Telemetry
Need licensing information or access to our products?

Telemetry

Threat intel requires analyzing raw data about cyber threats, attacker behavior, and indicators such as IP addresses, malware, and IOCs to produce actionable insights. Telemetry is the raw version of this data before analysis. Telemetry is automated data collected from devices and systems about their behavior, performance, and activity, transmitted to a central system for analysis.

To support strict data‑privacy needs, SYNERGIX LEDR forwards Security and Sysmon events directly from Windows clients and Active Directory Domain Controllers exclusively to the customer’s own Azure tenant—ensuring log data remains fully under customer control and is never stored elsewhere.

Once ingested into Azure Log Analytics Workspace, customers can immediately leverage built‑in KQL queries to detect various attacks, such as Kerberoasting activity, and create additional custom KQL searches to identify other potential threats across their environment.

Telemetry

Benefits

Security, Sysmon Events and Directory Services logs are forwarded to Azure Log Analytics Workspace. These include Authentication logs (successful/failed logins), DNS queries, Endpoint activity (process start, file writes), Malware execution traces.
Telemetry provides the raw indicators (failed logins, suspicious DNS queries, system calls) that threat intelligence tools use to detect adversary behavior. Threat intelligence relies on correlating such data to identify attacker tactics, techniques, and procedures (TTPs)
Telemetry provides signals like: IPs contacting command-and-control servers Malware file operations URL navigation behavior These signals enable analysts to map infrastructure and understand campaigns.
In security investigations, knowing what devices exist is just as important as knowing what happened on them. Device Inventory Data in LEDR includes details about devices, applications, data stores, configurations, network presence, and ownership.
Telemetry enables anomaly detection baseline modeling intelligence enrichment.

Have a question?
Send us a message

By submitting, I agree to the use of my personal data in accordance with the Privacy Policy.