Select the tab
ESET Inspect On-Prem – Table of Contents

Data Collection

Data collection settings impact how data is stored in the database.

Regardless of the user's option, all low-level raw events are collected on the endpoints, sent to the server and processed by the rule engine, which generates detections when appropriate.

When detection is generated for a specific event, this specific event is also stored in the database regardless of the selected data collection option. For the events processed by the rule-engine without triggering detection, data collection settings apply as follows:

Store all available data

All collected low-level raw events are stored in the database. This option creates a vast database but allows detailed investigation of possible incidents because the analyst can see everything that happened on the system, regardless of whether it was previously flagged as suspicious by the product or not.

This option allows using all the product's features, such as retroactive search, execution of Threat Hunting queries or a re-run of existing or custom rules on the data.

Store most important data

Stores all the data related to the processes (for instance, you will see all processes executed on the endpoints along with their properties, such as command line, etc.). It also limits the storage of low-level events generated by the processes only to those generating the detection. It means the analyst will see a complete process tree during the investigation (be aware that the data retention setting applies here). Still, for the actions of the processes (such as writing to the disk, writing to the registry, network connection etc.), the analyst will see only those explicitly caught by the rule.

This may turn into a situation where you will see a network connection (detected by the rule) but will not see that the downloaded file was written to the disk (unless another rule does not detect a specific file write). Similarly, you will not be able to retroactively search for IOCs that are not connected to the process/file and were not detected by the rule previously. For example, you will find a file hash or command line fragment but not the registry write anymore.

Suppose you are missing some important events using this option. In that case, you can still customize this setting by creating custom rules (typically with low severity, which you will ignore during the monitoring) that will solely detect events of your interest to save these low-level events to the database.

Store only data directly related to detections

This option stores only those low-level event data explicitly caught by the rule, creating the smallest database in this mode. It applies to the actions (such as writing to the disk, writing to the registry, network connection etc.) and to the processes themselves (process execution, command line, etc.). However, when detection is triggered for the process, process-related data for the process itself, and with the process-related data about all the processes upwards, the process tree and direct child processes will be stored. (Storing process-related data for these additional processes will not store other data, such as "action-related" events.) The database will not store information about all the other processes.

That means that similarly to the option "Store most important data" you may not see some actions and, in this case, also processes that were not explicitly caught by the rule (and are not in that stored part of the process tree mentioned above) with the corresponding consequences. The process tree will not show processes for stored data.

The ability to retroactively search for IOCs would be minimal since you will see neither IOCs related to actions nor IOCs related to process properties (command line, etc.) unless they were detected by the rule previously.

As mentioned in the previous option, you can customize this setting by creating custom rules (typically with low severity, which you will ignore during the monitoring) that will detect events of your interest (including process execution) to save these low-level events to the database.


Important

As mentioned, the storage of low-level event data is significantly affected by which events are detected. It means that lowering the number of enabled rules will, in turn, also decrease the amount of stored data (available for investigation and retroactive search). This should be considered when lowering the Data Collection settings and disabling some rules simultaneously.

For example, selecting "Store only data directly related to detections" and disabling all the rules will lead to storing no data at all and thus causing the product to be dysfunctional.

Store most important data/Store only data directly related to detections

Some features are limited:

Events view

Aggregated events view

Background tasks

Scripts view

Search

The goal is to control the database size. The user is making a trade-off between database size and some advanced options.

Store only data directly related to detections option is recommended for IT Administrators.

To change what data is stored in the database, go to Admin > Server Settings in the Database Collection section.

Data Retention

Select how long the data should be in the database stored. The longer the period, the more extensive database will become before old data is purged.

Choose how long you want the data in the database to be stored. By default, it is three months.

Choose how long you want the low-level data in the database to be stored. By default, it is one month. Low-level data accounts for most of the database size and should be kept as brief as possible. It only limits detailed investigations of data not identified as suspicious by the product when removed.

This setting can be changed in Admin > Server Settings in the Database cleanup section.

Telemetry capabilities

ESET Inspect Connector collects low-level telemetry data from endpoints. The following sections describe the telemetry categories and their support status.

Process activity

Process creation and termination

Process access (only for LSASS.exe process)

Image/library loaded

Remote thread creation

Win32 API telemetry (limited set of APIs)

File manipulation

File creation (only for executable files saved to the disk)

File deletion

File modification

File renaming

User account activity

Local account creation, modification, and deletion

Account login and logoff

Network activity

TCP connection

URL

DNS query

File downloaded (only for executable files)

Hash algorithms

MD5

SHA

Registry activity

Key/value creation, modification, and deletion

Scheduled task and service activity

Scheduled task creation

Service creation

Driver activity

Driver loaded

Device operations

Virtual disk mount

Named pipe activity

Pipe creation

WMI activity

WMI event consumer

WMI event filter

WMI event consumer to filter binding

Other telemetry

Volume shadow copy deletion

BIT JOBS activity

PowerShell script-block activity

Connector install, uninstall, keep-alive, and errors