AIR Responder Deployment
Last updated
Last updated
Installation of the AIR Responder on your assets is managed via the Assets button in the Main Menu:
The AIR Responder installer is a zero-configuration package that contains the console address already embedded in it.
You can deploy the AIR Responder in multiple ways:
Downloading an installation package (Windows, macOS, Linux, Chrome and ESXi)
Copying a PowerShell Command (Windows)
Copying a CURL Command (macOS and Linux)
Copying a WGET Command (macOS and Linux)
Downloading a PowerShell Script (Windows)
Downloading the Asset installer (macOS and Linux)
Manual installation via Active Directory/SCCM.
Generation of a shareable Deployment Link (Windows, macOS, Linux, Chrome and ESXi)
The cards below show the default location paths for the AIR Responder:
In the sections that follow, we will look at the deployment of AIR Responders to Windows, Linux and Mac operating systems.
The AIR Responder is a ‘zero-config’ deployment as the file name has all the information you need for quickly deploying a Responder.
This level of detail in the filename provides all the information needed as a digitally signed binary - this prevents issues with security solutions and to date, not one issue has arisen.
The file name example shown here has 4 main components:
2.38.7 - is the Responder version number.
air-demo.binalyze.com - is the address of the console with which the Responder will be communicating
176 - is the console's internal organization number ID.
And the apparently random mixture of letters and numbers, 9df51c56a73341f4, is the - Deployment Token.
386 - describes the processor architecture of the machine on which the Responder will run.
There are multiple ways of deploying the Responder all of which are designed to be quick and scalable. Let's take a look at the different ways in which you can deploy the AIR Responder to your assets:
From the Main Menu select 'Assets' and then 'All Assets' from the Secondary Menu. Now you will see the page name 'Assets' and next to that is the Action Button which for the Assets page is labeled '+ Add New.'
When this '+ Add New' button is selected three deployment options are offered in a drop-down menu:
Each one of the options will present the user with a wizard that will walk through the options needed for the chosen deployment method:
Deploy New - For assets that are attached to a network that is visible to the AIR console
Cloud Account - For assets that reside in AWS EC2, and Virtual Machines in Microsoft Azure.
Off-Network - To generate triage and collection packages for assets that are not connected to a visible network.
When you choose 'Deploy New', you'll be prompted via a wizard to determine if the Responder should establish a direct connection to the AIR console or if utilizing a Relay Server connection would be more suitable for your environment. Relay Server is explained here.
The second step of the deployment wizard provides distinct deployment options for all of the currently supported, network-attached operating systems; Windows, Linux, and macOS:
The command varies based on the Organization affiliation. An example PowerShell command to copy is provided below:
This command is specific to your console address and Organization.
This script can be downloaded from your AIR Console. Ensure you select or are working in the appropriate Organization before downloading.
If you prefer, the Windows responder can be deployed using SCCM with the following command:
For a silent installation you can use the following command:
These commands are specific to your console address and Organization.
The MSI for the Windows Responder can be downloaded directly from the page, as depicted in the screenshot below:
All three operating systems support the Shareable deployment link available in the console. This method is often the most straightforward—simply share the link with your client, allowing them to download and install the Responder. An example link is shown below:
Unlike Windows, macOS and Linux do not utilize PowerShell commands or scripts. Instead, they can employ CURL or WGET commands. Alternatively, you can use the Shareable deployment page link mentioned above.
Example of CURL deployment command:
Example of WGET deployment command:
These commands are specific to your console address and Organization.
For macOS, the user/administrator has to allow Full Disk Access (FDA) to the AIR Responder for it to have full access to the disk for collections.
Open “System Settings -> Privacy & Security -> Full Disk Access”
Toggle the switch 'on' to enable Full Disk Access for the AIR Responder.
After installing Responder on macOS, users need to grant Full Disk Access permission. To guide users through this process, a popup will appear after installation:
If Full Disk Access permission is not granted when starting any Acquisition, this will be shown in the Acquisition logs:
After toggling on the FDA on this page, select the /opt/binalyze/air/agent/air file in the file manager that opens. Once this is done, our responder will appear in the list under the name 'air' ready for the user to toggle 'on'.
The AIR Responder operates as an executable binary running as a service rather than a traditional macOS application. This approach ensures consistency across platforms like Linux and macOS.
Since AIR is not packaged as a macOS app, it does not include a .plist
file, which typically contains the application icon metadata. Consequently, it cannot display a logo on the Full Disk Access page.
This design choice does not affect the functionality or performance of Binalyze AIR.
While the popup effectively guides users in manually installed scenarios, it presents challenges for enterprise environments where macOS devices are managed via Mobile Device Management (MDM). MDM allows remote application installation and security policy enforcement, including granting Full Disk Access.
Customers prefer silent installations for MDM-deployed Responder without the popup, as permissions are already set through security policies. However, our current setup cannot distinguish between user-initiated and MDM-initiated installations, causing the popup to appear in all cases.
We are actively working on a solution to address this issue for seamless enterprise deployments.
Windows
C:\Program Files (x86)\Binalyze\AIR\agent
macOS
/opt/binalyze/air/agent
Linux
/opt/binalyze/air/agent