Full Text Search
Search for keywords and patterns across file contents on remote assets
Full Text Search enables investigators to scan the contents and metadata of files on remote assets for specific keywords or regex patterns. Unlike traditional evidence collection that gathers predefined artifacts, Full Text Search allows targeted searches across document contents, configuration files, logs, and other text-based data—helping investigators quickly locate evidence of data exfiltration, policy violations, or indicators of compromise.
Key Capabilities
Keyword Searching — Search for exact terms such as filenames, usernames, IP addresses, or sensitive data identifiers
Pattern Matching — Use regex patterns to find complex matches like credit card numbers, email addresses, or custom formats
Reusable Profiles — Save search configurations as profiles for consistent, repeatable investigations
File Type Filtering — Target specific file categories (documents, plain text, databases) to reduce noise
Cross-Platform Support — Search across Windows, macOS, and Linux assets simultaneously
Accessing Full Text Search
Full Text Search can be initiated in two ways:
Option 1: Quick Start Menu
From anywhere in the Console, select Quick Start from the top navigation bar, then select Full Text Search.

Option 2: Bulk Action from Assets
Navigate to Assets, select one or more target assets, and choose Full Text Search from the bulk action bar.

Creating a Full Text Search Task
The Full Text Search wizard guides you through three steps: Asset Selection, Setup, and Customization.
Step 1: Asset Selection
Select the assets you want to search. Use filters or saved filters to narrow down your selection. Assets can be Windows, macOS, or Linux endpoints.

Step 2: Setup
Configure your search parameters:
Task Name
A descriptive name for this search task (auto-generated if left empty)
Case
Associate the search with an existing case for centralized evidence management
Task Start Time
Run immediately or schedule for later
Full Text Search Profile
Select an existing profile or create a new one

Each profile displays the number of keywords and file types it contains, helping you select the appropriate profile for your investigation.
Creating a New Profile
Click + Add New Profile to create a reusable search configuration:
Enter a Name for the profile
Select the Organization
Add Search Keywords — individual terms or regex patterns
Select File Types to search within

Adding Keywords and Patterns
Click + Add New to add search terms:
Add New Keyword — Enter an exact term to search for
Add New Pattern — Enter a regex pattern for complex matching

Using Built-in Pattern Examples
AIR includes a library of pre-built regex patterns for common investigation scenarios. Click the Examples dropdown to select from ready-to-use patterns:
API Key/Token Pattern
Detects common API key and token formats
Generic Credentials Pattern
Finds username and password combinations in files
WordPress Credentials Pattern
Locates WordPress-specific credential patterns
Credit Card Number Pattern (MasterCard)
Identifies MasterCard number formats
AWS Access Key Pattern
Detects AWS access key identifiers (AKIA...)
AWS Secret Key Pattern
Finds AWS secret access keys
GitHub Personal Access Token Pattern
Identifies GitHub PAT formats
Stripe API Key Pattern
Detects Stripe API key formats
Using built-in examples ensures consistent, tested patterns across your investigations. These patterns are maintained by the AIR team and updated as new formats emerge.
Importing Keywords from CSV
For bulk keyword management, click Import Keywords (.csv) to upload a CSV file containing your search terms. This is useful when:
Migrating keyword lists from other tools
Maintaining centralized keyword repositories
Sharing standardized search terms across investigation teams
The CSV file should contain one keyword or pattern per row.
Advanced Settings
Expand Advanced Settings to configure additional parameters:

Search In
Default search paths per operating system (Windows: %SYSTEMDRIVE%\Users\**, macOS: /Users/**, Linux: /home/**)
Excluded Path Patterns
Directories to skip during the search. Use the Examples dropdown for common exclusions
Max Result Limit
Maximum number of results to return per asset (default: 1000)
Common exclusion patterns include:
C:\Program Files\**— Windows Program Files directoryC:\Program Files (x86)\**— Windows Program Files (x86) directoryWindows system directory
Entire C drive (for targeted user-folder searches)
Using Regex Patterns
Full Text Search supports regex patterns for advanced matching. Patterns must be added using the Add New Pattern option.
Basic Regex Examples
invoice
Exact word "invoice"
Find documents mentioning invoices
invoice|receipt
"invoice" OR "receipt"
Find financial documents
\d{3}-\d{2}-\d{4}
123-45-6789
US Social Security Numbers
\d{4}[- ]?\d{4}[- ]?\d{4}[- ]?\d{4}
Credit card formats
Payment card numbers
(?:25[0-5]|2[0-4]\d|[01]?\d\d?)(?:\.(?:25[0-5]|2[0-4]\d|[01]?\d\d?)){3}
192.168.1.1
IPv4 addresses
password\s*[:=]\s*\S+
password: secret123
Hardcoded credentials
BEGIN\s+(RSA|DSA|EC)?\s*PRIVATE\s+KEY
Private key headers
Exposed private keys
AKIA[0-9A-Z]{16}
AWS Access Key format
AWS credentials
(?i)confidential|secret|restricted
Case-insensitive classification markers
Sensitive document labels
Complex regex patterns may impact search performance. Test patterns on a small asset selection before running large-scale searches.
Viewing Results in Investigation Hub
Once a Full Text Search task completes, results are available in the Investigation Hub:
Navigate to Investigation Hub from the main menu
Select the Case associated with your search task
Locate the Full Text Search results in the case timeline
Results display:
File path — Location of the file containing the match
Match context — Surrounding text showing where the keyword or pattern was found
Asset information — Which endpoint contained the match
Best Practices
Start Narrow, Then Expand
Begin with specific keywords or patterns targeting known indicators. If initial results are limited, gradually broaden your search criteria.
Use File Type Filtering
Limit searches to relevant file categories. Searching all 60 file types increases scan time—focus on document types most likely to contain your target data.
Leverage Profiles for Consistency
Create standardized profiles for common investigation scenarios:
PII Search — Social security numbers, credit cards, email addresses
Credential Hunting — Passwords, API keys, private keys
Data Exfiltration — Company-specific keywords, project names, client identifiers
Exclude System Directories
Use excluded path patterns to skip operating system and application directories that rarely contain investigative value, improving search speed and reducing false positives.
Supported File Types
Full Text Search can examine contents within 60 file type categories, organized into groups:
Text/Word Processing
DOC, DOCX, TXT, RTF, ODT, PDF
Plain Text
LOG, CFG, INI, XML, JSON, YAML
Database, Spreadsheet, Finance
XLS, XLSX, CSV, MDB, ACCDB
Expand the File Types section when creating a profile to view and select specific categories.
Last updated
Was this helpful?

