LogoLogo
Back to binalyze.com
  • Welcome | Binalyze Knowledge Base
  • AIR
    • AIR
    • Introduction
      • What is AIR?
      • Terminology
      • Architecture
        • AIR Responder Architecture; overview and performance analysis
        • AIR Task Flow and Management
      • Network Communication
      • Cloud Forensics with Binalyze AIR
    • AIR Setup
      • Console Hardware Requirements
      • Console Pre-Installation
      • Console Installation
      • Microsoft Azure Cloud Platform Integration
      • AIR Relay Server
        • What is AIR Relay Server?
        • Requirements for installation
        • How to install a Relay Server on different Linux platforms
        • How to change IP address of Relay Server
        • How to install a Responder with Relay Server support
        • Proxy configurations
          • Adding proxy to Relay Server
          • Adding proxy to Responder
        • Service Management for Relay Server
        • Whitelisting for Relay Server
        • Retrieving metrics from Relay Server
        • Updating and Uninstalling Relay Server
        • Troubleshooting
      • AIR Responder - Supported Operating Systems
        • AIR Responder - MS Windows supported systems
        • AIR Responder - Apple macOS supported systems
        • AIR Responder - Linux (DEB/RPM) supported systems
        • AIR - ESXi Standalone Collector
        • AIR Responder - Chrome supported systems
          • AIR For Chrome
      • AIR Responder Hardware Requirements
      • AIR Responder Deployment
        • Golden Image
        • Responder & Active Directory OUs
        • AIR Responder Exception Rules
          • Binalyze AIR Watchdog Folder
        • FDA via Jamf and Apple’s PPPC utility
        • AIR Responder in Windows 'Safe Mode'
      • Uninstalling AIR Responders
      • Security
        • AIR Console Access Control
        • AIR SSL Enforcement
          • SSL Certificate Management in Binalyze AIR
        • Two-factor authentication (2FA)
      • Post-Deployment Configuration Guide
        • Using AIR CLI on Binalyze AIR Console
      • AIR's User Settings
    • Updating AIR
      • Single-Tier Systems
      • 2-Tier Systems
      • AIR Console Updating - SaaS
    • Backup
      • Restore AIR Backup using the CLI
    • Features
      • Acquisition
        • Task Creation
          • Regex in AIR/DRONE:
          • Asset Management with Persistent Saved Filters
          • Task Cancellation and Deletion
        • Acquisition Profiles
        • Supported Evidence
          • Windows Collections
          • macOS Collections
          • Linux Collections
          • IBM AIX Collections
        • Scheduling Tasks
        • Disk and Volume Imaging
          • Imaging with interACT
        • Chain Of Custody in AIR
      • Auto Tagging
      • Triage
        • Triage Rule Templates
          • YARA Templates
          • Sigma Templates
          • osquery Templates
        • Schedule Triage Tasks
      • interACT
        • interACT Commands
        • PowerShell commands in interACT
      • Compare
      • Timeline
      • Integrations
        • SSO Integrations
          • Microsoft Azure SSO Integration
          • Okta SAML 2.0 SSO Integration
        • Webhooks
          • Mattermost Integration
          • Splunk Integration
          • IBM QRadar Integration
          • Wazuh Integration
          • Cortex XSOAR Integration
          • Elasticsearch Logstash Kibana Integration
          • ServiceNow Integration
          • Sumo Logic Integration
          • Crowdstrike Integration
          • Microsoft Sentinel Integration
          • Slack Integration
          • Carbon Black Cloud Integration
          • Rapid7 InsightIDR Integration
          • LogicHub SOAR (DEVO) Integration
          • Fortigate SIEM Integration
          • Dynatrace Integration
          • Stellar XDR Integration
          • SentinelOne Integration
          • Microsoft 365 Defender Integration
          • Cisco XDR Integration
      • Event Subscription
      • AIR API
        • API in AIR is likely to be more effective than Webhooks
      • DRONE
        • What is DRONE?
        • What is an Analysis Pipeline?
        • Analyzers
          • Cross Platform Analyzers
            • MITRE ATT&CK Analyzer
              • MITRE ATT&CK Analyzer changelog
            • Dynamo Analyzer
            • Browser History Analyzer
            • Generic WebShell Analyzer
          • Windows Analyzers
            • Windows Event Records and how AIR handles them
              • Windows Event Logs in AIR v4.21 and older versions
              • Event Records Summary vs. Event Records
            • Prefetch Analyzer
            • Shellbag Data Fields
          • Linux Analyzers
          • macOS Analyzers
            • Audit Event Analyzer
      • AIR Investigation Hub
        • Using the AIR Investigation Hub
        • Investigation Hub – Data Usage Statistics Dashboard
      • AIR File Explorer
        • File Explorer - FAQs
      • Tornado (Preview Version)
        • Tornado Installation Guide
          • Tornado Operating System Support
        • Updating Tornado
        • Tornado demo video
        • Getting Started with Tornado
          • Tornado Terminology
        • Tornado Collectors
          • Accessing Google Workspace
            • Service Account Creation
              • Enable Service Account Key Creation
          • Access Modes in O365
            • O365 license types
        • Tornado Troubleshooting & Feedback
        • Tornado FAQs
      • Frank.AI
      • Asset Isolation
      • Evidence Repositories
      • Policies
      • Tags
      • Off-Network Responder
        • Setting Up a Custom Case Directory
        • biunzip
          • biunzip password file
      • Binalyze AIR Responder Proxy Support
      • Proxy Configuration on Binalyze AIR Console
      • Binalyze AIR Audit Logs
    • Troubleshooting
      • Binalyze AIR Console CPU Profiling for Performance Issues
      • Understanding MSI Error Code 1618
      • How to gather Binalyze AIR logs for Troubleshooting
        • Collecting Binalyze AIR Console Log Files
        • Collecting Binalyze AIR Responder Log Files
        • Collecting Binalyze AIR Off-Network Responder Log Files
    • FAQs
      • Binalyze AIR Console Migration Procedure For Single-Tier Setup
      • Binalyze AIR Console Migration Procedure For 2-Tier Installation
      • Binalyze AIR Console Backup Procedure
      • Resolving the “Invalid Host Header. Host must be the Console Address” Error
      • How to download the collected evidence and artifacts in Binalyze AIR?
      • How to gather Binalyze AIR logs for Troubleshooting
        • Collecting Binalyze AIR Console Log Files
        • Collecting Binalyze AIR Responder Log Files
        • Collecting Binalyze AIR Off-Network Responder Log Files
      • AIR responder troubleshooting
      • Understanding Port Usage in Binalyze AIR
      • How many assets can connect to a single Console instance?
      • How do I enable SSL on AIR?
      • Can I use AIR with EDR/XDR Products?
      • Can I integrate AIR with my SOAR/SIEM?
      • What (sub)domains are used by AIR?
      • Docker & Host System IP Conflict
      • Monitoring Responder and UI API's
      • How do I update AIR Console?
      • How do I update AIR Responders on assets?
      • How to reset the password of a user via the AIR-CLI?
      • Is there a way to move an asset from one Organization or Case to another?
      • Creating exclusions/exception rules for Binalyze AIR Responder on EPP and EDR Solutions
      • Anything missing?
      • How can I install a version of AIR that isn't the latest?
  • General
    • Licenses - Open-source Software List
Powered by GitBook
On this page
  • Why This Feature Matters
  • Key Features
  • Data Views
  • Advanced Table View
  • Exporting Reports
  • Data Usage Dashboard – Hierarchical Sunburst View
  • Key Benefits
  • Where to Find It?
  • Historical Insights Feature
  • Overview
  • Key Functionalities:

Was this helpful?

Export as PDF
  1. AIR
  2. Features
  3. AIR Investigation Hub

Investigation Hub – Data Usage Statistics Dashboard

PreviousUsing the AIR Investigation HubNextAIR File Explorer

Last updated 2 months ago

Was this helpful?

The Investigation Hub Disk Usage Statistics Dashboard empowers users to manage Investigation Hub data storage effectively by providing detailed and user-friendly insights into disk usage. This feature simplifies data analysis through visual elements like pie charts and summaries and enables users to focus on relevant data using customizable filters. Additionally, the ability to generate PDF reports makes sharing and documenting disk usage information seamless, enhancing operational efficiency and decision-making.


Why This Feature Matters

Challenges:

  • Lack of Visibility: Users struggle to understand how disk space is utilized across cases, organizations, and evidence categories.

  • Complex Data Presentation: Existing tools make it difficult to analyze or visualize disk usage.

  • No Reporting Tools: There is no simple way to generate and share reports, limiting collaboration and record-keeping.

How This Dashboard Solves These Problems:

  • Clear Visualization: Pie charts and summaries make it easy to understand disk usage at a glance.

  • Customizable Filters: Users can filter data by organization, investigation type, platform, evidence type, and category.

  • Report Generation: Generate PDF reports or export data as CSV files directly from the dashboard.


Key Features

Access Control

  • This feature is accessible exclusively to Global Admins via the AIR console:

    • Navigate to Settings > Investigation Hub Disk Usage.

What’s Included

  • The first nine disk usage categories are displayed in charts. The remaining categories are grouped together and can be viewed by using the scrolling arrow, as shown in the screenshots of the Disk Usage Per Organization pie chart below:

  • The usage summary window at the top of the page provides an overview of total disk usage, categorized by Organizations, Cases, and Task Assignments, all at a glance.

  • Detailed breakdowns are shown by:

    • Organization

    • Case

    • Platform

    • Evidence Type

    • Evidence Category

Data Views

  • Actual Disk Usage View:

    • Real-time insights into current disk usage.

  • Historical Insights View:

    • Track trends and changes in disk usage over time.

    • Configure widgets to display tailored insights.

  • Filters in the secondary menu:

    • Organization

    • Investigation Type

    • Platform

    • Evidence Type

    • Evidence Category

Advanced Table View

  • Sortable and exportable tables for deeper analysis.

  • Filters and advanced sorting for granular insights.

Exporting Reports

  • Users can generate PDF reports for record-keeping and sharing.

  • CSV exports are available for custom data analysis.


Data Usage Dashboard – Hierarchical Sunburst View

Understanding data usage in complex environments can be challenging, especially with large datasets. The Hierarchical Sunburst View in the Data Usage Dashboard provides an intuitive, interactive visualization to help identify key usage patterns, trends, and anomalies at a glance.

Key Benefits

  • Visual Hierarchy – Easily navigate and understand data relationships compared to traditional tables or charts.

  • Interactive Exploration – Click on segments to drill down into deeper data layers for more detailed insights.

  • Seamless Filtering – The Sunburst View integrates with global filters, ensuring a consistent analysis experience.

  • Custom Dashboards – Save customized Sunburst views for quick access and continuous monitoring.

Where to Find It?

The Sunburst View is available under: Settings > Actual Disk Usage > Hierarchical View tab on the Actual Usage page.

Historical Insights Feature

Overview

The historical view allows administrators and investigators to analyze disk usage trends efficiently. The dashboard includes customizable widgets and granular time-based analytics to help identify patterns and optimize storage usage.

Key Functionalities:

  1. Customizable Widgets:

    • Group by: None, Organization, Investigation Type, Platform, Evidence Type, Evidence Category.

    • Function: Metrics such as average or maximum values.

    • Granularity: Hourly, daily, monthly, or yearly intervals.

    • Filters: Date/time, investigation type, and more.

  2. Saved Dashboards:

    • Save and manage customized dashboards.

    • Dashboards are listed with details like name, user, save date, last update, and applied filters.

    • Prevent duplicate or empty dashboard names.

  3. Data Management:

    • Disable unavailable dates in the date/time picker.

    • Reload or export data directly from table views.

  4. Default Settings:

    • Reset widgets to default configurations.


Restrictions and Considerations

  • Access: Only Global Admins can access this feature.

  • Non-Clickable Charts: Line charts in the dashboard are for display only.

  • Limited Categories: Only the top nine disk usage categories are displayed; others are grouped as “Others.”


User Guidance

  1. Accessing the Dashboard:

    • Go to Settings > Investigation Hub Disk Usage.

    • Choose between Actual Disk Usage or Historical Disk Usage views.

  2. Filtering Options:

    • Organization

    • Investigation Type

    • Platform

    • Evidence Type

    • Evidence Category

  3. Visual Representation:

    • Pie charts for quick overviews.

    • Detailed tables for in-depth analysis.

  4. Exporting and Reporting:

    • Generate PDF reports for sharing and record-keeping.

    • Export CSV files for custom data handling.


This feature provides administrators and investigators with powerful tools to monitor and optimize disk usage, ensuring a streamlined and efficient investigation process.

Please see this short overview of the .

Hierarchical Sunburst View
A fully collapsed Hierarchical Sunburst View in the Data Usage Dashboard