- HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
- HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce
- HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnceEx
- HKLM\Software\Microsoft\Windows\CurrentVersion\Run
- HKLM\Software\Microsoft\Windows\CurrentVersion\RunEx
- HKCU\Software\Microsoft\Windows\CurrentVersion\Run
- HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce
- HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
- HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
- HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\load
- HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows
- HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler (XP, NT, W2k only)
- HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs
Expand a Registry key record using the dropdown. Coro displays the following additional fields and process information:
- Current value : The new registry key value, classification symbol, and timestamp.
- Old value : The old registry key value.
-
Operation type
: The type of operation performed with the registry key value. These operations are:
- New Registry Value created
- Registry Value deleted
- Existing Registry Value modified
- Process name : The name of the process executable.
- Hash : The unique process identifier.
- Parent process name : The name of the parent process executable that initiated another process.
- Hash (parent): The unique parent process identifier that initiated another process.
Scheduled task
Scheduled Tasks are automated processes that run on a predetermined schedule in operating systems or applications. They perform specific actions at regular intervals, such as hourly, daily, or weekly, without manual intervention. These tasks are crucial for automating routine operations, data backups, updates, and maintenance, enhancing efficiency and ensuring timely execution of critical functions.
note
Coro monitors Scheduled task events for Windows devices.
The Telemetry page collects and monitors information related to the addition of Scheduled tasks:
Expand a Scheduled task record using the dropdown. Coro displays the following additional fields and process information:
- User name : The user account associated with the forensic event.
- Action : The executable action of the task.
- Trigger : Specifies the action which initiates the event, for example, Calendar specifies a calendar based action.
- Operation type : The type of operation performed with the task, for example, Scheduled task was updated .
- Process name : The name of the process executable.
- Hash : The unique process identifier.
- Command line : The full command used to start the process, including the path to the executable file and any passed arguments or parameters.
- Parent process name : The name of the parent process executable that initiated another process.
- Hash : (parent): The unique parent process identifier that initiated another process.
-
Command line
: (parent): The full parent command used to initiate the event that triggered another process.
note
Coro EDR automatically decodes base64-encoded command lines, rendering them understandable for the user.
USB Device Activity
Monitoring USB device activity provides insight that supports investigations and mitigates threats by identifying potential sources of malware infections. For example, if malware is suspected to have infected a device via a USB drive, admin users with sufficient permissions can use this forensic information to respond to the incident and trace the infection’s origin.
note
Coro monitors USB Device Activity events for Windows devices.
The Telemetry page collects and monitors information related to the following USB device activities:
- USB device connected
- USB device disconnected
Expand a USB Device Activity record using the dropdown. The following additional fields and detailed process information displays:
- User name : The user account associated with the forensic event.
- Friendly name : The descriptive label for the USB device.
- USB device : The unique USB device identifier.
- Process name : The name of the process executable responsible for managing drivers and communication with the connected USB device.
- Hash : The unique process identifier.
- Command line : The full command used to start the process, including the path to the executable file and any passed arguments or parameters.
Telemetry actions
Each process listed on the Telemetry tab has a set of actions that can be applied to a monitored telemetry data record:
The following telemetry actions are available:
-
Isolate affected device from network
(applicable to
Registry keys
and
Scheduled tasks
): Used in the case of severe attacks. The action isolates selected devices from the network. An isolated device cannot communicate with any resource on the network or the internet. The Coro process remains functional in order to communicate with the Coro server.
note
Reconnect isolated devices to the network from the Devices page.
note
You can isolate a process if at least one of the associated devices has either:
MacOS agent v2.1 or higher installed.
Windows agent v2.2 or higher installed.
- Shutdown Devices : Shuts down selected devices.
- Reboot Devices : Reboots selected devices.
-
Block Process
: Blocks a process and adds an item to the list on the
Allow/Block
page of the
Endpoint Security
module:
For further information on blocking processes, see EDR Allow/Block lists and Endpoint Security Allow/Block lists
-
View full log
: Displays the raw XML (for
Windows
) and JSON (for
macOS
) log related to the telemetry entry, as received from the agent in the tab:
Filtering telemetry records
Filter the Telemetry page records by using the following two filters:
Type filter
The telemetry Types filter enables you to filter telemetry records by:
- Registry key
- Scheduled task
- Account events
- USB Device Activity
Time period filter
The telemetry time period filter enables you to filter telemetry records by specific dates and time intervals.
To apply a time period filter:
-
Select the
During
dropdown.
The date and time picker appears:
-
Select the start and end date:
-
(Optional) Use the time picker to refine your search by adjusting the hour or minute value:
Alternatively select the current hour or minute value:
Select the hour or minute value:
-
Select
SELECT
:
The filter is applied to the telemetry records and the current filter values appear in the During dropdown:
Searching telemetry records
The Search box enables you to search and filter telemetry records using two methods:
Prefixed search
A prefixed search enables you to search by one or more telemetry fields or forensic values.
Search by the following prefixed telemetry fields:
- Main entry : The forensic event.
- Device : The name of the device linked to the forensic record.
- Coro Device ID : The device ID associated with the device.
- Process : The name of the process.
- Process hash : The unique process identifier.
- User name : The user account associated with the forensic event.
- Event ID : The ID associated with a specific event.
Select More search options to further refine your search according forensic values corresponding to a specific telemetry type:
-
Registry key
:
- Current value : The current registry key value.
- Old value : The previous registry key value.
- Operation type : The action performed on the registry key.
-
Scheduled task
:
- Action : The specific task or action being executed by the scheduled task.
- Operation type : the specific action that was performed on the scheduled task.
-
Account event
:
- Target account : The user or system account associated with the account event.
- Account domain : The domain where the user account exists.
To perform a prefixed search:
-
Select the search box and then select the prefixed search item (telemetry property or forensic value):
-
Select the search operator from the
Add operator
dropdown:
-
Enter the value for the telemetry field or forensic value and then select Enter.
Each entered value is formatted as a chip:
note
Select the X on an individual chip to remove it from the search box.
-
Select
SEARCH
:
The telemetry list is filtered by the searched criteria:
note
Prefixed searches use exact matches for the selected prefixed term value entered.
Free text search
Free text search lets you search telemetry data without prefixed terms, filtering across multiple fields and forensic values to pinpoint specific terms:
note
Free text searches support partial matches.
Recent searches
Coro saves your five most recent searches, allowing you to select and reapply them as needed.
To apply a recent search:
-
Select the
Recent Searches
dropdown:
-
Select the search:
The selected search is applied and the telemetry list is filtered by the searched criteria:
note
Select Clear recent searches from the Recent Searches dropdown to remove all previous recent search entries.