Skip to content

C-Prot macOS Process Injection Or Tampering#185

Closed
husnuoner wants to merge 1 commit into
tsale:mainfrom
husnuoner:patch-8
Closed

C-Prot macOS Process Injection Or Tampering#185
husnuoner wants to merge 1 commit into
tsale:mainfrom
husnuoner:patch-8

Conversation

@husnuoner
Copy link
Copy Markdown
Contributor

EDR Telemetry Pull Request

Contribution Details

This pull request updates and validates macOS Process Injection/Tampering telemetry for the C-Prot EDR product. The contribution demonstrates that process injection and tampering activities on a macOS endpoint are correctly detected and ingested into the EDR management platform.

Telemetry Validation

This contribution meets the EDR Telemetry definition by demonstrating visibility into macOS process injection and tampering activities. The telemetry captures process injection/tampering events on the endpoint and successfully reports these events to the management console for investigation and response purposes.

Documentation or Evidence:

  • Screenshots attached
  • Sanitized logs provided
  • Official documentation
  • Private documentation (will share confidentially)

Evidence Screenshots

Execution Evidence (macOS Endpoint)

The following screenshot shows the test executable run on the macOS endpoint to trigger process injection/tampering activity as part of the telemetry validation process.

C-Prot_macOS_Process_Injection_Telemetry_Exec_Evidence

Management Console Evidence

The following screenshot confirms that the process injection/tampering telemetry is successfully received and displayed in the C-Prot Management Console (CSC).

C-Prot_macOS_Process_Injection_CSC_Evidence

Type of Contribution

  • Adding telemetry information for an existing EDR product
  • Adding a new EDR product that meets eligibility criteria
  • Proposing new event categories/sub-categories
  • Documentation improvement
  • Tool enhancement

Validation Details

EDR Product Information

  • EDR Product Name: C-Prot EDR
  • EDR Version: N/A
  • Operating System(s) Tested: macOS

Testing Methodology

A controlled process injection/tampering activity was performed on the macOS endpoint using a test executable. The activity triggered process injection and tampering telemetry events. Telemetry was validated by confirming that the corresponding event data was successfully ingested and displayed in the C-Prot Management Console (CSC).

Additional Notes

All testing was performed in a controlled environment. Any sensitive information present in the screenshots has been sanitized where applicable.

csc_telemetry_process-activity-log_2026-05-11T11-38Z_2026-05-12T11-38Z.json.gz

@tsale tsale mentioned this pull request May 13, 2026
5 tasks
@tsale
Copy link
Copy Markdown
Owner

tsale commented May 13, 2026

Closing this PR as superseded by the consolidated OS-scoped C-Prot macOS PR: #195.

Thanks again for the contribution.

@tsale tsale closed this May 13, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants