The Windows agent captures LLM usage metadata using a Windows Filtering Platform (WFP) kernel-mode callout driver. It observes outbound TLS connections by extracting SNI hostnames — it never blocks traffic and never inspects content.Documentation Index
Fetch the complete documentation index at: https://docs.toktra.dev/llms.txt
Use this file to discover all available pages before exploring further.
Requirements
- Windows 10 (version 1809 / build 17763) or later, 64-bit
- Administrator privileges for installation
- Intune, SCCM, or local
msiexecfor deployment
How it works
The agent has three components that work together:- WFP callout driver (
toktra-wfp.sys) — A KMDF kernel-mode driver that registers WFP callouts at theFWPM_LAYER_ALE_AUTH_CONNECT_V4and V6 layers. When an outbound TLS connection is established, thesni_inspectorextracts the SNI hostname from the TLS ClientHello. The driver always permits the connection — it only observes and records. Traffic is never blocked or modified. - Windows Service (
ToktraAgent.exe) — A user-mode Windows Service that polls the driver, batches events, and transmits telemetry securely to Toktra over mTLS. - Edge extension — A Manifest V3 browser extension included with the MSI installer that captures browser-based LLM usage. See Browser Extensions for details.
The WFP driver operates in observe-only mode. It calls
FwpsCompleteOperation with FWP_ACTION_PERMIT on every connection — traffic is never delayed, blocked, or modified.Installation
- Intune (recommended)
- SCCM
- Manual (msiexec)
Deploy the MSI silently via Microsoft Intune for managed fleet rollout.
Upload the MSI to Intune
In the Intune admin center, navigate to Apps → Windows → Add → Line-of-business app and upload
ToktraAgent.msi.MSI properties
The following properties can be passed on themsiexec command line or set via Intune app configuration:
| Property | Description | Default |
|---|---|---|
INGEST_URL | Toktra ingest URL | https://ingest.toktra.io |
ORG_ID | Toktra organization identifier | — |
DEVICE_ID | Device identifier (auto-generated if omitted) | — |
CERT_SUBJECT | Certificate CN for mTLS client certificate lookup | Toktra Device |
LOG_LEVEL | Log verbosity: 0=Error, 1=Warn, 2=Info, 3=Debug | 2 |
ToktraAgent.exeand supporting libraries to%ProgramFiles%\Toktra\Agent\toktra-wfp.systo%SystemRoot%\System32\drivers\- Registry configuration at
HKLM\SOFTWARE\Toktra\Agent
Configuration
All agent configuration is stored in the Windows Registry atHKLM\SOFTWARE\Toktra\Agent. The MSI writes initial values during installation. You can update them with reg add or via Group Policy / Intune registry CSP.
Device certificate (mTLS)
The Windows agent uses the Windows Certificate Store for mTLS client certificates — not the filesystem. On first run, the Windows Service generates an Ed25519 key pair, sends a CSR to the Toktra enrollment endpoint, and installs the signed device certificate into the Local Machine certificate store under theMy (Personal) container. The certificate subject matches the CertSubject registry value. The service looks up the certificate by subject at startup.
Device certificates are valid for 90 days and renew automatically.
Budget enforcement
When department budget hard caps are enabled, the agent displays native budget status in the system tray. Over-budget requests are reported through the tray icon with a notification. Server-side enforcement acts as the authoritative gate.Service management
TheToktraAgent Windows Service is installed with Start=Auto and DelayedAutoStart=Yes. It starts automatically at boot.
ToktraAgent source.
Uninstall
To remove the agent:ToktraWFP), stops and deletes the Windows Service, and removes all files and registry keys created during installation.