{"id":34033,"date":"2024-07-30T05:27:04","date_gmt":"2024-07-30T05:27:04","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=34033"},"modified":"2024-07-30T05:27:06","modified_gmt":"2024-07-30T05:27:06","slug":"edr-telemetry","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/edr-telemetry\/","title":{"rendered":"EDR Telemetry &#8211; Capabilities Of Products A Comparative Analysis"},"content":{"rendered":"\n<p>This repo provides a list of\u00a0telemetry features\u00a0from EDR products and other endpoint agents such as\u00a0<a href=\"https:\/\/learn.microsoft.com\/en-us\/sysinternals\/downloads\/sysmon\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Sysmon<\/a>\u00a0broken down by category. <\/p>\n\n\n\n<p>The main motivation behind this project is to enable security practitioners to compare and evaluate the telemetry potential from those tools while encouraging EDR vendors to be more transparent about the telemetry features they do provide to their users and customers.<\/p>\n\n\n\n<p>Besides compliance, investigations and forensics benefits, rich log telemetry empowers cyber defense teams to develop custom hunting, detection and analytics capabilities tailored to their needs.<\/p>\n\n\n\n<p>Read details about this project in the initial release blog post\u00a0<a href=\"https:\/\/kostas-ts.medium.com\/edr-telemetry-project-a-comprehensive-comparison-d5ed1745384b\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">here<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Telemetry Definition<\/strong><a href=\"https:\/\/github.com\/tsale\/EDR-Telemetry#telemetry-definition\"><\/a><\/h2>\n\n\n\n<p>There are many types of\u00a0<em>telemetry<\/em>\u00a0when it comes to Security Instrumentation. <\/p>\n\n\n\n<p>Here we focus on agents or sensors generating telemetry in the form of\u00a0log data, regardless of the format (json, key-value, csv), as long as the data is automatically generated and transmitted or streamed in near real-time.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>FAQ &amp; Contributions<\/strong><a href=\"https:\/\/github.com\/tsale\/EDR-Telemetry#faq--contributions\"><\/a><\/h2>\n\n\n\n<p>Please check our\u00a0<a href=\"https:\/\/github.com\/tsale\/EDR-Telemetry\/wiki\/FAQ\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">FAQ<\/a>\u00a0page to know more and feel free to get in contact in case you cannot find an answer there.<\/p>\n\n\n\n<p>In case you ware willing to contribute, please check the\u00a0<a href=\"https:\/\/github.com\/tsale\/EDR-Telemetry\/wiki#contribution-guidelines\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Contributions<\/a>\u00a0page.<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<p><br>The telemetry of the EDR products below could improve with time. The\u00a0<code>last_updated<\/code>\u00a0field is the last time the data sources have been updated. <\/p>\n\n\n\n<p>This might NOT always be up to date with the current telemetry capabilities of each product.<\/p>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Telemetry Comparison Table<\/strong><a href=\"https:\/\/github.com\/tsale\/EDR-Telemetry#telemetry-comparison-table\"><\/a><\/h2>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<p><br>The data below do not represent the capability of each of the EDR products to detect or prevent a threat. <\/p>\n\n\n\n<p>This is ONLY a comparison regarding the available telemetry for each product. <\/p>\n\n\n\n<p>Some products, such as Elastic EDR, make additional telemetry available in free or paid modules. <\/p>\n\n\n\n<p>Add-on modules, as well as signals, will not be taken into consideration for this project. Please read more about this on our FAQ page\u00a0<a href=\"https:\/\/github.com\/tsale\/EDR-Telemetry\/wiki\/FAQ#7-what-is-the-scope-of-the-telemetry-comparison-table-for-edr-products\">here<\/a>.<\/p>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>EDR Evaluation And Scoring Script<\/strong><a href=\"https:\/\/github.com\/tsale\/EDR-Telemetry#edr-evaluation-and-scoring-script\"><\/a><\/h2>\n\n\n\n<p>This script evaluates and scores Endpoint Detection and Response (EDR) Solutions based on their capabilities. <\/p>\n\n\n\n<p>It reads data from the main JSON file (<code>EDR_telem.json<\/code>), which contains information about various EDRs and their features. <\/p>\n\n\n\n<p>The script then calculates a score for each EDR based on the presence and absence of certain features, as well as the category of the feature.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Scoring Logic<\/strong><a href=\"https:\/\/github.com\/tsale\/EDR-Telemetry#scoring-logic\"><\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Each feature and category is assigned a weight.<\/li>\n\n\n\n<li>The weights represent the importance of the feature or category. For example, a feature with a weight of 1 is considered more important than a feature with a weight of 0.5.<\/li>\n\n\n\n<li>The compare.py script multiplies the weight of each feature by the weight of its category, adding this product to the EDR&#8217;s total score.<\/li>\n\n\n\n<li>If a feature is absent, its weight is considered 0.<\/li>\n<\/ul>\n\n\n\n<p>This scoring algorithm allows us to quantitatively compare different EDRs based on their capabilities. <\/p>\n\n\n\n<p>The higher the score, the more capable the EDR is. The weights can be adjusted as needed to reflect changes in the importance of different features or categories.<\/p>\n\n\n\n<p>For more information click <a href=\"https:\/\/github.com\/tsale\/EDR-Telemetry\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This repo provides a list of\u00a0telemetry features\u00a0from EDR products and other endpoint agents such as\u00a0Sysmon\u00a0broken down by category. The main motivation behind this project is to enable security practitioners to compare and evaluate the telemetry potential from those tools while encouraging EDR vendors to be more transparent about the telemetry features they do provide to [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":34037,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgyOfk7AhZQ2NsUWTA0kE77R7RCXxOtv1N9Z4nRyW7mEnT5msyZEM6gcoiq_mAf-5F5oDC-o5De50fkWvt9AQRMeM-YzI6G4KsUoyRGTlUHnwr0QTd5SJcdFFpNnTpW-Vtq5lWuMjjANYXj8916rEFAK9t3NfUd1fNPWbF5DBDWC27ohzW5OolRKZNgjSpp\/s16000\/EDR%20Telemetry.webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20],"tags":[737,6860,6321,6052,6325],"class_list":["post-34033","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cybersecurity","tag-edr-telemetry","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>EDR Telemetry - Capabilities Of Products A Comparative Analysis<\/title>\n<meta name=\"description\" content=\"This repo provides a list of\u00a0telemetry features\u00a0from EDR products and other endpoint agents such as\u00a0Sysmon\u00a0broken down by category. The main\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/edr-telemetry\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EDR Telemetry - Capabilities Of Products A Comparative Analysis\" \/>\n<meta property=\"og:description\" content=\"This repo provides a list of\u00a0telemetry features\u00a0from EDR products and other endpoint agents such as\u00a0Sysmon\u00a0broken down by category. The main\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/edr-telemetry\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-30T05:27:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-30T05:27:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgyOfk7AhZQ2NsUWTA0kE77R7RCXxOtv1N9Z4nRyW7mEnT5msyZEM6gcoiq_mAf-5F5oDC-o5De50fkWvt9AQRMeM-YzI6G4KsUoyRGTlUHnwr0QTd5SJcdFFpNnTpW-Vtq5lWuMjjANYXj8916rEFAK9t3NfUd1fNPWbF5DBDWC27ohzW5OolRKZNgjSpp\/s16000\/EDR%20Telemetry.webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgyOfk7AhZQ2NsUWTA0kE77R7RCXxOtv1N9Z4nRyW7mEnT5msyZEM6gcoiq_mAf-5F5oDC-o5De50fkWvt9AQRMeM-YzI6G4KsUoyRGTlUHnwr0QTd5SJcdFFpNnTpW-Vtq5lWuMjjANYXj8916rEFAK9t3NfUd1fNPWbF5DBDWC27ohzW5OolRKZNgjSpp\/s16000\/EDR%20Telemetry.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/edr-telemetry\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/edr-telemetry\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"EDR Telemetry &#8211; Capabilities Of Products A Comparative Analysis\",\"datePublished\":\"2024-07-30T05:27:04+00:00\",\"dateModified\":\"2024-07-30T05:27:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/edr-telemetry\/\"},\"wordCount\":495,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/edr-telemetry\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgyOfk7AhZQ2NsUWTA0kE77R7RCXxOtv1N9Z4nRyW7mEnT5msyZEM6gcoiq_mAf-5F5oDC-o5De50fkWvt9AQRMeM-YzI6G4KsUoyRGTlUHnwr0QTd5SJcdFFpNnTpW-Vtq5lWuMjjANYXj8916rEFAK9t3NfUd1fNPWbF5DBDWC27ohzW5OolRKZNgjSpp\/s16000\/EDR%20Telemetry.webp\",\"keywords\":[\"cybersecurity\",\"EDR Telemetry\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\"],\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/edr-telemetry\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/edr-telemetry\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/edr-telemetry\/\",\"name\":\"EDR Telemetry - Capabilities Of Products A Comparative Analysis\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/edr-telemetry\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/edr-telemetry\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgyOfk7AhZQ2NsUWTA0kE77R7RCXxOtv1N9Z4nRyW7mEnT5msyZEM6gcoiq_mAf-5F5oDC-o5De50fkWvt9AQRMeM-YzI6G4KsUoyRGTlUHnwr0QTd5SJcdFFpNnTpW-Vtq5lWuMjjANYXj8916rEFAK9t3NfUd1fNPWbF5DBDWC27ohzW5OolRKZNgjSpp\/s16000\/EDR%20Telemetry.webp\",\"datePublished\":\"2024-07-30T05:27:04+00:00\",\"dateModified\":\"2024-07-30T05:27:06+00:00\",\"description\":\"This repo provides a list of\u00a0telemetry features\u00a0from EDR products and other endpoint agents such as\u00a0Sysmon\u00a0broken down by category. The main\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/edr-telemetry\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/edr-telemetry\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgyOfk7AhZQ2NsUWTA0kE77R7RCXxOtv1N9Z4nRyW7mEnT5msyZEM6gcoiq_mAf-5F5oDC-o5De50fkWvt9AQRMeM-YzI6G4KsUoyRGTlUHnwr0QTd5SJcdFFpNnTpW-Vtq5lWuMjjANYXj8916rEFAK9t3NfUd1fNPWbF5DBDWC27ohzW5OolRKZNgjSpp\/s16000\/EDR%20Telemetry.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgyOfk7AhZQ2NsUWTA0kE77R7RCXxOtv1N9Z4nRyW7mEnT5msyZEM6gcoiq_mAf-5F5oDC-o5De50fkWvt9AQRMeM-YzI6G4KsUoyRGTlUHnwr0QTd5SJcdFFpNnTpW-Vtq5lWuMjjANYXj8916rEFAK9t3NfUd1fNPWbF5DBDWC27ohzW5OolRKZNgjSpp\/s16000\/EDR%20Telemetry.webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"EDR Telemetry - Capabilities Of Products A Comparative Analysis","description":"This repo provides a list of\u00a0telemetry features\u00a0from EDR products and other endpoint agents such as\u00a0Sysmon\u00a0broken down by category. The main","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/edr-telemetry\/","og_locale":"en_US","og_type":"article","og_title":"EDR Telemetry - Capabilities Of Products A Comparative Analysis","og_description":"This repo provides a list of\u00a0telemetry features\u00a0from EDR products and other endpoint agents such as\u00a0Sysmon\u00a0broken down by category. The main","og_url":"https:\/\/kalilinuxtutorials.com\/edr-telemetry\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-07-30T05:27:04+00:00","article_modified_time":"2024-07-30T05:27:06+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgyOfk7AhZQ2NsUWTA0kE77R7RCXxOtv1N9Z4nRyW7mEnT5msyZEM6gcoiq_mAf-5F5oDC-o5De50fkWvt9AQRMeM-YzI6G4KsUoyRGTlUHnwr0QTd5SJcdFFpNnTpW-Vtq5lWuMjjANYXj8916rEFAK9t3NfUd1fNPWbF5DBDWC27ohzW5OolRKZNgjSpp\/s16000\/EDR%20Telemetry.webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgyOfk7AhZQ2NsUWTA0kE77R7RCXxOtv1N9Z4nRyW7mEnT5msyZEM6gcoiq_mAf-5F5oDC-o5De50fkWvt9AQRMeM-YzI6G4KsUoyRGTlUHnwr0QTd5SJcdFFpNnTpW-Vtq5lWuMjjANYXj8916rEFAK9t3NfUd1fNPWbF5DBDWC27ohzW5OolRKZNgjSpp\/s16000\/EDR%20Telemetry.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/edr-telemetry\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/edr-telemetry\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"EDR Telemetry &#8211; Capabilities Of Products A Comparative Analysis","datePublished":"2024-07-30T05:27:04+00:00","dateModified":"2024-07-30T05:27:06+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/edr-telemetry\/"},"wordCount":495,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/edr-telemetry\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgyOfk7AhZQ2NsUWTA0kE77R7RCXxOtv1N9Z4nRyW7mEnT5msyZEM6gcoiq_mAf-5F5oDC-o5De50fkWvt9AQRMeM-YzI6G4KsUoyRGTlUHnwr0QTd5SJcdFFpNnTpW-Vtq5lWuMjjANYXj8916rEFAK9t3NfUd1fNPWbF5DBDWC27ohzW5OolRKZNgjSpp\/s16000\/EDR%20Telemetry.webp","keywords":["cybersecurity","EDR Telemetry","informationsecurity","kalilinux","kalilinuxtools"],"articleSection":["Cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/edr-telemetry\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/edr-telemetry\/","url":"https:\/\/kalilinuxtutorials.com\/edr-telemetry\/","name":"EDR Telemetry - Capabilities Of Products A Comparative Analysis","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/edr-telemetry\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/edr-telemetry\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgyOfk7AhZQ2NsUWTA0kE77R7RCXxOtv1N9Z4nRyW7mEnT5msyZEM6gcoiq_mAf-5F5oDC-o5De50fkWvt9AQRMeM-YzI6G4KsUoyRGTlUHnwr0QTd5SJcdFFpNnTpW-Vtq5lWuMjjANYXj8916rEFAK9t3NfUd1fNPWbF5DBDWC27ohzW5OolRKZNgjSpp\/s16000\/EDR%20Telemetry.webp","datePublished":"2024-07-30T05:27:04+00:00","dateModified":"2024-07-30T05:27:06+00:00","description":"This repo provides a list of\u00a0telemetry features\u00a0from EDR products and other endpoint agents such as\u00a0Sysmon\u00a0broken down by category. The main","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/edr-telemetry\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/edr-telemetry\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgyOfk7AhZQ2NsUWTA0kE77R7RCXxOtv1N9Z4nRyW7mEnT5msyZEM6gcoiq_mAf-5F5oDC-o5De50fkWvt9AQRMeM-YzI6G4KsUoyRGTlUHnwr0QTd5SJcdFFpNnTpW-Vtq5lWuMjjANYXj8916rEFAK9t3NfUd1fNPWbF5DBDWC27ohzW5OolRKZNgjSpp\/s16000\/EDR%20Telemetry.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgyOfk7AhZQ2NsUWTA0kE77R7RCXxOtv1N9Z4nRyW7mEnT5msyZEM6gcoiq_mAf-5F5oDC-o5De50fkWvt9AQRMeM-YzI6G4KsUoyRGTlUHnwr0QTd5SJcdFFpNnTpW-Vtq5lWuMjjANYXj8916rEFAK9t3NfUd1fNPWbF5DBDWC27ohzW5OolRKZNgjSpp\/s16000\/EDR%20Telemetry.webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgyOfk7AhZQ2NsUWTA0kE77R7RCXxOtv1N9Z4nRyW7mEnT5msyZEM6gcoiq_mAf-5F5oDC-o5De50fkWvt9AQRMeM-YzI6G4KsUoyRGTlUHnwr0QTd5SJcdFFpNnTpW-Vtq5lWuMjjANYXj8916rEFAK9t3NfUd1fNPWbF5DBDWC27ohzW5OolRKZNgjSpp\/s16000\/EDR%20Telemetry.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":33961,"url":"https:\/\/kalilinuxtutorials.com\/edrprison\/","url_meta":{"origin":34033,"position":0},"title":"EDRPrison &#8211; Advanced Evasion Techniques Using Legitimate WFP Drivers","author":"Varshini","date":"July 24, 2024","format":false,"excerpt":"EDRPrison leverages a legitimate WFP callout driver,\u00a0WinDivert, to effectively silence EDR systems. Drawing inspiration from tools like\u00a0Shutter,\u00a0FireBlock, and\u00a0EDRSilencer, this project focuses on network-based evasion techniques. Unlike its predecessors, EDRPrison installs and loads an external legitimate WFP callout driver instead of relying solely on the built-in WFP. Additionally, it blocks outbound\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjw4BYhi_M4zVuuyU9qp5dO01CRcc-YhsaRA3vLH7jjvmbhhYIfsq2UnBhf89LaXbtGJOUz0BUpHflUaBxhiuYhpaARa6ohCk3WfkRtShYa3kUp8fD497WYc8vIb4ciESTsTD1VS_yKjmN0-L4cPDqV-P-nwiyosez9b2ZHqWq3fjNwJQXZHtwrK7ie9NHY\/s16000\/EDRPrison%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjw4BYhi_M4zVuuyU9qp5dO01CRcc-YhsaRA3vLH7jjvmbhhYIfsq2UnBhf89LaXbtGJOUz0BUpHflUaBxhiuYhpaARa6ohCk3WfkRtShYa3kUp8fD497WYc8vIb4ciESTsTD1VS_yKjmN0-L4cPDqV-P-nwiyosez9b2ZHqWq3fjNwJQXZHtwrK7ie9NHY\/s16000\/EDRPrison%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjw4BYhi_M4zVuuyU9qp5dO01CRcc-YhsaRA3vLH7jjvmbhhYIfsq2UnBhf89LaXbtGJOUz0BUpHflUaBxhiuYhpaARa6ohCk3WfkRtShYa3kUp8fD497WYc8vIb4ciESTsTD1VS_yKjmN0-L4cPDqV-P-nwiyosez9b2ZHqWq3fjNwJQXZHtwrK7ie9NHY\/s16000\/EDRPrison%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjw4BYhi_M4zVuuyU9qp5dO01CRcc-YhsaRA3vLH7jjvmbhhYIfsq2UnBhf89LaXbtGJOUz0BUpHflUaBxhiuYhpaARa6ohCk3WfkRtShYa3kUp8fD497WYc8vIb4ciESTsTD1VS_yKjmN0-L4cPDqV-P-nwiyosez9b2ZHqWq3fjNwJQXZHtwrK7ie9NHY\/s16000\/EDRPrison%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjw4BYhi_M4zVuuyU9qp5dO01CRcc-YhsaRA3vLH7jjvmbhhYIfsq2UnBhf89LaXbtGJOUz0BUpHflUaBxhiuYhpaARa6ohCk3WfkRtShYa3kUp8fD497WYc8vIb4ciESTsTD1VS_yKjmN0-L4cPDqV-P-nwiyosez9b2ZHqWq3fjNwJQXZHtwrK7ie9NHY\/s16000\/EDRPrison%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjw4BYhi_M4zVuuyU9qp5dO01CRcc-YhsaRA3vLH7jjvmbhhYIfsq2UnBhf89LaXbtGJOUz0BUpHflUaBxhiuYhpaARa6ohCk3WfkRtShYa3kUp8fD497WYc8vIb4ciESTsTD1VS_yKjmN0-L4cPDqV-P-nwiyosez9b2ZHqWq3fjNwJQXZHtwrK7ie9NHY\/s16000\/EDRPrison%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":35596,"url":"https:\/\/kalilinuxtutorials.com\/awesome-edr-bypass\/","url_meta":{"origin":34033,"position":1},"title":"Awesome EDR Bypass : A Comprehensive Guide For Ethical Hackers","author":"Varshini","date":"January 2, 2025","format":false,"excerpt":"EDR bypass technology is not just for attackers. Many malware now have EDR bypass capabilities, knowledge that pentesters and incident responders should also be aware of. This repository is not intended to be used to escalate attacks. Use it for ethical hacking. PoC trickster0\/TartarusGate: TartarusGate, Bypassing EDRs am0nsec\/HellsGate: Original C\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhVTVrDfdHPNRElUbpPw_tvW5AwqBKo6aT_BPiSDbVANiKT5zDLza02RARdWbz92DVkEtwdIl6-LF_SiNDEBnlz8IUuOBkKt-NiPyMQkMMLL-cnxRVCPwjctjANd0kjESyNRQtjWobW4vlStkW-9EPJTIEFrsq4b3s4z0LmpsEpVaXZ4A1hl4PPPHZjB_1A\/s1600\/Awesome%20EDR%20Bypass.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhVTVrDfdHPNRElUbpPw_tvW5AwqBKo6aT_BPiSDbVANiKT5zDLza02RARdWbz92DVkEtwdIl6-LF_SiNDEBnlz8IUuOBkKt-NiPyMQkMMLL-cnxRVCPwjctjANd0kjESyNRQtjWobW4vlStkW-9EPJTIEFrsq4b3s4z0LmpsEpVaXZ4A1hl4PPPHZjB_1A\/s1600\/Awesome%20EDR%20Bypass.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhVTVrDfdHPNRElUbpPw_tvW5AwqBKo6aT_BPiSDbVANiKT5zDLza02RARdWbz92DVkEtwdIl6-LF_SiNDEBnlz8IUuOBkKt-NiPyMQkMMLL-cnxRVCPwjctjANd0kjESyNRQtjWobW4vlStkW-9EPJTIEFrsq4b3s4z0LmpsEpVaXZ4A1hl4PPPHZjB_1A\/s1600\/Awesome%20EDR%20Bypass.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhVTVrDfdHPNRElUbpPw_tvW5AwqBKo6aT_BPiSDbVANiKT5zDLza02RARdWbz92DVkEtwdIl6-LF_SiNDEBnlz8IUuOBkKt-NiPyMQkMMLL-cnxRVCPwjctjANd0kjESyNRQtjWobW4vlStkW-9EPJTIEFrsq4b3s4z0LmpsEpVaXZ4A1hl4PPPHZjB_1A\/s1600\/Awesome%20EDR%20Bypass.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhVTVrDfdHPNRElUbpPw_tvW5AwqBKo6aT_BPiSDbVANiKT5zDLza02RARdWbz92DVkEtwdIl6-LF_SiNDEBnlz8IUuOBkKt-NiPyMQkMMLL-cnxRVCPwjctjANd0kjESyNRQtjWobW4vlStkW-9EPJTIEFrsq4b3s4z0LmpsEpVaXZ4A1hl4PPPHZjB_1A\/s1600\/Awesome%20EDR%20Bypass.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhVTVrDfdHPNRElUbpPw_tvW5AwqBKo6aT_BPiSDbVANiKT5zDLza02RARdWbz92DVkEtwdIl6-LF_SiNDEBnlz8IUuOBkKt-NiPyMQkMMLL-cnxRVCPwjctjANd0kjESyNRQtjWobW4vlStkW-9EPJTIEFrsq4b3s4z0LmpsEpVaXZ4A1hl4PPPHZjB_1A\/s1600\/Awesome%20EDR%20Bypass.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":35492,"url":"https:\/\/kalilinuxtutorials.com\/hellbunny\/","url_meta":{"origin":34033,"position":2},"title":"HellBunny : Advanced Shellcode Loader For EDR Evasio","author":"Varshini","date":"December 24, 2024","format":false,"excerpt":"HellBunny is a malleable shellcode loader written in C and Assembly utilizing direct and indirect syscalls for evading EDR hooks. It can be built as EXE, DLL, or XLL and offers a variety of QoL features that make it more adaptable. The purpose of this research project was to develop\u2026","rel":"","context":"In &quot;Malware&quot;","block_context":{"text":"Malware","link":"https:\/\/kalilinuxtutorials.com\/category\/malware\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjbCBsVm9kjeItUmtI4JM7YoR2p5cz8Gp8XDtpRbVU0cjTqIFWGHcWRr5gdrCUas_gOZRpDqzxN-iyIw7xSsTAgUtxmN2WAmNsDdo7aGCxVzH1sWydoQdzjAfDk37sSOL5piS5aD83S6rpLhFIsS13L1asitHJs3EAgMD_LWx-b7DlCdEDBpEL3QiiALX5Y\/s1600\/HellBunny%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjbCBsVm9kjeItUmtI4JM7YoR2p5cz8Gp8XDtpRbVU0cjTqIFWGHcWRr5gdrCUas_gOZRpDqzxN-iyIw7xSsTAgUtxmN2WAmNsDdo7aGCxVzH1sWydoQdzjAfDk37sSOL5piS5aD83S6rpLhFIsS13L1asitHJs3EAgMD_LWx-b7DlCdEDBpEL3QiiALX5Y\/s1600\/HellBunny%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjbCBsVm9kjeItUmtI4JM7YoR2p5cz8Gp8XDtpRbVU0cjTqIFWGHcWRr5gdrCUas_gOZRpDqzxN-iyIw7xSsTAgUtxmN2WAmNsDdo7aGCxVzH1sWydoQdzjAfDk37sSOL5piS5aD83S6rpLhFIsS13L1asitHJs3EAgMD_LWx-b7DlCdEDBpEL3QiiALX5Y\/s1600\/HellBunny%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjbCBsVm9kjeItUmtI4JM7YoR2p5cz8Gp8XDtpRbVU0cjTqIFWGHcWRr5gdrCUas_gOZRpDqzxN-iyIw7xSsTAgUtxmN2WAmNsDdo7aGCxVzH1sWydoQdzjAfDk37sSOL5piS5aD83S6rpLhFIsS13L1asitHJs3EAgMD_LWx-b7DlCdEDBpEL3QiiALX5Y\/s1600\/HellBunny%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjbCBsVm9kjeItUmtI4JM7YoR2p5cz8Gp8XDtpRbVU0cjTqIFWGHcWRr5gdrCUas_gOZRpDqzxN-iyIw7xSsTAgUtxmN2WAmNsDdo7aGCxVzH1sWydoQdzjAfDk37sSOL5piS5aD83S6rpLhFIsS13L1asitHJs3EAgMD_LWx-b7DlCdEDBpEL3QiiALX5Y\/s1600\/HellBunny%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjbCBsVm9kjeItUmtI4JM7YoR2p5cz8Gp8XDtpRbVU0cjTqIFWGHcWRr5gdrCUas_gOZRpDqzxN-iyIw7xSsTAgUtxmN2WAmNsDdo7aGCxVzH1sWydoQdzjAfDk37sSOL5piS5aD83S6rpLhFIsS13L1asitHJs3EAgMD_LWx-b7DlCdEDBpEL3QiiALX5Y\/s1600\/HellBunny%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":37246,"url":"https:\/\/kalilinuxtutorials.com\/kernel-callbacks-removal\/","url_meta":{"origin":34033,"position":3},"title":"Kernel Callbacks Removal : Bypassing EDR Detections","author":"Varshini","date":"March 24, 2025","format":false,"excerpt":"Kernel callbacks are essential components used by Endpoint Detection and Response (EDR) systems to monitor system events, such as process creation, image loading, and registry modifications. However, attackers have developed techniques to remove these callbacks, effectively blinding EDRs and allowing malicious activities to go undetected. Tools And Techniques Custom Callbacks\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Kernel-Callbacks-Removal-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Kernel-Callbacks-Removal-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Kernel-Callbacks-Removal-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Kernel-Callbacks-Removal-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Kernel-Callbacks-Removal-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Kernel-Callbacks-Removal-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":38660,"url":"https:\/\/kalilinuxtutorials.com\/how-edr-killers-bypass-security-tools\/","url_meta":{"origin":34033,"position":4},"title":"How EDR Killers Bypass Security Tools","author":"0xSnow","date":"March 19, 2026","format":false,"excerpt":"Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to detect and stop advanced threats in real time. However, attackers are increasingly deploying EDR killers, specialized techniques and tools designed to disable, evade, or bypass these protections before launching their primary payload. Traditionally, EDR bypass\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"EDR killers","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjvN_o79il97rOLvL2xX6koI3IzYR_Kz0W8O4BPjwE3MJHoB6ut7mNTF0ku8DoGohe06M7JrQsJyUBLA-kcIp7rkROy2AMBejvM9aSs9eUMIHIdzRiZGo2QpRCYEAY4I1WXjKQsDHLU7-TPdYfBOw_9CTNOn_bZdMj1fVkBdJyjCGBkxMhaTC_3PEhRmU8\/s700\/EDR%20killers.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjvN_o79il97rOLvL2xX6koI3IzYR_Kz0W8O4BPjwE3MJHoB6ut7mNTF0ku8DoGohe06M7JrQsJyUBLA-kcIp7rkROy2AMBejvM9aSs9eUMIHIdzRiZGo2QpRCYEAY4I1WXjKQsDHLU7-TPdYfBOw_9CTNOn_bZdMj1fVkBdJyjCGBkxMhaTC_3PEhRmU8\/s700\/EDR%20killers.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjvN_o79il97rOLvL2xX6koI3IzYR_Kz0W8O4BPjwE3MJHoB6ut7mNTF0ku8DoGohe06M7JrQsJyUBLA-kcIp7rkROy2AMBejvM9aSs9eUMIHIdzRiZGo2QpRCYEAY4I1WXjKQsDHLU7-TPdYfBOw_9CTNOn_bZdMj1fVkBdJyjCGBkxMhaTC_3PEhRmU8\/s700\/EDR%20killers.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjvN_o79il97rOLvL2xX6koI3IzYR_Kz0W8O4BPjwE3MJHoB6ut7mNTF0ku8DoGohe06M7JrQsJyUBLA-kcIp7rkROy2AMBejvM9aSs9eUMIHIdzRiZGo2QpRCYEAY4I1WXjKQsDHLU7-TPdYfBOw_9CTNOn_bZdMj1fVkBdJyjCGBkxMhaTC_3PEhRmU8\/s700\/EDR%20killers.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":36421,"url":"https:\/\/kalilinuxtutorials.com\/opentelemetry-rust\/","url_meta":{"origin":34033,"position":5},"title":"OpenTelemetry Rust : A Comprehensive Guide For Instrumenting Rust Applications","author":"Varshini","date":"February 13, 2025","format":false,"excerpt":"OpenTelemetry Rust is an implementation of the OpenTelemetry framework tailored for the Rust programming language. It provides tools, APIs, and SDKs to instrument applications, enabling the generation, collection, and export of telemetry data such as metrics, logs, and traces. This data is crucial for understanding software performance and behavior, particularly\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/OpenTelemetry-Rust.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/OpenTelemetry-Rust.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/OpenTelemetry-Rust.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/OpenTelemetry-Rust.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/OpenTelemetry-Rust.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/OpenTelemetry-Rust.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/34033","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=34033"}],"version-history":[{"count":4,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/34033\/revisions"}],"predecessor-version":[{"id":34038,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/34033\/revisions\/34038"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/34037"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=34033"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=34033"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=34033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}