Skip to content

C-Prot macOS telemetry updates#195

Merged
tsale merged 2 commits into
mainfrom
c-prot-macos-telemetry-consolidated
May 14, 2026
Merged

C-Prot macOS telemetry updates#195
tsale merged 2 commits into
mainfrom
c-prot-macos-telemetry-consolidated

Conversation

@tsale
Copy link
Copy Markdown
Owner

@tsale tsale commented May 13, 2026

EDR Telemetry Pull Request

Contribution Details

Consolidates the C-Prot macOS telemetry updates that were originally submitted as separate PRs for individual subcategories:

Changed file:

  • EDR_telem_macOS.json

Telemetry Validation

Documentation or Evidence:

  • Official documentation
  • Screenshots attached
  • Sanitized logs provided
  • Private documentation

This PR preserves the submitted C-Prot macOS changes as a single OS-scoped review unit. Evidence details remain as provided by the contributor in the original PRs and should be reviewed before publication/merge.

Type of Contribution

  • Adding telemetry information for an existing EDR product

Validation Details

EDR Product Information

  • EDR Product Name: C-Prot EDR
  • EDR Version: Not specified in the original PRs
  • Operating System(s) Tested: macOS

Testing Methodology

Not specified in the original PRs. This consolidation was validated mechanically by:

Additional Notes

This PR is intended to replace the individual C-Prot macOS PRs listed above so the project can review multiple same-OS telemetry changes in one pull request.

Consolidates C-Prot macOS telemetry updates from PRs #182-#190 into one OS-scoped change set.
@tsale
Copy link
Copy Markdown
Owner Author

tsale commented May 13, 2026

@husnuoner thank you for the C-Prot EDR telemetry contributions.

For future submissions, please group related telemetry updates into a single pull request per operating system rather than opening one pull request per individual category or row. For example:

  • one PR for multiple Windows changes
  • one PR for multiple Linux changes
  • one PR for multiple macOS changes

This makes review, validation, and merging much easier for the project.

I’ve consolidated the current submissions into OS-scoped PRs here:

• macOS: #195
• Windows: #196

Thanks again for contributing.

Keep Raw Device Access accepted based on direct raw device access evidence, but leave Process Access and Process Injection Or Tampering as No because the submitted evidence is detection/prevention-oriented rather than direct telemetry.
@tsale
Copy link
Copy Markdown
Owner Author

tsale commented May 14, 2026

Thanks for the evidence @husnuoner. Everything looks good except Process Access and Process Injection/Tampering.

Raw Device Access is accepted because the test successfully read from /dev/rdisk0, and the exported event directly records the raw device access attempt.

Process Access and Process Injection/Tampering are staying as No for now. Those events look more like detection/prevention records and do not expose enough direct telemetry detail for scoring under the project methodology.

@tsale tsale merged commit 4e92f79 into main May 14, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants