Skip to content

C-Prot macOS File Open/Access#182

Closed
husnuoner wants to merge 1 commit into
tsale:mainfrom
husnuoner:patch-5
Closed

C-Prot macOS File Open/Access#182
husnuoner wants to merge 1 commit into
tsale:mainfrom
husnuoner:patch-5

Conversation

@husnuoner
Copy link
Copy Markdown
Contributor

EDR Telemetry Pull Request

Contribution Details

This pull request updates and validates macOS File Open/Access telemetry for the C-Prot EDR product. The contribution demonstrates that file open and access activities on a macOS endpoint are correctly detected and ingested into the EDR management platform.

Telemetry Validation

This contribution meets the EDR Telemetry definition by demonstrating visibility into macOS file open/access activities. The telemetry captures file access events on the endpoint and successfully reports these events to the management console for investigation and response purposes.

Documentation or Evidence:

  • Screenshots attached
  • Sanitized logs provided
  • Official documentation
  • Private documentation (will share confidentially)

Evidence Screenshots

Execution Evidence (macOS Endpoint)

The following screenshot shows the test executable run on the macOS endpoint to trigger file open/access activity as part of the telemetry validation process.

C-Prot_macOS_File_Access_Telemetry_Exec_Evidence

Management Console Evidence

The following screenshot confirms that the file open/access telemetry is successfully received and displayed in the C-Prot Management Console (CSC).

C-Prot_macOS_File_Access_CSC_Evidence

Type of Contribution

  • Adding telemetry information for an existing EDR product
  • Adding a new EDR product that meets eligibility criteria
  • Proposing new event categories/sub-categories
  • Documentation improvement
  • Tool enhancement

Validation Details

EDR Product Information

  • EDR Product Name: C-Prot EDR
  • EDR Version: N/A
  • Operating System(s) Tested: macOS

Testing Methodology

A controlled file open/access activity was performed on the macOS endpoint using a test executable. The activity triggered file access telemetry events. Telemetry was validated by confirming that the corresponding event data was successfully ingested and displayed in the C-Prot Management Console (CSC).

Additional Notes

All testing was performed in a controlled environment. Any sensitive information present in the screenshots has been sanitized where applicable.

csc_telemetry_file-manipulation-event-log_2026-05-11T10-35Z_2026-05-12T10-35Z.json.gz

@tsale tsale mentioned this pull request May 13, 2026
5 tasks
@tsale
Copy link
Copy Markdown
Owner

tsale commented May 13, 2026

Closing this PR as superseded by the consolidated OS-scoped C-Prot macOS PR: #195.

Thanks again for the contribution.

@tsale tsale closed this May 13, 2026
tsale added a commit that referenced this pull request May 14, 2026
* Update C-Prot macOS telemetry coverage

Consolidates C-Prot macOS telemetry updates from PRs #182-#190 into one OS-scoped change set.

* fix: adjust C-Prot macOS telemetry statuses

Keep Raw Device Access accepted based on direct raw device access evidence, but leave Process Access and Process Injection Or Tampering as No because the submitted evidence is detection/prevention-oriented rather than direct telemetry.

---------

Co-authored-by: Hermes Agent <hermes-agent@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants