What Is Telemetry in Cybersecurity?
On This Page
FAQs
"Logs" are atype of telemetry, but "telemetry" is a broader, more modern term. "Logs" often implies static, text-based files (like an event log). "Telemetry" includes those logs but also richer, real-time data streams, like network flows, process events, API calls, and other dynamic data that isn't always captured in a simple log file.
Not always. More data isn't useful if you can't analyze it. Having "more" data can actually make itharder to find threats by increasing the noise. The goal is to collect the right telemetry—high-fidelity data from critical sources—and have a powerful system (or human team) to analyze it effectively.
This is data collected specifically from endpoints (laptops, servers). It’s one of the most valuable types of telemetry for threat hunting because it shows you exactly what happened on a device. It includes things like: which user ran what program, what files that program touched, and what network connections it opened.
You can't investigate a breach without evidence.Telemetry is the evidence. When a breach happens, incident responders use telemetry data (logs, network traffic) to "rewind the tape." It's how they answer critical questions like: How did the attacker get in? What did they steal? And are they still here?
Three main reasons:
Volume: The sheer amount of data is massive, making it expensive to store and slow to search.
Speed: It's generated 24/7 in real-time, and you have to analyze it just as fast.
Noise: 99.999% of telemetry is normal, benign activity. Finding the tiny signal of an attack in that massive haystack is incredibly difficult.