Intelligence Telemetry

Displaying cybersecurity incidents in a dashboard requires structured, high-quality telemetry. The Intelligence telemetry payload provides network intelligence indicators generated by the Netify Intelligence plugin.

This structure is optimized for downstream enrichment, alerting, and policy workflows. By combining indicator scores with emitted criteria values, integrators can tune thresholds, differentiate LAN/WAN trigger behavior, and maintain clear explainability across security analytics pipelines.


Requirements

Plugin Release
1.2.0

Risk Overview

Intelligence telemetry maps explainable risk indicators to observed network flows, making it easy to assess exposure across devices, applications, and protocols. These indicators highlight high-value risks such as encrypted tunnels that bypass local controls, anomalous TLS certificate behavior, weak encryption, and traffic consistent with proxy or relay services.

Each detection includes relevant context and a normalized risk score (Informational to Critical), allowing operators to quickly prioritize and respond.

The same indicators can drive enforcement policies, real-time alerts, or managed monitoring services. Because both context and scoring are preserved, operators can tune thresholds, reduce false positives, and deliver clear, actionable insights.

Risk Scoring

Score Description
0 Informational
1-25 Low Risk
26-50 Medium Risk
51-75 High Risk
76-100 Critical Risk

Risks are scored on a scale of 0 to 100 and grouped into 5 categories.

Attributes

Once the output plugin is configured, intelligence telemetry will be emitted in one of three formats described below. All formats share a common intel object, which contains the core fields for each detection. These fields capture the detection category, trigger event, indicator identity, and risk score, providing the context required for downstream alerting, correlation, and policy workflows.

category

string
Intelligence category tag associated with the indicator.
Reference: Driver categories

criteria

object
Resolved criteria values used when evaluating the indicator.

event

string
Detection lifecycle event that triggered the indicator.
Values:
dpi_new dpi_update dpi_complete flow_new flow_stats flow_expiring flow_expired

indicator

string
Configured tag of the indicator that generated the detection.

indicator_driver

string
Tag of the driver that powered the detection.
Reference: Driver tag catalog

score

integer
Risk/severity score assigned to the indicator.
Reference: See above

Intelligence Telemetry: Core Attributes

"intel": [
  {
    "category": "tls_certificate_audit",
    "criteria": {
      "min_bytes": 0,
      "min_score": 0,
      "trigger_on_east_west": true,
      "trigger_on_wan": true
    },
    "data_feed": "tls_cert_self_signed",
    "event": "dpi_complete",
    "indicator": "tls_cert_self_signed_remote",
    "indicator_driver": "tls_cert_self_signed",
    "score": 80
  },
  ...
]

Formats

The Intelligence telemetry is provided in three different formats. The choice of format mostly depends on how other telemetry data is being ingested.

Full

When flow_metadata is set to full, the complete flow record is emitted along with the additional intel attribute object described above. Refer to the flow telemetry documentation for full field definitions.

This record format is typically used in environments where only aggregated telemetry is collected, not full flows. Including the full flow in the Intelligence telemetry ensures that all necessary context is available without requiring correlation with external datasets.

Minimalist

When flow_metadata is set to none, a minimalist telemetry record is emitted.

This format is designed for environments where full flow records are already being collected independently. The additional intel attribute is delivered separately and linked to the existing flow record using the flow digest, enabling efficient correlation without duplicating data.

Intelligence Telemetry: Minimalist

{
  "flow": {
    "digest": "5e8529b046a53bfd3787eb7272675...",
    "digest_prev": [
      "355d412cf9a8a6f1cc583bffa7da9f876603998f",
      "5e8529b046a53bfd3787eb7272675662d3865cbf"
    ],
    "intel": [
      {
        "category": "vpn_detection",
        "criteria": {
          "min_bytes": 0,
          "min_score": 0,
          "trigger_on_east_west": true,
          "trigger_on_wan": true
        },
        "data_feed": "vpn_server_consumer",
        "event": "dpi_complete",
        "indicator": "vpn_server_consumer",
        "indicator_driver": "vpn_server_consumer",
        "score": 70
      }
    ],
    "last_seen_at": 1775750510867
  },
  "interface": "eno1",
  "internal": true,
  "type": "flow_intel"
}

Stats

When flow_metadata is set to stats, a flow record with summarized statistics is emitted.

This record type is intended for analyzing the underlying indicators that triggered detection. The included statistics reflect activity observed up to the point of detection, rather than the complete lifecycle of the flow.

Intelligence Telemetry: Stats

{
  "flow": {
    "detection_packets": 6,
    "digest": "731246630167090d8f9eceffbc4f1...",
    "digest_prev": [
      "5017058958a6fa49217a594de4d169a0e4e3e180",
      "731246630167090d8f9eceffbc4f15d705d616c1"
    ],
    "intel": [
      {
        "category": "tor_detection",
        "criteria": {
          "min_bytes": 0,
          "min_score": 0,
          "trigger_on_east_west": true,
          "trigger_on_wan": true
        },
        "data_feed": "tor_relay",
        "event": "dpi_complete",
        "indicator": "tor_relay",
        "indicator_driver": "tor_relay",
        "score": 70
      }
    ],
    "last_seen_at": 1775751029770,
    "local_bytes": 2076,
    "local_packets": 6,
    "local_rate": 2076.0,
    "other_bytes": 1528,
    "other_packets": 4,
    "other_rate": 1528.0,
    "tcp": {
      "resets": 0,
      "retrans": 0,
      "seq_errors": 0
    },
    "total_bytes": 3604,
    "total_packets": 10
  },
  "interface": "eno1",
  "internal": true,
  "type": "flow_intel"
}