Telemetry data elements
Configuration telemetry
Header
| Key | Description | Example |
|---|---|---|
| ver | The version of the telemetry event. | 1.0 |
| id | This is a unique identifier of the configuration event. | 9a7a774a-d7be-4b7e-bf43-d3adce32aadc |
| type | This is the event type used by Citrix Analytics Service to identify feature events. | Configuration |
| st | The timestamp when the event is generated by the deviceTRUST Agent. | 2025-04-16T12:00:00.0000Z |
| prod | Identify the originating product and deployment of the event. | deviceTRUST® |
| prodVer | deviceTRUST Agent product version. | 2507 LTSR.100.0 |
| tenant.orgid | Organizational ID that the installed licenses are associated with. | 12345 |
Payload
| Field | Description | Example |
|---|---|---|
| os_version | Operating System version that the deviceTRUST Agent is installed on. | 10.0.23501 |
| os_server | Determines if the Operating System is a server (e.g. Server 2022) rather than a client (e.g. Windows 11). | false |
| license_customer_id | The deviceTRUST license customer identifier extracted from a deviceTRUST license. | 22d6b9e0-b014-42f0-b870-af7067d27164 |
| device_id | Unique device identifier (BIOS serial number). scrambled | n7+hhF/2NRhfPG2U |
| policy_gpo_count | The number of GPO based policies. | 1 |
| policy_local_count | The number of Local policies (either 0 or 1). | 0 |
| policy_file_count | The number of File Based Policies. | 1 |
| imported_template_ids | Identifies any template that have been imported into the policy. | [ 4, 87 ] |
| context_count | The number of Context’s within the deviceTRUST Policy. | 8 |
| action_count | The number of Action’s within the deviceTRUST Policy. | 5 |
| message_count | The number of Message’s within the deviceTRUST Policy. | 14 |
| message_locale_count | The Message Locale’s in use within the deviceTRUST Policy. | 2 |
| properties_local | A bit-flag representing the properties that are collected from the local device. See Property Flag Lookup below. | 33560832 |
| properties_multihop | A bit-flag representing the properties that are collected from intermediate hops within a multi-hop architecture. See Property Flag Lookup below. | 33558528 |
| properties_remote | A bit-flag representing the properties that are collected from the remote device. See Property Flag Lookup below. | 20480 |
| properties_remote_ext | A bit-flag representing the extended properties that are collected from the remote device. See PropertiesExtended Flag Lookup below. | 32 |
| tasks | A bit-flag representing the tasks that are included within the policy. See Tasks Flag Lookup below. | 2053 |
| settings_enabled | Describes which settings that are configured by the customer. See Settings Flag Lookup below. | 3 |
| settings_config | Determines if various settings are configured. | 16 |
Usage telemetry
Header usage telemetry
| Key | Description | Example |
|---|---|---|
| ver | The version of the telemetry event. | 1.0 |
| id | This is a unique identifier of the configuration event. | 9a7a774a-d7be-4b7e-bf43-d3adce32aadc |
| type | This is the event type used by Citrix Analytics Service to identify feature events. | Usage |
| st | The timestamp when the event is generated by the deviceTRUST Agent. | 2025-04-16T12:00:00.0000Z |
| prod | Identify the originating product and deployment of the event. | deviceTRUST |
| prodVer | deviceTRUST Agent product version. | 2507 LTSR.100.0 |
| tenant.orgid | Organizational ID that the installed licenses are associated with. | 12345 |
Payload usage telemetry
| Field | Description | Example |
|---|---|---|
| license_customer_id | The deviceTRUST license customer identifier extracted from a deviceTRUST license. | 22d6b9e0-b014-42f0-b870-af7067d27164 |
| device_id | Unique device identifier (BIOS serial number). Scrambled | n7+hhF/2NRhfPG2U |
| duration | The number of seconds that the session was active. | 28452 |
| protocol | The protocol for the session. See Protocol Lookup below. | 3 |
| connected | Determines whether connectivity was established with the deviceTRUST Client Extension. | true |
| remote_platform | Identifies the remote platforms. See Platform Lookup below. | 4 |
| tasks_executed | Defines the types of task that were executed during the session.See Tasks Flag Lookup below. | 2053 |
Lookups
Platform Lookup
| Value | Description |
|---|---|
| 0 | Unknown |
| 1 | Windows |
| 2 | macOS |
| 3 | Linux |
| 4 | eLux® |
| 5 | IGEL |
| 6 | Rangee |
| 7 | NoTouch |
| 8 | ChromeOS |
| 9 | iOS |
Property Flag Lookup
| Flag | Description |
|---|---|
| 0x00000001 | Access Point |
| 0x00000002 | Browser |
| 0x00000004 | Cellular |
| 0x00000008 | Certificate |
| 0x00000010 | Display |
| 0x00000020 | Domain |
| 0x00000040 | Hardware |
| 0x00000080 | Input |
| 0x00000100 | Location |
| 0x00000200 | Logical Disk |
| 0x00000400 | Mapped Drive |
| 0x00000800 | MDM |
| 0x00001000 | Name |
| 0x00002000 | Network |
| 0x00004000 | OS |
| 0x00008000 | Password Policy |
| 0x00010000 | Power |
| 0x00020000 | Printer |
| 0x00040000 | Region |
| 0x00080000 | Remote Control |
| 0x00100000 | Remoting Client |
| 0x00100000 | Performance |
| 0x00200000 | Screen Saver |
| 0x00400000 | Security Product |
| 0x00800000 | Session |
| 0x01000000 | Smartcard Reader |
| 0x02000000 | User |
| 0x04000000 | Whois |
| 0x08000000 | Windows |
| 0x10000000 | Windows Defender |
| 0x20000000 | Windows Firewall |
| 0x40000000 | Windows Registry |
| 0x80000000 | Windows Update |
PropertyExtended Flag Lookup
| Flag | Description |
|---|---|
| 0x00000001 | macOS |
| 0x00000002 | macOS Firewall |
| 0x00000004 | macOS Update |
| 0x00000008 | Chrome OS |
| 0x00000010 | eLux |
| 0x00000020 | IGEL |
| 0x00000040 | NoTouch |
| 0x00000080 | iOS |
Protocol Lookup
| Value | Description |
|---|---|
| 0 | Unknown |
| 1 | Console |
| 2 | RDP |
| 3 | HDX/ICA |
Settings Flag Lookup
| Flag | Description |
|---|---|
| 0x00000001 | Advanced |
| 0x00000002 | Auditing |
| 0x00000004 | Custom Properties |
| 0x00000008 | File-Based Policy |
| 0x00000010 | Licensing |
| 0x00000020 | Mail Server |
| 0x00000040 | Map Drive |
| 0x00000080 | Microsoft AppLocker |
| 0x00000100 | Microsoft Entra ID |
| 0x00000200 | Mobile |
| 0x00000400 | Printer |
| 0x00000800 | Properties |
| 0x00001000 | Security |
| 0x00002000 | System Messages |
Tasks Flag Lookup
| Flag | Description |
|---|---|
| 0x00000001 | Audit Event |
| 0x00000002 | Citrix Policy |
| 0x00000004 | Deny Access |
| 0x00000008 | FSLogix App Masking |
| 0x00000010 | Logon Abort |
| 0x00000020 | Map Drive |
| 0x00000040 | Map Printer |
| 0x00000080 | Microsoft AppLocker |
| 0x00000100 | Microsoft Entra ID |
| 0x00000200 | Popup Message |
| 0x00000400 | Screen Saver |
| 0x00000800 | Send Mail |
| 0x00001000 | Shortcut |
| 0x00002000 | Terminate App |
| 0x00004000 | User Session |
| 0x00008000 | Web Request |
| 0x00010000 | Windows Firewall |
| 0x00020000 | Windows Policy |
| 0x00040000 | Windows Registry |
| 0x00080000 | Custom Process |
Telemetry data elements
Copied!
Failed!