Skip to main content

Telemetry Reference

The TridentStack Control agent collects system state data at regular intervals and sends it to the platform for analysis, scoring, and compliance evaluation. This page documents every category of data the agent collects.

Telemetry Categories

System Information

Core operating system and hardware details collected on agent startup and periodically refreshed.

Data PointDescriptionPlatforms
OS name and versione.g., "Windows 11 Pro 24H2", "Ubuntu 22.04"Windows, Linux
OS build numberFull build including UBR (e.g., "26100.2605")Windows
OS architecturex64, x86, ARM64Windows, Linux
OS editionProfessional, Enterprise, ServerStandardWindows
System localee.g., "en-US"Windows
CPU detailsProcessor model and core countWindows, Linux
RAMTotal and available memoryWindows, Linux
Disk partitionsMount points, total/free space, system drive flagWindows, Linux

Windows Defender Status

Antivirus and endpoint protection state (Windows only).

Data PointDescription
Signature versionCurrent definition version (e.g., "1.425.67.0")
Signature ageHours since last definition update
Engine versionAntimalware engine version
Product versionDefender product version
Out-of-date flagWhether Defender considers signatures stale
Real-time protectionWhether real-time scanning is active

EDR and Third-Party Antivirus

Detection of installed security products beyond Windows Defender.

Data PointDescriptionPlatforms
Product nameName of detected EDR/AV productWindows
VendorProduct vendorWindows
VersionInstalled versionWindows
Enabled statusWhether the product is activeWindows
Primary flagWhether this is the primary antivirusWindows

Software Inventory

Complete enumeration of installed applications.

Windows:

Data PointDescription
Application nameDisplay name from the registry
VersionInstalled version string
PublisherVendor or company
Install pathInstallation directory
Install dateWhen the application was installed
SizeInstallation size
Install sourcePackage manager used (Winget, MSI, etc.)
Package IDWinget package identifier, if applicable

Linux:

Data PointDescription
Package namee.g., "openssl", "nginx"
VersionInstalled version
Architectureamd64, arm64, i386
SizeInstalled size
Source repositorymain, universe, security, etc.
DescriptionShort package description

Network Configuration

Network interfaces and connectivity details.

Data PointDescriptionPlatforms
Interface namee.g., "Ethernet", "eth0"Windows, Linux
MAC addressHardware addressWindows, Linux
IP addressesIPv4 and IPv6 addressesWindows, Linux
Subnet / CIDRNetwork maskWindows, Linux
GatewayDefault gateway addressWindows, Linux
DNS serversConfigured DNS resolversWindows, Linux
Connection statusConnected, disconnectedWindows, Linux
Interface typeEthernet, Wireless, VPN, LoopbackWindows, Linux
SpeedLink speed in MbpsWindows, Linux

Network Ports and Exposure

Listening ports with process attribution and firewall context. See Network Exposure for full details.

Data PointDescriptionPlatforms
Port and protocolPort number with TCP/UDPWindows, Linux
Binding addressWhat address the service listens onWindows, Linux
Process name and pathWhich process holds the portWindows, Linux
Process signingWhether the executable is signedWindows
Firewall stateWhether the firewall allows inboundWindows
Service identityWindows service name and display nameWindows
Docker containerContainer name and image for docker-proxy portsLinux

Policy State

Configuration policy data from multiple sources (Windows only).

Data PointDescription
Platform policy settingsSettings pushed by TridentStack Control
Domain GPO settingsActive Directory Group Policy (via gpresult)
Intune MDM settingsMobile Device Management policies (via CSP registry)
Local registry settingsValues not claimed by other sources
Security policiesAccount lockout, password policy, UAC settings
Audit policiesWindows audit policy configuration

Windows Services

State of all Windows services.

Data PointDescription
Service nameInternal service name
Display nameHuman-readable name
StatusRunning, Stopped, Disabled
Start typeAutomatic, Manual, Disabled
Binary pathExecutable location
Service accountAccount the service runs under

Certificates

Installed certificates across all certificate stores (Windows only).

Data PointDescription
SubjectCertificate subject (CN)
IssuerCertificate authority
ThumbprintSHA-1 fingerprint
Expiration dateWhen the certificate expires
StoreCertificate store location (Trusted Root, Personal, etc.)
Key lengthCryptographic key size
Self-signed flagWhether the certificate is self-signed

Windows Features

Installed Windows features and roles (Windows only).

Data PointDescription
Feature namee.g., "Hyper-V", "IIS", "Windows Subsystem for Linux"
StatusEnabled or Disabled

Scheduled Tasks

Scheduled tasks and their configuration (Windows only).

Data PointDescription
Task nameName and folder path
StatusReady, Running, Disabled
TriggerSchedule type (on boot, at logon, cron-like)
Last/Next runPrevious and upcoming execution times
Last resultExit code from most recent run
Run-as userAccount the task executes under
ActionCommand or script executed

Local Groups and Membership

Local group membership (Windows only).

Data PointDescription
Group namee.g., "Administrators", "Remote Desktop Users"
MembersUsers and groups in each local group
Member typeLocal User, Domain User, Group
Domain membershipDomain name and controller, if domain-joined

Defender ASR Rules

Attack Surface Reduction rule state (Windows only).

Data PointDescription
Rule IDGUID of each ASR rule
Rule namee.g., "Block Office apps from creating child processes"
ModeBlock, Warn, Audit, or Off

Extended Security Updates (ESU)

ESU license state for older Windows versions (Windows only).

Data PointDescription
ESU statusActive, None, or Not Applicable
ESU yearYear 1, 2, or 3 of extended support

.NET Versions

Installed .NET Framework and .NET runtime versions (Windows only).

Data PointDescription
Framework versionsAll installed .NET Framework versions (3.5, 4.8, etc.)
Modern runtimes.NET 5+ runtimes (NETCore, AspNetCore, WindowsDesktop)

Office Installation

Microsoft Office details (Windows only).

Data PointDescription
ProductsInstalled Office products
Architecture32-bit or 64-bit
VersionInstalled version
Update channelCurrent, Monthly Enterprise, Semi-Annual, etc.

Reboot State

Whether the system is pending a restart.

Data PointDescriptionPlatforms
Reboot pendingWhether updates or configuration changes require a restartWindows, Linux
WUA install eventsWindows Update Agent events since last boot (KB, status, error code)Windows

Pre-Staged Files

Downloaded update files waiting to be installed.

Data PointDescriptionPlatforms
KB numberUpdate identifierWindows
FilenameDownloaded file nameWindows
File sizeSize of the downloaded fileWindows
Download timeWhen the file was downloadedWindows

Collection Schedule

Telemetry TypeDefault IntervalTrigger
System informationOn startup, then periodicAlso on-demand via Refresh
Software inventoryOn startup, then periodicAlso after app install/uninstall
Network portsEvery 1 hourAlso on-demand via Refresh
Policy stateOn check-inWhen policy changes detected
CertificatesPeriodicOn-demand via Refresh
ServicesPeriodicOn-demand via Refresh
Defender statusPeriodicOn-demand via Refresh

All telemetry can be refreshed on-demand from the agent detail page using the Refresh button on each tab.

How Telemetry Is Used

Telemetry data flows through several analysis services after collection:

ServiceWhat It Does
Vulnerability ScannerMatches installed software against CVE databases to detect known vulnerabilities
Update ApplicabilityDetermines which system updates apply to the endpoint based on OS version and installed KBs
App ApplicabilityDetermines which application updates are available based on installed software versions
Compliance EvaluatorEvaluates agent state against assigned compliance frameworks (CIS, DISA STIG, etc.)
Health ScoreCombines vulnerability, compliance, update, and network data into the overall health score

Data Quality

The agent includes quality safeguards in its telemetry:

  • State hashing: Each telemetry payload includes a SHA-256 hash so the server can detect duplicate data and skip redundant processing.
  • Error reporting: If any individual data collection fails, the agent reports the error alongside the data it could collect, rather than failing the entire telemetry cycle.
  • Version tracking: Each telemetry message includes a schema version for forward compatibility.