Which telemetry sources most improve detection of living-off-the-land attackers?

Telemetry that matters

High-value telemetry centers on process creation and command-line arguments, PowerShell and Windows script logging, host-based instrumentation, and DNS and proxy records. Process creation events carry the provenance of executed binaries and the exact command lines that often expose living-off-the-land misuse, while PowerShell ScriptBlock logging and the Antimalware Scan Interface capture scripted payloads and deobfuscated commands that attackers try to hide. Sysmon and extended Windows Event Logs supply the rich metadata needed to correlate parent-child process chains and code signing status, enabling detection of lateral movement and privilege escalation. Network telemetry such as DNS queries, HTTP proxy logs, and TLS metadata provides external context for beaconing and data exfiltration that native tools alone cannot reveal.

Implementation and consequences

Operationalizing these sources requires attention to collection and retention policies, as well as normalization into detections and hunt queries. Kevin Mandia at Mandiant emphasizes that insufficient telemetry leads to longer dwell times and missed attribution opportunities, increasing organizational risk. Where logging defaults are disabled or telemetry ingestion is limited by bandwidth or privacy constraints, attackers gain a measurable advantage. Cultural and territorial nuances also matter: sectors with strict data sovereignty rules may restrict centralized cloud telemetry, requiring more sophisticated on-premise collection and local analyst training.