Only this pageAll pages
Powered by GitBook
Couldn't generate the PDF for 1000 pages, generation stopped at 100.
Extend with 50 more pages.
1 of 100

Binalyze AIR - Prod

Loading...

AIR

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

AIR Platform

AIR is an Automated Investigation and Response platform offering the most comprehensive feature set for remotely acquiring 698 types of digital evidence in just minutes.

Welcome to AIR's Documentation

This Knowledge Base will guide you through all the features of AIR.

What is AIR?TerminologyArchitectureNetwork CommunicationCloud Forensics

What is AIR?

Automated Investigation and Response platform

AIR is an Automated Investigation and Response platform that delivers deep forensic visibility and end-to-end investigation capabilities at speed.

AIR combines the rapid remote acquisition of 737 evidence types with intelligent, efficiency-driven automation to drastically reduce investigation time, simplify workflows, and empower SOC and incident responders with accurate, collaborative insights, thereby boosting long-term cyber resilience.

AIR further accelerates investigations through DRONE—a powerful suite of integrated analyzers that automatically assess collected evidence. DRONE's findings across multiple assets are consolidated and visualized in a single pane of glass: the AIR Investigation Hub.

AIR will perform simultaneous hunt and triage on thousands of assets using YARA, Sigma, and osquery rules.

AIR protects employee privacy with targeted collections when required. It also captures the 'forensic state' of multiple assets and presents this information in an Investigation Hub.

The Investigation Hub serves as an all-encompassing, user-friendly DFIR intelligence resource. This unifying Investigation Hub consolidates Acquisition and Hunt/Triage data from all assets, presenting it in an easily digestible format. It also integrates DRONE analyzer findings through intuitive graphical visualizations, thereby identifying the most critical machines that warrant further immediate, focused investigation or remediation. The Investigation Hub streamlines the investigative process by:

  • Providing actionable findings to prioritize and guide investigators,

  • Offering comprehensive listings of all evidential artifacts,

  • Including a range of advanced filtering options, and

  • Featuring a powerful global search capability.

The AIR platform integrates with your existing SIEM, SOAR solutions, and many EDR products. This is done via Webhooks and an open API that empowers analysts to automate the response phase of IR.

So, all forensic collections can be scheduled, automated, remote, and scalable.

With evidence hashing, AES256 encryption, and RFC3161 time-stamping, the Chain of Custody for evidence handling by AIR is completely secure.

Other key features include our patent-pending Baseline Comparison technology. This allows you to be more proactive and focused in the way you target your efforts. Here, you can compare acquisitions against one another and easily identify additions, changes, and deletions to key system areas often exploited by attackers.

AIR helps you cut through the noise of security data with live YARA, Sigma, and osquery scanning combined with rapid keyword searching, automated post-acquisition analysis, and Event Scoring.

These features all combine to enable most digital forensics investigations to be concluded in less than 4 hours - which is a dramatic improvement over what is commonly achieved today with other solutions.

AIR Knowledge Base

Our mission is to deliver solutions that reduce incident response investigation times through unparalleled forensic-level visibility, automation, speed, and collaboration at scale.

AIR Knowledge Base: Blacklight Logo
AIR PlatformTroubleshootingFAQs

You can view our support terms and conditions here.

Setup

AIR setup instructions

Security

Two-factor authentication (2FA)

Danger Zone

Killswitch: Cancel All Running Tasks

The Killswitch is a powerful administrative control available under Settings > Danger Zone in the AIR Console. It allows Global Admins to immediately cancel all currently running cancellable tasks across the entire platform, without needing to select individual assets or tasks.

Safety Confirmation

To safeguard against accidental activation, a case-sensitive confirmation is required. You must, before the operation can proceed. Type the exact phrase:Cancel All Tasks

Note: This action cannot be reversed.

Only tasks that are in a cancellable state will be affected.

Use this feature carefully, particularly during large-scale investigations or scheduled operations.

Updating

Updating the AIR console

Responder - Chrome supported systems

Chrome 90+

Responder Hardware Requirements

User Roles

In AIR, the Global Admin has full control over managing 109 specific privileges, allowing the creation of highly customized user roles. This granular access control ensures that each user or group has permissions tailored to their specific needs, such as handling evidence acquisition, interACT sessions, or audit log management.

A useful feature within this setup is the tooltips provided alongside each privilege. These tooltips highlight any dependencies that may exist between privileges, helping administrators configure roles accurately without unintentionally restricting necessary functions.

For example, an admin could create a role that enables a user to access interACT for remote evidence collection while restricting access to audit logs or system-wide settings. The tooltips ensure that admins are aware of any required privileges to avoid misconfigurations.

This approach provides both flexibility and clarity, empowering admins to manage user roles effectively.

Retrieving metrics from Relay Server

Relay Server serves these metrics produced by Prometheus from a Unix socket.

To retrieve metrics from the Relay Server's Unix socket, you can use the curl command to make a request to the following endpoint: http://localhost/metrics on the Unix socket /var/run/Binalyze.AIR.Relay.sock. Here's an example command:

sudo curl --unix-socket /var/run/Binalyze.AIR.Relay.sock http://localhost/metrics

Executing this command will provide you with a response containing various metrics related to the Relay Server. The response will include information such as the number of active connections, request duration, request errors, reload count, and more.

Please note that you need to run this command on the same system where the Relay Server is running, as it communicates via the Unix socket.

Here's a sample response:

# HELP air_relay_info Information about the Relay Server environment.
# TYPE air_relay_info gauge
air_relay_info{arch="aarch64", build_time="2023-06-14T07:22:01", commit="f064c83645e1901d421714b8bd1dbec274425551", goarch="arm64", goos="linux", hostname="halilonay.ubuntu", os="Ubuntu 22.04.2 LTS (Jammy Jellyfish)", version="2.23.0"} 1
# HELP air_relay_proxy_active_connections Number of active connections to the Relay Server.
# TYPE air_relay_proxy_active_connections gauge
air_relay_proxy_active_connections 0
# HELP air_relay_proxy_request_duration_seconds Duration of each request handled by the Relay Server.
# TYPE air_relay_proxy_request_duration_seconds histogram
air_relay_proxy_request_duration_seconds_bucket{le="0.005"} 0
air_relay_proxy_request_duration_seconds_bucket{le="0.01"} 0
air_relay_proxy_request_duration_seconds_bucket{le="0.025"} 0
air_relay_proxy_request_duration_seconds_bucket{le="0.05"} 0
air_relay_proxy_request_duration_seconds_bucket{le="0.1"} 0
air_relay_proxy_request_duration_seconds_bucket{le="0.25"} 1
air_relay_proxy_request_duration_seconds_bucket{le="0.5"} 1
air_relay_proxy_request_duration_seconds_bucket{le="1"} 1
air_relay_proxy_request_duration_seconds_bucket{le="2.5"} 1
air_relay_proxy_request_duration_seconds_bucket{le="5"} 1
air_relay_proxy_request_duration_seconds_bucket{le="10"} 1
air_relay_proxy_request_duration_seconds_bucket{le="+Inf"} 1
air_relay_proxy_request_duration_seconds_sum 0.149310392
air_relay_proxy_request_duration_seconds_count 1
# HELP air_relay_proxy_request_errors_total Total number of request errors encountered by the Relay Server.
# TYPE air_relay_proxy_request_errors_total counter
air_relay_proxy_request_errors_total 1
# HELP air_relay_proxy_requests_total Total number of requests received by the Relay Server.
# TYPE air_relay_proxy_requests_total counter
air_relay_proxy_requests_total 1
# HELP air_relay_reload_count Number of times the Relay Server has been reloaded.
# TYPE air_relay_reload_count counter
air_relay_reload_count 0
# ...

These metrics provide insights into the Relay Server's performance, resource utilization, and various other statistics related to its operations.

AIR Task Flow and Management

Introduction

In today's dynamic digital environment, managing tasks efficiently within a software system is crucial for reliability, flexibility, and optimal performance. This guide explores a sophisticated task management system designed to handle a wide range of operational scenarios, focusing on task retrieval, execution, prioritization, and system resilience against failures and network disruptions.

Architecture: AIR Task Flow and Management

Task Retrieval and Execution

The Role of the AIR Console

The AIR platform features an intuitive web-based console designed to orchestrate and dispatch tasks to designated remote AIR responders effectively. Serving as the nerve center for task allocation, this console guarantees that each task is accurately assigned for execution, optimizing operational efficiency. Within this ecosystem, assigning a specific task to a particular asset is termed a 'task assignment,' ensuring a clear, one-to-one correspondence between tasks and assets for precise management and tracking.

Mechanisms for Task Checking

To accommodate diverse operational needs and customer network policies, the system employs two primary mechanisms for task checking:

  1. Regular Interval Checks: Tasks are checked at predefined intervals, which can be dynamically adjusted based on the system's current configuration and operational demands.

  2. The NATS Protocol: For immediate task fetching or near real-time communications with assets, the system incorporates a specialized protocol named "NATS." This protocol is designed to bypass the standard checking intervals, allowing for urgent tasks to be retrieved and executed with minimal delay

AIR does not use TLS for NATS traffic because no sensitive data is transmitted over it. NATS is only used to send a lightweight “ping” message when the AIR Console assigns a task to a Responder. After receiving this signal, the Responder immediately connects back to the AIR Console over HTTPS (port 443) to securely download the full task details

Task Checking Intervals

Task-checking intervals are not static; they vary dynamically from seconds to hours, influenced by the system's configuration. This flexibility ensures the system can adapt to changing workloads and priorities efficiently.

Task Prioritization and Execution Order

Prioritization of Critical Tasks

Certain tasks, such as "cancel tasks," receive priority in the execution queue. This prioritization is crucial to prevent delays in the cancellation process, ensuring tasks are halted promptly when required.

Execution Order and FIFO Queue Model

The system employs a first-in, first-out (FIFO) queue model for task execution. This model ensures that tasks are processed in the order received, with special consideration given to tasks that might block or delay subsequent operations unnecessarily.

Handling of Failed Tasks and Network Disruptions

Tasking Assignment interruptions

If a Tasking Assignment has been collected by the Responder but is interrupted before the completion of collection, triage, or analysis, the task will not resume where it left off. Instead, this interruption will result in a task failure. Such failures are automatically recorded within the console's tasking details.

When this occurs, the status of the task in the AIR console will reflect the failure, and it will be necessary to manually restart or initiate a new task to ensure that the intended data collection and analysis are completed. This approach ensures clarity and accuracy in managing task assignments, even in cases of unexpected interruptions.

Retry Mechanisms for File Uploads

For tasks that require file uploads, such as uploading to an evidence repository, the system includes built-in retry mechanisms. These mechanisms are activated to re-attempt uploads if network issues interrupt the process. The number of retries and the specific procedures for handling these retries vary depending on the task type and the destination of the file.

Additionally, if "direct collection" is enabled for an acquisition task and a failure occurs, the user must restart the acquisition process from the beginning. This ensures that all necessary data is properly collected without partial or corrupt files.

Data Purging and Task Cancellation

A specialized "purge local" task type exists for efficiently cleaning up local data related to completed or failed tasks. This function is crucial for maintaining optimal disk space utilization and efficient system resource allocation.

System Flexibility and Customer Policies

This guide emphasizes the importance of a flexible system that can adapt to diverse customer policies, including specific network configurations and security requirements. The choice of protocols and mechanisms for task management is influenced by these diverse operational needs.

Documentation and System Improvements

Continuous improvement is a cornerstone of system development. The commitment to updating documentation reflects ongoing efforts to refine task management processes and system functionalities based on operational insights and technical advancements.

Technical Implementation Details

The guide offers an in-depth examination of the system's technical underpinnings, including the utilization of the "NATS" protocol, dynamic adjustment of task-checking intervals, and the logic behind task prioritization and queue management. These details offer a comprehensive understanding of the system's operational logic and its capability to handle various scenarios efficiently.

Conclusion

Efficient task management is pivotal in ensuring the reliability and performance of software systems. Through innovative mechanisms, such as the air console and NATS protocol, alongside dynamic task-checking intervals and a robust FIFO queue model, the system outlined in this guide represents a state-of-the-art solution for managing tasks in complex software environments. The emphasis on flexibility, resilience, and continuous improvement underscores the system's readiness to meet the evolving demands of modern digital operations.

Adding proxy to Relay Server

To add the proxy configuration to Relay Server, you can modify the /etc/profile file by following these steps:

  1. Open a terminal or command line session.

  2. Open the /etc/profile file in your favorite editor with administrative privileges:

sudo vim /etc/profile
  1. Scroll to the end of the file and add the following lines:

Alternatively, you can use the following method to set proxy settings, but be aware that it will impact the proxy behavior of other programs.

Save the changes and exit the text editor.

  1. To apply the changes, restart your system:

By adding these lines to the /etc/profile file, the specified proxy settings will be exported as environment variables.

Proxy configurations

Like the responder, the Relay Server has the capability to proxy connections through a proxy server when communicating with responders or AIR Console. This provides flexibility in terms of configuring proxies for the responder, which connects through a Relay Server, or setting a proxy specifically for the Relay Server. Additionally, it is also possible to set proxies for both the responder and the Relay Server simultaneously. The diagram below illustrates all the possibilities for proxying the Relay Server and the responder.

AIR Relay Server: Proxy Configiurations
Adding proxy to Relay ServerAdding proxy to Responder

How to change IP address of Relay Server

Before deploying a new asset through Relay Server, you need to choose the IP address of the Relay Server to which the endpoints will connect. This chosen IP address will serve as the connection route for the assets that will be routed through this Relay Server.

You can change the address of the Relay Server by accessing the "Relay Server Details" section, which can be found in the "Organization Detail" page.

How to change IP address of Relay Server: Relay Server Details

Cloud Forensics

Investigators and analysts can use the AIR platform to conduct investigations on machines located in cloud platforms. Our platform supports cloud-based virtual machines, as well as on-premise and off-network devices. Investigators and analysts can install responders on virtual machines located on the cloud infrastructure for investigations and analysis. Amazon Web Services and Microsoft Azure are both supported.

We understand the unique challenges of investigating cloud-based attacks, such as Business Email Compromise (BEC). That’s why we have introduced the Tornado preview version, a standalone desktop application designed to simplify evidence collection from Google Workspace and Microsoft Office 365. Learn all about Tornado .

Investigators and analysts can easily and quickly deploy responders to their cloud assets and immediately initiate investigations, compromise assessments, and threat-hunting activities. By leveraging the automation advantages of cloud platforms, users can easily deploy multiple responders using a single authorized cloud platform account.

After adding the authorized account to the Console, it enumerates the cloud platform to discover and list assets. Then, investigators and analysts can deploy responders to individual or multiple cloud assets with one click.

What is Relay Server?

AIR Relay Server is a specialized SOCKS5 proxy server specifically designed to facilitate communication between AIR responders and the AIR console. Its primary function is to act as an intermediary, enabling the seamless proxying of connections between the responders and the console.

With Relay Server, you can enhance the security of both responders and the console by only granting access via the Relay Server, eliminating the requirement for direct access to the AIR console from the responder environment.

This indirect access approach adds an extra layer of protection to the overall system architecture.

The Relay Server functionality in an AIR deployment is not automatically available for all users. This feature's availability is contingent upon specific license configurations.

Users considering the installation and configuration of a Relay Server should liaise with their Binalyze installation advisor as part of the setup process.

Troubleshooting

To run the Relay Server correctly, the responder must be running to manage tasks received from the AIR Console. Any modification or removal of these requirements will cause the Relay Server to fail to operate.

If responders attempting to connect through the Relay Server cannot establish a connection, they will fallback to a direct connection. Alternatively, if a proxy connection is configured, they will fallback to using the proxy for the connection.

If connections through the Relay Server are experiencing failures, you can try resolving the issue by restarting the service using the following systemctl command:

This command will initiate a restart of the Relay Server service, which may help in resolving any connectivity issues.

Modifying the config file manually can introduce several problems, particularly due to the YAML format. Therefore, if you intend to make changes to the config file, such as adding whitelist addresses, it is crucial to adhere to the correct YAML format.

Ensure that you follow the YAML syntax rules while making any alterations to the config file. This includes correctly indenting elements, using appropriate punctuation, and maintaining the structure specified by the YAML format.

Relay Server logs all incoming connections and other operational activities for the purpose of troubleshooting and investigating any failures. To access these logs, you can retrieve by clicking on "Log Retrieval" on the "Relay Server Details" page.

Requirements for installation

To ensure a successful installation of Relay Server, it is necessary to have a Linux operating system based on either Debian or Redhat, with a minimum kernel version of 3.9.0. This requirement guarantees compatibility and optimal performance.

The Relay Server functionality in an AIR deployment is not automatically available for all users. This feature's availability is contingent upon specific license configurations.

Users considering the installation and configuration of a Relay Server should liaise with their AIR installation advisor as part of the setup process.

Currently, the supported versions for Relay Server are as follows:

Policies

Policies serve to define how evidence is collected and managed, providing fine-grained control over resources and processes.

Policies in AIR provide central configuration management and support global configurations that can be overridden at the Organisation level when required.

This overriding is only possible when the user has the “Override Policy” privilege allocated to their role.

Key Components:

Acquisition

Data acquisition is the collection of forensically sound data from any computer system (disk, external storage, memory, etc.). This data generally varies based on the operating system installed on the computer or server. Acquired data often needs to be parsed, stored, and presented in a human-readable format for further analysis and investigation.

Data acquisition is the primary activity of most digital investigations. Before data acquisition, the investigators generally identify the data they’ll need. Since data or evidence is an essential element of any investigation, investigators tend to take as much as they can in the first instance to avoid, if possible, a second acquisition. Therefore, the power of the digital investigation and DFIR solution is often proportional to the acquisition capability and the features associated with it.

AIR provides easy-to-deploy and fast data acquisition capabilities with a wide range of operating systems supported for the collection of 600+ forensically sound data types. AIR provides remote data acquisition for on-premise, cloud, and off-network devices. Thus, investigators can remotely investigate multiple devices at speed and scale.

AIR supports a growing number of operating systems, including Windows, Linux, macOS, ChromeOS, ESXi, and IBM AIX.

The results of AIR's Acquisition and Hunt/Triage processes can be further analyzed using DRONE's automated Post Acquisition Analyzers. DRONE's findings, along with all collected artifacts, are then presented within the Investigation Hub.

The AIR responder needs to be deployed first to acquire data. All data acquisition is performed according to the Data Acquisition Profile created before the acquisition is started.

Responder - Supported Operating Systems

Operating Systems that are supported by the responder

The AIR responder can be installed on Microsoft Windows, Linux, and Apple macOS operating systems. All supported operating systems and associated versions are listed below.

Updating and Uninstalling Relay Server

To update Relay Server, you can initiate an update task for the Relay Server from the AIR Console.

Follow these steps from AIR Console:

  1. Locate the Relay Server from the “Organization Detail” page.

  2. Select the relay server and click “Update” button from “Relay Server Details” page.

By running the update task from the AIR Console, the Relay Server installed on the asset and the responder itself will be updated to the latest version.

Similarly, if you wish to uninstall Relay Server from an asset, you can click to red button next to the “Update” in “Relay Server Details” page from AIR Console. This will remove Relay Server and responder from the system.

Settings

Brave Extensions

Overview

Evidence: Brave Extensions Description: Collect Brave Extensions Category: Applications Platform: windows Short Name: bext Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No

Action1 RMM Logs

Overview

Evidence: Action1 RMM Logs Description: Collect Action1 RMM Logs Category: Applications Platform: windows Short Name: action1rmmlgs Is Parsed: No Sent to Investigation Hub: No Collect File(s): Yes

Service Management for Relay Server

As Relay Server operates as a service/daemon managed by systemd, you can utilize the following systemctl commands to start, stop, restart and reload the service:

To start the service:

To stop the service:

To restart the service:

Stopping and restarting the Relay Server may require several minutes due to its behavior of gracefully shutting down. The Relay Server waits for connected endpoints to disconnect before shutting down to ensure a proper shutdown process.

During this waiting period, the Relay Server allows sufficient time for all endpoints to disconnect, ensuring that any ongoing communications are completed. Once all the endpoints have disconnected from the Relay Server, it proceeds with the shutdown process.

Avast Logs

Overview

Evidence: Avast Logs Description: Collect Avast Logs Category: Applications Platform: windows Short Name: avstls Is Parsed: No Sent to Investigation Hub: No Collect File(s): Yes

Features

Fast, remote, and scalable across the corporate network

Responder - Apple macOS supported systems

  • macOS 10.15

  • macOS 11.0

  • macOS 12.0

  • macOS 13.0

AVG Logs

Overview

Evidence: AVG Logs Description: Collect AVG Logs Category: Applications Platform: windows Short Name: avgls Is Parsed: No Sent to Investigation Hub: No Collect File(s): Yes

Active Directory Logs

Overview

Evidence: Active Directory Logs Description: Collect Active Directory Logs Category: Applications Platform: windows Short Name: adl Is Parsed: No Sent to Investigation Hub: No Collect File(s): Yes

Relay Server

Avira Logs

Overview

Evidence: Avira Logs Description: Collect Avira Logs Category: Applications Platform: windows Short Name: avrals Is Parsed: No Sent to Investigation Hub: No Collect File(s): Yes

Considerations for Relay Server Setup:

  • Public IP Requirement:

    • The need for a public IP address for the Relay Server depends on its intended use and positioning.

    • If the Relay Server is set up for internet-facing properties, a public IP address or a Fully Qualified Domain Name (FQDN) might be required.

    • For a Relay Server intended for internal network entities, a public IP address is not necessary.

  • Use Case for Managed Security Service Providers (MSSPs):

    • In scenarios where the Relay Server is used by MSSPs for external entities, it is likely that a public IP or FQDN will be needed.

Debian 7 and above

  • RHEL (Red Hat Enterprise Linux) 7 and above

  • CentOS 7 and above

  • Fedora 21 and above

  • Ubuntu 14.04 and above

  • Pardus 17 and above

  • Please note that this list may be subject to updates, and you can always refer to the download page and click on "See Supported Versions" for the most up-to-date information on supported systems.

    Currently, the recommended system requirements for running Relay Server are 4GB of RAM and 4 CPU cores. However, it's important to note that these requirements may be subject to change based on the results of a performance test conducted specifically for Relay Server.

    Additionally, for Relay Server to function properly, a responder must be installed and registered. The responder acts as the intermediary between the Relay Server and the AIR Console, which serves as the management interface for controlling Relay Server's operations. The seamless interaction between the responder and AIR Console facilitates efficient management of the Relay Server's functionalities.

    The Relay Server listens to default SOCKS5 port 1080 and creates connections to the target server (e.g. AIR Console). Port 1080 should be available for listening; otherwise, the relay server does not work as expected. As of now, the AIR responder connects to 80 (HTTP), 443 (HTTPS), and 4222 (NATS) ports of AIR Console, so as a result, the Relay Server as a proxy server can connect to the 80, 443, and 4222 ports of the target server. You should keep in mind that any implementation change in the future, like allowing evidence repository connections over the relay server, results in connecting to the appropriate port of the target server.

    Note that, the AIR responder will try to connect to port 1080 of the Relay Server to communicate with the AIR Console. If the connection cannot be established, the AIR responder falls back to a direct connection to the AIR Console.

    As of now, the Relay Server’s default listening port, 1080, cannot be changed and the AIR responders will always try to connect to port 1080 if they are configured to use a relay server.

    Name & Organization: Policies must have a unique name and be assigned to a specific organization.
  • Evidence Storage: Configures where evidence is stored—either locally (default paths: Binalyze\AIR\ on Windows, /opt/binalyze/air/ on Linux/macOS) or in defined repositories like SMB or SFTP.

  • Resource Limits: Controls CPU usage, bandwidth, and disk space during collection to prevent resource overuse. You can specify CPU limits (e.g., 100%) and restrict bandwidth and disk space.

  • Compression & Encryption: Enables optional compression and encryption of the collected evidence, with a password for added security.

  • Scan Scope: You can opt to restrict scans to local drives only, excluding network and external drives.

  • Isolation Settings: Policies can include an IP/Port and ‘process allow’ lists for isolation tasks, which ensures that specific communication channels remain open during an asset’s isolation.

  • Use Case Example:

    When creating a policy for a specific investigation, you could configure it to save evidence in an AWS S3 bucket, limit the CPU to 50%, compress the evidence for efficient storage, and ensure network drives are excluded from the scan. You could also configure the policy to allow communication with critical servers even if the asset is isolated.

    Data acquisition is classified into three categories: Evidence, Artifacts, and Network Capture. Additionally, investigators have the flexibility to create custom content profiles, allowing them to collect specific files or data from designated locations.

    At Binalyze, we recognize the critical importance of maintaining a strong 'chain of custody' when it comes to the collection and handling of evidence. That's why we employ SHA-256 hashing in combination with RFC3161 digital timestamp certificates. This approach serves to safeguard data content and offers assurance regarding the precise timestamp of the content's creation, as well as a guarantee that it has remained unaltered.

    Read more about RFC3161 and the secure way AIR maintains a strong chain of custody here: Protect Your Chain Of Custody With Content Hashing And Timestamping

    Data Collected

    This collector gathers structured data about brave extensions.

    Background

    Action1 RMM is a remote monitoring and management platform that maintains logs of agent activities, remote commands, patch deployments, and system monitoring events.

    Data Collected

    This collector gathers structured data about action1 rmm logs.

    Collection Method

    This collector gathers Action1 log files from the Windows directory containing RMM agent activity and command execution records.

    Forensic Value

    Action1 logs help investigate RMM-based attacks, identify executed commands, track software deployments, and reveal potential abuse of management tools for malicious purposes.

    Background

    Avast Antivirus maintains comprehensive logs of malware detections, real-time shield activities, scan results, and quarantine operations. The Chest is Avast's quarantine area where suspected files are isolated, with index.xml tracking quarantined items.

    Data Collected

    This collector gathers structured data about avast logs.

    Collection Method

    This collector gathers Avast log files from Application Data and ProgramData directories across different Windows versions, plus the Chest index file that catalogs quarantined threats.

    Forensic Value

    Avast logs provide critical evidence of malware detections, security threats, user actions, and system protection events. The Chest index reveals quarantined files that may indicate successful attack prevention or ongoing compromise attempts.

    macOS 14.0

  • macOS 15.0

  • macOS 26.0

  • Background

    AVG Antivirus is a popular security solution that logs malware detections, scan activities, quarantine actions, and threat analysis. These logs are stored in dedicated log and report directories within the application data folders.

    Data Collected

    This collector gathers structured data about avg logs.

    Collection Method

    This collector gathers AVG log files and scan reports from both legacy Application Data directories and current ProgramData locations, including detection logs and scan reports.

    Forensic Value

    AVG logs are valuable for identifying detected malware, understanding threat timelines, correlating infections with system activities, and verifying security response actions. They can reveal attempted attacks, quarantined files, and the system's security posture over time.

    Background

    Active Directory NTDS directory contains the AD database and transaction logs. This is the core directory service database that stores user accounts, groups, computers, and organizational structure for Windows domains.

    Data Collected

    This collector gathers structured data about active directory logs.

    Collection Method

    This collector gathers files from the Windows NTDS directory, including the Active Directory database (ntds.dit) and associated transaction logs.

    Forensic Value

    Active Directory data is essential for investigating credential theft, privilege escalation, unauthorized access, account manipulation, and domain compromise. The NTDS.dit database contains password hashes and is a high-value target for attackers.

    Background

    Avira Antivirus records malware detections, system scans, real-time protection events, and update activities in its LOGFILES directory. These logs provide detailed information about security events and antivirus operations.

    Data Collected

    This collector gathers structured data about avira logs.

    Collection Method

    This collector gathers all log files from the Avira Antivirus LOGFILES directory located in ProgramData, which contains comprehensive antivirus activity records.

    Forensic Value

    Avira logs are essential for tracking malware detections, analyzing security incidents, understanding system exposure to threats, and verifying antivirus effectiveness. They help establish timelines of security events and identify potential compromises.

    Responder - MS Windows supported systems
    Responder - Linux (DEB/RPM) supported systems
    Responder - Apple macOS supported systems
    ESXi Standalone Collector
    Console Settings
    Organization Settings
    Account Settings
    Acquisition
    Auto Tagging & Tags
    Hunt/Triage
    interACT
    Compare
    Timeline
    API
    DRONE
    Investigation Hub
    Repository Explorer
    Evidence Repositories
    File Explorer
    Tornado (Preview Version)
    Asset Isolation
    Policies
    Off-Network Responder
    Responder Proxy Support
    Proxy Configuration on the Console
    Console Audit Logs
    What is Relay Server?
    Relay Server Pro
    Requirements for installation
    How to install a Relay Server on different Linux platforms
    How to change IP address of Relay Server
    How to install a Responder with Relay Server support
    Proxy configurations
    Service Management for Relay Server
    Whitelisting for Relay Server
    Retrieving metrics from Relay Server
    Updating and Uninstalling Relay Server
    Troubleshooting
    Add Authorized User

    Since different cloud platforms utilize distinct identity and access management infrastructures and employ different working mechanisms, their requirements may vary; however, ultimately, all we need is an authorized account with list and control permissions on cloud assets.

    Investigators and analysts can add a cloud account to the Console by using the Assets page:

    1. From the Main menu, select Assets

    2. Click Add New and click Cloud Account

    3. Then click the Add Account button according to the cloud platform you want to add on the appearing Cloud Platforms window

    The configurations that need to be performed according to the cloud platforms are listed below.

    Amazon Web Services Compute EC2

    Either of the two methods mentioned above will redirect investigators and analysts to similar pages, allowing them to enter their account details. They can either enter their existing account details, which are given below, or use the cloud formation link provided by AIR to create a new account with enough permissions.

    Account Name: Optional field.

    Access key ID: Mandatory field and it must be filled with the value provided by AWS

    Secret access key: Mandatory field and it must be filled with the value provided by AWS

    Organization: Mandatory field and it must be selected from the Organization created on the AIR console. Every cloud account can be assigned to only one organization.

    Cloud account needs the following permissions to deploy virtual machines AIR responder.

    arn:aws:iam::aws:policy/AmazonEC2ReadOnlyAccess arn:aws:iam::aws:policy/CloudWatchAgentServerPolicy arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore arn:aws:iam::aws:policy/AmazonSSMDirectoryServiceAccess arn:aws:iam::aws:policy/service-role/AmazonSSMMaintenanceWindowRole arn:aws:iam::aws:policy/AmazonSSMReadOnlyAccess ssm:CancelCommand

    The creation of an AWS Account with sufficient permissions flow is explained below.

    1. Click on the URL and Create an Account

    2. Open AWS Console -> IAM -> Users

    3. Select the User -> Security Credentials -> Create Access Key

    4. Fill out the Account Details Form

    Microsoft Azure Virtual Machines

    Either two different ways mentioned above will redirect investigators and analysts to similar pages allowing them to enter account details. They can either enter their existing account details, which are given below or create a new account with enough permissions.

    Account Name: Optional field.

    Application (client) ID: Mandatory field and it must be filled with the value provided by Azure

    Subscription ID: Mandatory field and it must be filled with the value provided by Azure

    Tenant ID: Mandatory field and it must be filled with the value provided by Azure

    Key (Client Secret): Mandatory field and it must be filled with the value provided by Azure

    Organization: Mandatory field and it must be selected from the Organization created on the AIR console. Every cloud account can be assigned to only one organization.

    Cloud accounts need the following permissions to deploy the virtual machine responder.

    Reader VirtualMachine Contributor

    The creation of an Azure Account with sufficient permissions flow is explained below.

    1. Azure portal -> App Registrations -> New Registration

    2. Assign required roles to the new app registration for the subscription

    3. App Registrations -> Open the created App Registration

    4. Certificates & Secrets -> Create a new client secret

    5. Fill out the Account Details Form

    Google Cloud Platform

    Coming soon

    Synchronization and Enumeration

    The Console immediately starts to enumerate the cloud platform and retrieves the assets list and asset details after the cloud account is added. It discovers the assets depending on the permissions and authorizations of the cloud accounts. All discovered assets will be shown under the Amazon AWS category under the associated organization.

    The assets and their details are shown on the right side of the Secondary Menu in the Assets page as a list. Assets in which the AIR responder is deployed are shown in blue, and the assets in which the AIR responder is not deployed are shown in grey in that list.

    If investigators or analysts do not sync the cloud account manually, AIR Console automatically syncs in 30 minutes and updates the asset list.

    Responder Deployment

    All deployment actions are considered tasks by the AIR Console and listed under the Tasks as responder Deployment tasks. Therefore, all responder deployment actions and their status can be seen on the Tasks list.

    The primary advantage of responder deployment in a cloud platform is automation. Analysts and investigators don't need to choose the operating systems and their versions. They only assign deployment tasks to the associated devices, and all deployment processes are performed quicker and easier automatically.

    Investigators and analysts can deploy responders to cloud assets by using the Endpoint page:

    1. From Assets in the Main Menu: All cloud assets are listed here in the Secondary Menu. Investigators and analysts can search, filter and see the details of the assets on this page.

    2. Investigators and analysts can deploy the responders individually, with multiple selections or all of them with one click.

      1. Individual deploy: Click the assets and then click the Deploy button

      2. Multiple selections: Select the assets in the list by clicking a checkbox at the beginning of the asset line. Then Actions button immediately appears at the top of the page. Click Deploy Responder the under the Actions menu.

      3. Deploy to All Assets: Click the three-dot on the right side of the Amazon AWS or Tag, which includes associated cloud assets. Then click Deploy Responder

    here
    Cloud Forensics: Tornado

    Account Settings

    The Account Settings section in AIR allows users to manage personal preferences and session details. This section is accessible via the user icon located in the top-right corner of the AIR interface toolbar.

    What You Can Do in Account Settings

    • View Account Details: Includes your registered name, surname, email address, and username.

    • Change Password: Locally authenticated users can update their password directly from here.

    • Sign Out: Securely log out of your AIR session.

    • Customize Theme Preferences: Switch between Light and Dark Mode or set the UI to follow system time-based settings.

    Dark Mode

    The AIR interface supports a Dark Mode UI theme, providing a modern, eye-friendly visual style that is ideal for use in low-light conditions or during extended periods of use. This feature:

    • Enhances usability and reduces eye strain.

    • Can be toggled manually between Light and Dark modes.

    • Includes an Auto mode that adapts the UI based on your machine's time zone and daylight saving hours, ensuring a seamless experience.

    Dark Mode aligns with current UI standards and user expectations, supporting a comfortable and productive working environment.

    User Profile Photos

    Users can upload their own profile images. These will be displayed across the AIR console UI in user-facing areas, such as the user menu, case history, and activity logs. Supported for both regular and SSO-authenticated users, although not synced from the identity provider.

    Responder and Active Directory OUs

    This page summarizes the capabilities and current limitations of Responder for Organization Units (OUs) within an Active Directory (AD) environment.

    Key Points:

    1. Current Capability:

      • Once Active Directory integration is complete, the AIR will display the domain on the Assets page.

      • Users can filter assets by clicking on their Organization Unit on the Assets page. Further filtering for "Managed Status in Managed" will show assets where the Responder is installed.

    2. Limitations and Requests:

      • As of now, AIR does not support querying or installing Responders directly at specific OU levels (e.g., SecurityTesting.AIR.local) beyond the root AD level (e.g., AIR.local).

      • A feature request has been submitted to allow integration directly at the OU level to enhance targeted management within the domain structure.

    3. Installation Note:

      • The AIR Responder will report on systems where it is installed. It does not automatically install on systems within an AD environment where it is not already installed.

    Integrating AIR with Active Directory: Permissions Information

    When integrating AIR with Active Directory, it is important to note that the account used for this integration does not require Domain Admin permissions. The integration primarily involves LDAP searches for reading directory information. Therefore, having Domain Users permission is sufficient for LDAP integration with AIR. This ensures that the necessary operations can be performed securely without granting excessive privileges.

    Conclusion: Efforts to extend AIR's integration capabilities to specific OUs are ongoing, following feedback and feature requests. This enhancement aims to provide more granular control and efficiency in managing cybersecurity operations across different organizational units.

    Responder - MS Windows supported systems

    • Windows 7 SP1 (with latest updates)

    • Windows 8

    • Windows 8.1

    • Windows 10

    • Windows 11

    • Windows Server 2008 R2 (with latest updates)

    • Windows Server 2012

    • Windows Server 2012 R2

    • Windows Server 2016

    • Windows Server 2019

    • Windows Server 2022

    • Windows Server 2025

    Responder - Linux (DEB/RPM) supported systems

    • Centos 7

    • Centos 8

    • Centos 9

    • Fedora 21

    • Fedora 22

    • Fedora 24

    • Fedora 26

    • Fedora 34

    • Fedora 36

    • Amazon Linux 1 Latest

    • Amazon Linux 2 Latest

    • Redhat 7

    • Redhat 8

    • Redhat 9

    • Pardus 17

    • Pardus 21

    • Rockylinux 9

    • Rockylinux 8

    • Debian 7

    • Debian 8

    • Debian 10

    • Debian 11

    • Debian 12

    • Ubuntu 12.04

    • Ubuntu 14.04

    • Ubuntu 16.04

    • Ubuntu 18.04

    • Ubuntu 20.04

    • Ubuntu 22.10

    • Ubuntu 23.04

    • Ubuntu 24.04

    • Boss Linux 7

    • Boss Linux 8

    • Boss Linux 9

    • Boss Linux 10

    All Linux distros can run on 32/64 bit and ARM64 architectures.

    AIR Watchdog Folder

    AIR Watchdog Folder:

    C:\ProgramData\.binalyze-air\ or %ProgramData%\.binalyze-air\*

    The AIR Watchdog Folder (C:\ProgramData\.binalyze-air\ or %ProgramData%\.binalyze-air\) is a critical directory used by the AIR responder for storing internal data required to maintain and monitor the health and proper functioning of the AIR responder agent. This folder contains temporary files, logs, and configuration data that help the Watchdog component of the AIR platform ensure that the responder agent is running correctly and automatically restarts the agent if any issues arise.

    Purpose of the Watchdog Folder

    1. Health Monitoring: The Watchdog monitors the responder agent's status. If the agent stops unexpectedly or malfunctions, the Watchdog uses this folder to store diagnostic data and trigger the necessary actions (e.g., restarting the agent).

    2. Temporary Storage: The folder stores temporary files used by the AIR responder during its forensic and investigative processes. These may include logs, process monitoring data, or execution-related files.

    3. Configuration Data: The directory can also house configuration and state files that help the agent track its operational state, ensuring that it maintains continuity of processes even in the event of interruptions.

    Exception Configuration

    When configuring EDR (Endpoint Detection and Response) or AV (Antivirus) software, it is essential to exclude this folder from being scanned or interfered with. Failure to do so may cause unnecessary alerts or interruptions to the operations of the AIR responder, potentially halting the forensic collection process or causing data collection to fail.

    Folder Path Variations

    • Absolute Path: C:\ProgramData\.binalyze-air\* This is the standard path used by the AIR Watchdog on Windows systems.

    • Environment Variable Path: %ProgramData%\.binalyze-air\* This variation uses the %ProgramData% environment variable, which points to the C:\ProgramData\ folder. It's a more dynamic way of referencing the same location in different system configurations.

    Importance of Allow-Listing This Folder

    For AIR to function seamlessly, especially during critical incident response tasks, excluding this folder from AV/EDR scans or interference is vital. The Watchdog service ensures that the responder remains operational and recovers automatically if disrupted.

    To ensure uninterrupted operation, follow these allow-listing rules in your security setup:

    • Windows AV/EDR Systems: Allow-list the folder C:\ProgramData\.binalyze-air\*

    • Linux/macOS Equivalents: Similar watchdog components may exist in those environments within paths like /usr/share/.binalyze-air/ or /opt/binalyze/air/agent/ (adjust based on OS).

    By allowing the Watchdog folder, you ensure AIR remains resilient and responsive, even in the event of unexpected issues.

    Investigation Hub Disk Usage

    This feature empowers users to manage Investigation Hub data storage effectively and is fully explained here: Investigation Hub – Data Usage Statistics Dashboard.

    Bitdefender Logs

    Overview

    Evidence: Bitdefender Logs Description: Collect Bitdefender Logs Category: Applications Platform: windows Short Name: btfndrls Is Parsed: No Sent to Investigation Hub: No Collect File(s): Yes

    Background

    Bitdefender is an enterprise-grade security solution that maintains detailed logs of endpoint protection, firewall activities, malware detections, and system events. Logs include XML-formatted system events, firewall logs, and database files containing threat intelligence.

    Data Collected

    This collector gathers structured data about bitdefender logs.

    Collection Method

    This collector gathers Bitdefender logs from multiple locations including Endpoint Security logs, Desktop profile logs, system XML files, firewall logs, and database files containing security event data.

    Forensic Value

    Bitdefender logs are critical for investigating security incidents, tracking malware detections, analyzing firewall blocks, and understanding endpoint protection events. They provide comprehensive visibility into threats, network traffic controls, and security posture over time.

    Apache Logs

    Overview

    Evidence: Apache Logs Description: Collect Apache Logs Category: Applications Platform: windows Short Name: apcl Is Parsed: No Sent to Investigation Hub: No Collect File(s): Yes

    Background

    Apache HTTP Server and Tomcat logs record web server activity including access logs, error logs, and application-specific logs. These logs are critical for understanding web server operations and detecting web-based attacks.

    Data Collected

    This collector gathers structured data about apache logs.

    Collection Method

    This collector gathers Apache and Tomcat log files from standard installation directories in Program Files, collecting access logs, error logs, and other server activity logs.

    Forensic Value

    Apache logs are essential for detecting web attacks, unauthorized access attempts, data exfiltration, and command injection. They reveal attacker IP addresses, requested URLs, user agents, and exploitation attempts against web applications.

    AnyDesk Logs

    Overview

    Evidence: AnyDesk Logs Description: Collect AnyDesk Logs Category: Applications Platform: windows Short Name: nydskl Is Parsed: No Sent to Investigation Hub: No Collect File(s): Yes

    Background

    AnyDesk is a widely-used remote desktop application frequently leveraged by both legitimate users and threat actors. It stores trace logs, configuration files, connection traces, and recorded sessions. The software is commonly abused for initial access and persistence in cyber attacks.

    Data Collected

    This collector gathers structured data about anydesk logs.

    Collection Method

    This collector gathers AnyDesk trace files, configuration files, connection trace logs, and recorded session files from user and system directories.

    Forensic Value

    AnyDesk artifacts are critical for investigating unauthorized remote access, as the tool is frequently used in ransomware attacks, tech support scams, and remote access trojans. Logs reveal connection IDs, session times, file transfers, and can link to specific AnyDesk addresses used by attackers.

    export AIR_HTTP_PROXY=proxy.example.com:3128
    export AIR_HTTPS_PROXY=proxy.example.com:4128
    export AIR_NO_PROXY=localhost,127.0.0.0/8,::1
    export HTTP_PROXY=proxy.example.com:3128
    export HTTPS_PROXY=proxy.example.com:4128
    export NO_PROXY=localhost,127.0.0.0/8,::1
    sudo reboot

    This careful handling of the shutdown process helps maintain the integrity of the ongoing communications and ensures that all necessary cleanup and termination procedures are executed properly. However, it is important to note that the actual duration may vary based on the number of connected endpoints and the complexity of the ongoing communications.

    Relay Server provides support for reloading its configuration file without the need to restart the service. You can accomplish this by executing the following systemctl command:

    By running this command, any changes made to the Relay Server's configuration file will be applied without requiring a full restart of the service. This allows you to update the configuration manually and have the new settings take effect immediately.

    sudo systemctl start Binalyze.AIR.Relay.service
    sudo systemctl stop Binalyze.AIR.Relay.service
    sudo systemctl restart Binalyze.AIR.Relay.service
    sudo systemctl reload Binalyze.AIR.Relay.service
    Troubleshooting: Log Retrieval

    Alternatively, you can refer to the following files located in the Relay Server directory:

    • /opt/binalyze/air/relay/air_relay.log.txt

    • /opt/binalyze/air/relay/air_relay.process.log.txt

    Please note that these log files are rotated and compressed, allowing you to view older log files if needed.

    These log files contain valuable information that can assist in diagnosing issues, identifying errors, and understanding the overall behavior of the Relay Server. By reviewing the logs, you can gain insights into the operations and events occurring within the Relay Server environment.

    Multiple options can be selected.

    sudo systemctl restart Binalyze.AIR.Relay.service
    Updating and Uninstalling Relay Server: Relay Server Details

    Architecture

    A brief overview of system architecture

    Components

    AIR is an on-premise or cloud-based, client-server solution that allows you to remotely perform various tasks on assets such as collecting forensic evidence and performing threat hunts with YARA, Sigma, or osquery.

    1. Management Console

    Management Console is a web-based application that can be viewed from any device with an up-to-date browser.

    2. AIR Responders

    Assets are connected to the management console via a lightweight "passive" responder that can be deployed manually or via other mechanisms such as SCCM.

    2.1. Passive Responder Explained

    AIR responders;

    • DO NOT scan anything on the asset that may cause slowdowns (e.g. your Antivirus),

    • DO NOT block anything on the asset that may cause false positives (e.g. your DLP),

    • DO NOT create any alerts that may cause "alert fatigue".

    3. Communication with the Binalyze Domain

    DOMAIN
    CATEGORIES
    DESCRIPTION

    A note on Cloud Infrastructure

    All of the web services and API backends listed above are hosted on Microsoft Azure preferably in East/West US Datacenters and protected by Cloudflare.

    What data is sent or received by Binalyze domains

    Domain
    Data Sent To Domain
    Data Received From Domain

    How to install a Relay Server on different Linux platforms

    To ensure proper installation of the Relay Server, the responder must be installed and registered within the same organization and on the same system. If you plan to install the responder beforehand, you should select a direct connection as the Relay Server will be located on the same system.

    From the "Organizations" page, when you create a new organization or select an existing one, it will bring you to a page where you can deploy a new Relay Server.

    How to install a Relay Server on different Linux platforms: Oranization Detail

    By clicking "New Relay", a deployment page brings up for the Relay Server:

    How to install a Relay Server on different Linux platforms: Linux Debian

    As you can see, there are packages available based on Debian or Redhat distributions. You can select either the 64-bit or ARM64 version by clicking the arrow next to the "Download" button.

    Once the package is downloaded, you will need to configure the environment settings for the Relay Server to register with the AIR Console. To simplify this process, you can easily copy the necessary commands by clicking the "copy" button located in the right corner of the command.

    export AIR_DEPLOYMENT_TOKEN=dce4e59125c545a2
    sudo -E dpkg -i ./binalyze-air-relay-server_2.22.0_*.deb

    After copying the commands, open a terminal and navigate to the directory where you have downloaded the package. If the directory is "Downloads" in your home folder, you can go to that folder by executing the following commands in the terminal:

    As part of the Relay Server installation process, it performs a check to verify the availability of the responder. Additionally, it configures the responder to manage the newly installed Relay Server.

    Upon successful installation, you will be able to view your newly deployed Relay Server on the "Organization Detail" page.

    How to install a Responder with Relay Server support

    When deploying a new responder to an asset, you will encounter a configuration option that allows you to choose a connection route. This allows you to deploy a responder that either directly connects to the AIR Console or utilizes a connection route via a Relay Server.

    By selecting the "Relay Server Connection" radio button, you will be presented with a list of registered Relay Servers associated with this organization. From this list, select one option and proceed with the configuration.

    The subsequent steps remain the same as when deploying a new responder, regardless of the connection route chosen (Relay Server). Once you have successfully installed a new asset using the Relay Server connection, you will observe the newly deployed asset associated with the Relay Server on the "Organization Detail" page.

    How to install a Responder with Relay Server support: Organization Detail

    After selecting the installed Relay Server from the list on the "Organization Detail" page, you can access your associated assets by clicking on the "Assets" tab. Additionally, you can view comprehensive details of your Relay Server on this page by clicking on the "Information" tab.

    How to install a Responder with Relay Server support: Relay Server Details

    Updating the Connection Route address

    Furthermore, you can view and manage assets that are connected through this Relay Server. To modify the connection routing of your assets, navigate to the "Assets" tab. Simply select the asset that you would like to view or edit.

    Within the "Connection Route" setting, you have the option to choose between a direct connection to the AIR Console or selecting another Relay Server for your asset to connect to. This action will bring up the same settings page for connection routing that you encountered when deploying a new asset.

    Updating Connection Route addresses for multiple assets

    To update the connection route addresses for multiple assets in the same organization, follow these steps:

    1. Go to the organization's page (the organization where you want to update the assets) or the Assets page.

    2. Selected the desired assets within the same organization.

    3. Edit the connection route by selecting the icon at the end of the connection route row.

    4. Modify the connection route addresses or choose a Direct connection.

    By following these steps, you can easily update the connection route addresses for multiple assets in the same organization.

    Updating the responder’s connection route address using the command line

    Even if you manually update your connection route, during the next visit to AIR Console from the responder, the responder will retrieve and set the old connection route address. This occurs because the AIR Console is unaware of the address you have set. To avoid this, any changes to the connection route must be made directly from the AIR Console. The configure command mentioned below is primarily utilized for troubleshooting and testing the connection to the Relay Server.

    To manually update the connection route of your responder, you can run the responder with the "configure" flag. Follow these steps:

    1. Open a Terminal.

    2. Navigate to the directory where the responder is located.

    3. Run the configure command as shown below:

    Upon running the configuration command, the responder service will automatically restart with the updated configuration, including the new connection route that has been set. This ensures that the responder incorporates the changes and operates according to the new configuration.

    Whitelisting for Relay Server

    Relay Server is designed to facilitate communication between the AIR Console and the responder. As a result, Relay Server carefully examines all connection attempts to ensure they are directed towards AIR Console and blocks any connection requests to other destinations. This strict enforcement guarantees that only connections to AIR Console are permitted, thereby providing a secure environment and ensuring that no undesired connections to other addresses occur.

    To enable connections to addresses other than the AIR Console, a configuration called "Whitelist" is utilized. By specifying addresses or IP/FQDN patterns in the whitelist, the Relay Server allows communication between clients and the whitelisted addresses. In such cases, the Relay Server acts as a proxy between the client and the whitelisted address, ensuring seamless communication while still maintaining the necessary security measures.

    To add or modify the whitelist in the configuration file, you can follow these steps:

    1. Locate the config.yml file: /opt/binalyze/air/relay/config.yml

    2. If the Whitelist field is not present in the file, add it as a YAML array in the following format:

    In the Whitelist array, you can include various elements such as IP addresses, fully qualified domain names (FQDNs), FQDNs with wildcards, CIDR notations, IP ranges, or use an asterisk (*) to allow all connections.

    The Whitelist elements support the following formats:

    • IP address: Enter the specific IP address.

    • FQDN: Provide the fully qualified domain name.

    • FQDN with wildcard: Use an asterisk (*) as a wildcard character in the domain name.

    • CIDR: Specify the IP range using CIDR notation.

    FQDN addresses that have been added to the whitelist are not resolved to IP addresses. Therefore, destinations using IP addresses without FQDN will be denied. Relay Server only resolves IP addresses of Console Address in the configuration file.

    By configuring the whitelist, you can specify the allowed addresses or domains that Relay Server will permit connections to.

    After modifying the config file for Relay Server, it is essential to reload the configuration if Relay Server is already running. To accomplish this, you can use the following systemctl command:

    Security

    SSL Certificate

    Enable secure connections between AIR Console and users/assets by using SSL encryption.

    • Certificate: This displays the SSL certificate details used by AIR for secure HTTPS communication. In this case, the certificate is issued by Let's Encrypt (Issuer: Let's Encrypt, Common Name: R3) and is valid for a specific period (e.g., from 2022.09.18 to 2022.12.17).

    • Subject: The Common Name (CN) field shows the domain (e.g., air-demo.ACME.com) to which the certificate applies.

    • Having an SSL certificate ensures that all communications between users and the AIR Console are encrypted, preventing unauthorized access to sensitive information.

    SSL Root CA

    Acts as the root certificate authority (CA) for issuing certificates if a custom SSL certificate is not provided.

    • AIR generates an SSL Root CA for each instance when a custom certificate isn’t supplied. This certificate is used to create secure communication channels within the system.

    • Issuer and Subject: Both are BINALYZE R1, ensuring that the root certificate is tied to the Binalyze platform.

    • Validity: The root CA certificate is valid from 2017.10.14 until 2100.10.14, ensuring long-term use and security.

    Console Port

    Define the port over which the AIR Console is accessible.

    • The AIR Console is configured to be accessed on port 8443, which is a secure port typically used for HTTPS traffic.

    • Meanwhile, responders will continue to communicate with the console over the default secure port 443. This setup ensures that assets and users can access the platform via separate but secure ports, enhancing security and flexibility.

    IP Restriction

    Restrict access to the AIR Console based on IP addresses.

    • This feature allows administrators to restrict access to the AIR Console to a specific range of IP addresses, limiting who can interact with the console.

    • Important: This restriction does not affect communication between the AIR Console and the assets themselves. It only controls who can access the console’s user interface.

    • The current IP address of the user accessing the system (e.g., 172.71.122.69) is displayed for reference.

    Authentication

    Configure user authentication security settings.

    You can enforce Two-Factor Authentication (2FA) for all users, adding an extra layer of security by requiring a second form of verification (e.g., a mobile app code) when logging in. (SSO will override this option)

    • This setting enhances overall security by ensuring that only authenticated and verified users can access the system.

    Single Sign-On (SSO)

    Enable and configure Single Sign-On (SSO) for AIR.

    • SSO allows users to log in to AIR using their organization’s existing identity provider (e.g., Azure AD, Okta) without needing separate credentials. This simplifies the login process and enhances security by centralizing authentication management.

    • Tenant ID and Client ID: These are provided by the SSO identity provider (e.g., Azure, Okta) and uniquely identify the organization’s SSO configuration.

    • Client Secret: A secure key used for authenticating the connection between AIR and the SSO provider (shown as encrypted in the system).

    SSO improves user management and security by centralizing login credentials with your existing identity provider, simplifying the user experience while ensuring strong authentication practices.

    Responder in Windows Safe Mode

    AIR Responder Operation in Windows Safe Mode

    AIR Responder is now capable of functioning in Safe Mode, allowing forensic acquisition and remote tasking on machines operating in a restricted state. However, to maintain full functionality and allow task execution via the AIR Console, specific registry modifications must be applied before entering Safe Mode.

    Enabling AIR Responder in Safe Mode

    Before booting into Safe Mode, execute the following Registry modifications to register the AIR Agent Service:

    REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\Binalyze.AIR.Agent.Service" /VE /T REG_SZ /D "Service" /F

    REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Binalyze.AIR.Agent.Service" /VE /T REG_SZ /D "Service" /F

    These registry changes can also be enforced via the Windows UI by running msconfig to get to the System Configuration window where in the Boot tab, the user can select Safe Boot with the Network button active:

    These registry entries ensure the AIR Agent Service is recognized and loaded in Safe Mode.

    Behavioral Scenarios

    Safe Mode with Networking

    • If a machine enters Safe Mode with Networking, the AIR Agent will continue operating as expected, maintaining communication with the AIR Console.

    Safe Mode (Without Networking)

    • The AIR Agent cannot communicate with the console if networking is unavailable unless an off-network package is used for forensic acquisitions.

    Remote Task Execution

    • Without the registry modifications, the AIR Console cannot issue remote tasks to the endpoint in Safe Mode.

    • Adding the registry keys before booting into Safe Mode ensures that Responder and interACT remain functional.

    Manual Execution in Safe Mode (Not Recommended)

    • If the registry modifications are not applied and the AIR Agent does not load, users can manually execute AIR.exe after entering Safe Mode to establish a temporary connection.

    • However, this approach is not recommended due to potential inconsistencies and administrative overhead.

    By proactively applying the recommended registry changes, organizations can ensure seamless forensic investigations even when endpoints are booted in Safe Mode.

    Responder Exception Rules

    Overview

    Allow-listing is required for AIR responders to run acquisition tools, write temporary artifacts, and access protected areas of the file system. Without explicit exclusions in your Endpoint Protection Platform (EPP), Endpoint Detection and Response (EDR), or antivirus solution, these routine activities can trigger false positives and interrupt evidence collection.

    Use the tables below to add the recommended folder and binary exclusions for each supported operating system. Choose the entries that match your deployment to keep responders running without false positives.

    Windows

    Folders to Exclude:

    • C:\Program Files (x86)\Binalyze\AIR\agent\

    • C:\ProgramData\.binalyze-air

    Binaries to Exclude:

    • C:\Program Files (x86)\Binalyze\AIR\agent\AIR.exe

    • C:\Program Files (x86)\Binalyze\AIR\agent\DRONE.exe

    • C:\Program Files (x86)\Binalyze\AIR\agent\TACTICAL.exe

    Linux

    Folders to Exclude:

    • /opt/binalyze/air/agent/

    • /usr/share/.binalyze-air/

    Binaries to Exclude:

    • /opt/binalyze/air/agent/air

    • /opt/binalyze/air/agent/drone

    • /opt/binalyze/air/agent/tactical

    macOS

    Folders to Exclude:

    • /opt/binalyze/air/agent/

    • /usr/local/share/.binalyze-air/

    Binaries to Exclude:

    • /opt/binalyze/air/agent/air

    • /opt/binalyze/air/agent/drone

    • /opt/binalyze/air/agent/tactical

    Evidence Repositories

    AIR allows you to set up various Evidence Repositories for storing and managing collected data securely. The supported repository types are:

    1. SMB: Ideal for sharing files across network devices.

    2. SFTP: Utilizes SSH for encrypted data transfer.

    3. FTPS: Combines FTP with SSL/TLS for secure transfers.

    4. Amazon S3: Provides scalable cloud-based storage, perfect for large-scale investigations.

    Key Features:

    • Global or Organization-Level Setup: Repositories can be defined at both global and organizational levels, providing flexibility in evidence management across multiple AIR instances or within a single organization.

    • Secure Data Management: Protocols like SFTP and FTPS ensure that data transfers are encrypted, safeguarding sensitive information during uploads and downloads.

    • Automatic and Manual Uploads: Evidence can be automatically uploaded to repositories based on configured tasks, or users can manually upload files as needed.

    This setup ensures secure, scalable, and efficient management of evidence within AIR, accommodating various infrastructure needs.

    API

    Explore our comprehensive resource at docs.binalyze.com.

    The AIR API facilitates seamless communication with the AIR console, enabling users to collect information or execute tasks with precision and efficiency.

    We provide sample requests in various programming languages, including Go, Python, and Java, as well as sample cURL requests to equip users with comprehensive integration resources. These samples serve as practical guides, showcasing the seamless implementation of our API functionalities across different development environments.

    To access detailed documentation and unlock the full potential of our API, we invite developers to explore our comprehensive resource at docs.binalyze.com. Here, you can find in-depth explanations, tutorials, and reference materials that guide you through the integration process seamlessly.

    Our API documentation, which includes detailed endpoint descriptions, authentication guidelines, and practical code examples, offers invaluable insights for developers at every stage. Leverage the power of our API at docs.binalyze.com to empower your development journey and unlock new possibilities.

    Enhanced API Token Management with Role-Based Access Control

    API Token Management supports role-based access control (RBAC), which enhances security and flexibility while reducing the need for excessive permissions.

    • Global Admins can only create and modify API tokens.

    • Granular Permissions: Tokens inherit only the privileges of their assigned role (e.g., read-only or custom roles), preventing over-permissioning.

    • Post-Creation Role Updates: Token permissions can be modified after creation, allowing for dynamic access control.

    • Governance & Security:

    API token management in AIR has role-based limitations, allowing API usage to be tailored according to the selected role. This capability refines automation workflows and strengthens access control policies.

    ARP Table

    Overview

    Evidence: ARP Table Description: Collect ARP Table Category: Network Platform: windows Short Name: arpt Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No

    Background

    The ARP (Address Resolution Protocol) table maps IP addresses to physical MAC addresses on the local network. Windows maintains this cache for performance, storing recent IP-to-MAC mappings from network communication.

    ARP cache can reveal devices the system has recently communicated with on the local network, including routers, file servers, and other workstations.

    Data Collected

    This collector gathers structured data about arp table.

    ARP Table Data

    Field
    Description
    Example

    Collection Method

    This collector uses Windows API to enumerate ARP cache:

    • GetIpNetTable to retrieve all ARP entries

    • Parses MAC addresses into readable format

    • Records adapter associations

    ARP entry types: Other (1), Invalid (2), Dynamic (3), Static (4).

    Forensic Value

    ARP cache reveals local network communication patterns. Investigators use this data to identify devices on the local network, detect ARP spoofing attacks, track lateral movement targets, identify network infrastructure devices, correlate with network connections, and detect man-in-the-middle attacks.

    Brave Thumbnails

    Overview

    Evidence: Brave Thumbnails Description: Collect Brave Thumbnails Category: Applications Platform: windows Short Name: bthmb Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No

    Background

    Browser thumbnails are cached preview images of visited websites. This visual data supplements browsing history by providing screenshots of accessed pages, useful for recovering deleted history and identifying visited content.

    Data Collected

    This collector gathers structured data about brave thumbnails.

    Brave Thumbnails Data

    Field
    Description
    Example

    Collection Method

    This collector extracts cached thumbnail images from browser storage.

    Forensic Value

    Thumbnail analysis provides visual evidence of visited websites, can recover evidence after history deletion, and helps identify phishing pages, malicious sites, or sensitive internal resources accessed by users through visual inspection.

    Console Settings

    Console Settings: Categories in AIR's Secondary Menu

    All console settings can be accessed via the gear icon in the top-right corner of the header bar. This page provides a complete guide to configuring and managing settings across AIR, including:

    • General Settings: Platform-wide configurations.

    • Assets: Managing asset inventories.

    • Security: Setting up security features.

    • Features: Customizing AIR’s core functionalities.

    • Evidence Repositories: Configuring storage for collected evidence.

    • Policies: Defining evidence collection rules.

    • User Management:

      • Users

      • Groups

      • UserRoles

    • Backup and Backup History: Managing backups and retention schedules.

    • Investigation Hub Disk Usage: Empowers users to manage Investigation Hub data storage effectively.

    • Danger Zone.

    Each section ensures optimal setup for your AIR environment.

    $Secure:$SDS

    Overview

    Evidence: $Secure:$SDS Description: Dump Contents of $Secure:$SDS Category: DiskFilesystem Platform: windows Short Name: securesds Is Parsed: No Sent to Investigation Hub: Yes Collect File(s): Yes

    Background

    The $Secure file contains security descriptors for all files and directories on the NTFS volume. These descriptors include access control lists (ACLs), ownership information, and audit settings. The $SDS alternate data stream stores the actual security descriptor data, which is referenced by file entries to avoid duplication.

    Data Collected

    This collector gathers structured data about $secure:$sds.

    $Secure:$SDS Data

    Field
    Description
    Example

    Collection Method

    This collector uses kernel driver NTFS raw access to read $Secure:$SDS from each fixed NTFS drive.

    Forensic Value

    Security descriptors provide critical information about file permissions, ownership, and access control. This data can reveal unauthorized access, privilege escalation attempts, and security policy violations. Essential for investigating insider threats and understanding who had access to sensitive files.

    Active Script Event Consumers

    Overview

    Evidence: WMI Active Script Description: Dump WMI Active Script Event Consumers Category: System Platform: windows Short Name: wmiasc Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No

    Background

    WMI ActiveScript Event Consumers execute VBScript or JScript code when specific WMI events occur. This is a powerful persistence mechanism that allows attackers to run arbitrary scripts with SYSTEM privileges in response to system events.

    ActiveScript consumers are particularly dangerous because they don't require a file on disk (fileless persistence) and run with high privileges.

    Data Collected

    This collector gathers structured data about wmi active script.

    WMI Active Script Data

    Field
    Description
    Example

    Collection Method

    This collector queries WMI for ActiveScriptEventConsumer instances in multiple namespaces:

    • ROOT\Subscription

    • ROOT\DEFAULT

    • ROOT\CIMV2

    Forensic Value

    ActiveScript consumers are a common advanced persistence technique. Investigators use this data to detect WMI script-based persistence, identify malicious VBScript/JScript payloads, and track fileless malware techniques.

    Backup

    AIR > Settings > Backup:

    The AIR Backup feature allows users to back up system data securely and flexibly through the UI or Command Line Interface (CLI). Backups can be stored locally, on SFTP, or in Amazon S3, and encrypted using AES256 with a password.

    Backups can be performed immediately or scheduled at intervals of every 4 hours, daily, weekly, or monthly. Users can set the number of backups to retain and the scheduled start time. CLI backup options are available, with detailed instructions in the Knowledge Base.

    AIR > Settings > Backup History:

    This page displays the Backup History available to the AIR console.

    AIR Backup File Naming Convention

    AIR backup files use a structured naming format that embeds timestamp and version information directly into the .abf filename. This makes it easy to identify when a backup was created and which internal backup schema and AIR console version were used.

    Example Filename

    Filename Components

    Date Component: 25-11-17

    • 25 = Year (2025)

    • 11 = Month

    • 17 = Day

    Time Component: 6-6-0-026

    Represents the exact creation time of the backup:

    • 6 = Hour

    • 6 = Minute

    • 0 = Second

    • 026 = Millisecond

    Backup File Format Version: v4

    Indicates the internal backup schema/version used by AIR. This ensures compatibility between console versions and the expected backup structure.

    AIR Console Version: AIRv5.5.1

    Shows which AIR version generated the backup.

    File Extension: .abf

    AIR Backup File.

    Summary

    ~25-11-17_6-6-0-026_v4_AIRv5.5.1.abf means the backup was created on 17 November 2025 at 06:06:00.026, using the v4 backup format, from an AIR 5.5.1 console.

    Network Communication

    How do assets communicate with the console?

    How Do Assets Communicate with the Console?

    All routine communication between assets and the AIR console is initiated by the assets—they do not receive incoming requests from external sources. Communication occurs through various protocols and channels:

    Relay Server Pro

    Relay Server Pro is available starting with AIR version 5.4 and represents the next generation of secure relay communications for Binalyze AIR.

    Overview

    Relay Server Pro is a fundamental architectural evolution in secure relay operations for Binalyze AIR. It replaces the legacy SOCKS5-based relay server with a fully authenticated HTTPS proxy that implements JWT-based two-step verification for Responders connecting through constrained or segmented networks.

    User Management

    AIR > Settings > User Management > Users:

    This section enables administrators to view existing users and their attributes. It also allows for the addition of new users to the AIR platform, where key details such as name, organization, role, and login credentials are specified during setup.

    For organizations needing to onboard multiple users simultaneously, the Import Users button provides bulk user import capability via CSV file upload or email list. Optional metadata such as organization, role, or group can be included for automatic assignment. A preview step allows validation before changes are applied, expediting onboarding for large enterprise security operations teams while reducing human error and maintaining consistent access structures.

    Mandatory fields are marked with an asterisk (*).

    Two-factor authentication (2FA)

    In AIR (Settings > Security > Authentication), two-factor authentication (2FA) is a security feature designed to enhance user account protection by requiring two forms of verification when logging in. This adds an additional layer of security beyond the traditional username and password combination, significantly reducing the risk of unauthorized access.

    Some key points about 2FA in AIR:

    • LDAP User Compatibility with 2FA: AIR supports two-factor authentication (2FA) for LDAP users. You can easily configure 2FA directly from the account settings within AIR, making the setup process straightforward and efficient for centralized user management systems.

    • Administrators can enforce two-factor authentication (2FA) for all users. This uniform security policy enhances overall security by requiring all users to authenticate with an additional method, such as a one-time password (OTP) sent to a mobile device or generated by an authenticator app.

    Antivirus Information

    Overview

    Evidence: Antivirus Information Description: Collect information about installed antivirus Category: System Platform: windows Short Name: avi Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No

    $Boot

    Overview

    Evidence: $Boot Description: Dump Raw Contents of $Boot File Category: DiskFilesystem Platform: windows Short Name: ntfsboot Is Parsed: No Sent to Investigation Hub: Yes Collect File(s): Yes

    Organization Settings

    Organizational Controls

    From the top bar, the drop-down allows the user to select:

    • Organization Settings

    $TxfLog $Tops:$T

    Overview

    Evidence: $TxfLog $Tops:$T Description: Dump Contents of $TxfLog$Tops:$T Category: DiskFilesystem Platform: windows Short Name: txflogtops Is Parsed: No Sent to Investigation Hub: Yes Collect File(s): Yes

    $LogFile

    Overview

    Evidence: $Log File Description: Dump raw contents of $LogFile Category: DiskFilesystem Platform: windows Short Name: ntfslog Is Parsed: No Sent to Investigation Hub: Yes Collect File(s): Yes

    AppCompatCache

    Overview

    Evidence: AppCompactCache Description: Enumarate AppCompatCache (aka ShimCache) Category: System Platform: windows Short Name: appcc Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No

    AppPaths

    Overview

    Evidence: AppPaths Description: Enumerate AppPaths Category: System Platform: windows Short Name: apppaths Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No

    Brave Favicons

    Overview

    Evidence: Brave Favicons Description: Collect Brave Favicons Category: Applications Platform: windows Short Name: bfico Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No

    API is likely to be more effective than Webhooks

    Why Using the API in AIR is Likely to be More Effective

    APIs and webhooks both serve as methods for integrating systems and enabling communication between applications, but they are suited for different use cases. In many scenarios, using APIs is recommended over webhooks due to the control, flexibility, and broader operational capabilities they offer.

    Supported Evidence

    These pages categorize the supported evidence and artifacts by OS, indicating whether each item is parsed and presented in the Investigation Hub and/or if the associated file is collected.

    The table below provides a count of the currently supported evidence and artefact items

    AIR For Chrome

    1- Click evidence collection for Chrome

    The AIR responder standalone collector currently provides support for execution on Chrome v90+ operating systems.

    AIR For Chrome is the evidence collector extension for Chrome and ChromeOS. AIR For Chrome extension allows investigators and analysts to capture forensically sound data with a single click at machine speed. All data is collected into a well-organized HTML report that is accompanied by individual CSV files. Investigators and analysts can use AIR For Chrome Extension to collect forensically sound data from Google Chrome and ChromeOS.

    AIR For Chrome is the fastest and easiest way of capturing forensically sound data from Google Chrome browsers. The forensically sound data collected by AIR For Chrome are listed below.

    • Browser History

    AmmyAdmin Logs

    Overview

    Evidence: AmmyAdmin Logs Description: Collect AmmyAdmin Logs Category: Applications Platform: windows Short Name: aammyadmnlg Is Parsed: No Sent to Investigation Hub: No Collect File(s): Yes

    Responder for Golden Images

    In AIR a Golden Image is for customers who want to use the same Operating System image files to generate new machines with a responder already installed. As AIR use the computer name/hostname of the machine/asset as a unique identifier for the machine/asset, customers cannot use the exact same image in which AIR Responder is already installed without newly introduced golden image support.

    It basically cleans some configuration options set during registration and then disables and stops the Responder service before the image of the operating system is taken. To do this, we use `--prepare-golden-image' flag that is explained below. This must be called before the imaging process takes place.

    After the image is prepared, the user must use --init-golden-image flag, which is explained below before the image is used to create a new instance.

    --prepare-golden-image

    The user must use this flag before creating a golden image.

    Callback URL: This is the URL where users are redirected after successful authentication via SSO (e.g., https://air-demo.ACME.com/api/auth/sso/azure/callback) . It ensures that users are logged into the AIR platform after authenticating through the identity provider.
  • Entry Point and Issuer: These fields are also part of the SSO configuration, ensuring that AIR communicates correctly with the identity provider.

  • Certificate: Uploading a certificate from the identity provider is necessary for secure communication between AIR and the SSO service.

  • C:\ProgramData\.binalyze-air\WATCHDOG.exe
  • C:\Program Files (x86)\Binalyze\AIR\agent\utils\curl.exe

  • C:\Program Files (x86)\Binalyze\AIR\agent\utils\osqueryi.exe

  • /opt/binalyze/air/agent/utils/osqueryi
  • /opt/binalyze/air/agent/utils/curl

  • /usr/share/.binalyze-air/watchdog

  • /opt/binalyze/air/agent/utils/osqueryi
  • /opt/binalyze/air/agent/utils/curl

  • /usr/share/.binalyze-air/watchdog

  • Task Management: Repositories support task scheduling for evidence uploads, ensuring a smooth workflow for collecting, storing, and analyzing evidence.
  • Connection Settings: When configuring repositories, users must provide essential connection details such as credentials, encryption options, and repository paths. For cloud-based storage like Amazon S3, you also need to configure bucket settings.

  • The role assigned to a token and its creator cannot be deleted unless the token is reassigned or removed.

  • This enhances audibility and compliance with the principle of least privilege.

  • Unlike the previous relay server, Relay Server Pro is deployed independently of the Responder, reducing the overall attack surface and aligning with modern zero-trust and least-privilege design principles. Configuration and registration are managed centrally through the AIR Console, ensuring that only validated relays are permitted to handle Responder communications.

    Each connection between a Responder and Relay Server Pro is authenticated, logged, and validated, providing end-to-end integrity and accountability for all command and evidence transfers. For DFIR teams, Relay Server Pro ensures traceable, secure intermediary communications across segmented environments and enhances AIR deployments in organizations that enforce strict network isolation or operate within zero-trust architectures.

    Problem Solved

    The legacy relay server was originally designed for use in local networks and did not include an authentication mechanism to securely verify or authorize connecting Responders. This design, while effective in controlled environments, created several limitations:

    • No built-in authentication to verify connecting Responders

    • Tight coupling with Responder created dependencies on the Responder's release cycle for updates

    • Limited flexibility for enterprise network configurations

    • Reduced security in zero-trust or heavily segmented environments

    Relay Server Pro addresses these limitations by introducing secure, credential-based authentication and architectural independence.

    Key Features & Improvements

    Security & Authentication

    • Built-in authentication tied directly to the Responder's Console registration credentials

    • JWT-based two-step verification ensures only trusted Responders can connect

    • Authenticated connections with full logging and validation for every communication

    • Reduced attack surface through deployment separation from endpoint agents

    Protocol & Connectivity

    • HTTPS Proxy Connect support out of the box for reliable communication through enterprise firewalls

    • Custom port configuration to meet enterprise security requirements

    • Proxy all TCP connections for comprehensive relay capabilities

    • URL-based addressing format for more precise configuration

    Operational Excellence

    • Independence from Responder - no longer dependent on Responder installation, updates, or release cycle

    • Standalone operation allows faster updates and greater scalability

    • Modernized JSON logging accessible only from local administration, eliminating remote exposure risks

    • Caching support for large downloads to improve performance

    Future-Ready Architecture

    Relay Server Pro has been engineered with extensibility in mind, enabling Binalyze to incorporate additional customer requirements and enhancements without significant architectural rework.

    Value Proposition

    Relay Server Pro delivers:

    • Secure authentication using credentials already registered to the Console

    • Protocol modernization via HTTPS Proxy Connect for enterprise environments

    • Operational flexibility with custom ports and independent updates

    • Enhanced accountability with comprehensive JSON audit logging

    • Zero-trust readiness for organizations with strict network segmentation

    Transition & Deprecation

    The legacy relay server will be deprecated in a future release. Both versions will run in parallel during the transition period.

    Migration Timeline

    During AIR 5.4 and subsequent versions:

    • Both Relay Server Pro and the legacy relay server are supported in parallel

    • Users are encouraged to begin migrating configurations to Relay Server Pro

    • The deprecation timeline for the old relay server will be communicated in a future release

    Migration Recommendations

    Organizations should plan to transition to Relay Server Pro to take advantage of:

    • Enhanced security features and authentication

    • Independent update cycles

    • Modern logging and accountability

    • Better support for zero-trust architectures

    Use Cases

    Relay Server Pro is ideal for:

    • Segmented networks requiring authenticated relay communications

    • Zero-trust environments enforcing strict network isolation policies

    • Enterprise deployments with complex firewall and proxy configurations

    • DFIR operations requiring traceable and auditable network intermediary communications

    • Organizations needing independent relay update cycles

    Summary

    Relay Server Pro strengthens the security posture of AIR deployments by authenticating every Responder connection, modernizing relay communication, and decoupling relay operations from Responder releases — setting a new standard for secure, scalable relay communication in DFIR environments.

    Background

    Windows Security Center tracks registered antivirus and antispyware products. Security software registers itself with Security Center to report its status to Windows.

    This information helps investigators understand the security posture of the system and whether adequate protection was present during an incident.

    Data Collected

    This collector gathers structured data about antivirus information.

    Antivirus Information Data

    Field
    Description
    Example

    AntiVirus

    Comma-separated list of AV products

    Windows Defender,McAfee Endpoint Security

    Collection Method

    This evidence is collected as part of the System collector by querying WMI:

    • ROOT\SecurityCenter - For Windows XP (AntiVirusProduct, AntiSpywareProduct)

    • ROOT\SecurityCenter2 - For Windows Vista+ (AntiVirusProduct, AntiSpywareProduct)

    Queries both AntiVirusProduct and AntiSpywareProduct classes and extracts DisplayName.

    Forensic Value

    Antivirus information helps assess security posture and detection capabilities. Investigators use this data to verify security software presence, identify detection gaps, correlate with malware infections, assess why threats weren't detected, and validate security controls.

    API Offers Broader Capabilities Beyond Acquisitions

    With webhooks in AIR, you can only trigger acquisitions. However, APIs allow you to access and perform far more operations, making them the preferred method for extensive system interactions and automation.

    1. Control Over Data Requests

    • API (Application Programming Interface): APIs enable clients to request data from the server as needed actively. This provides greater control over when and how data is retrieved. If your application requires data on demand or in real-time (e.g., when a user requests information), APIs are more suitable, as they enable the retrieval of data as needed.

    • Webhook: Webhooks rely on the server to push data to the client based on predefined events. The client passively waits for updates, which may result in missed data if the client is not ready or the webhook fails.

    2. Error Handling & Retry Mechanisms

    • API: APIs are generally more reliable because they operate within a request-response cycle. If a request fails, the client can handle errors, retry the request, or log the issue. This gives greater control over failure management.

    • Webhook: Webhooks can be unreliable in environments with unstable real-time connectivity. If a webhook fails (e.g., the client is offline or the endpoint is inaccessible), it relies on the server’s retry mechanisms, which may not always be reliable.

    3. Security & Authentication

    • API: APIs typically have strong security measures, such as API keys or OAuth for authentication. They enable fine-grained access control, allowing for the definition of specific scopes and permissions.

    • Webhook: Webhooks can also be secured, but they often provide less granular control over who can receive the data. Webhooks rely on callbacks, making them more vulnerable to attacks such as man-in-the-middle or endpoint spoofing.

    4. Customizability & Flexibility

    • APIs offer more flexibility, allowing clients to request exactly the data they need. Clients can filter, sort, or customize responses according to their specific requirements. This level of optimization is key to efficient data handling.

    • Webhooks push predefined data with limited flexibility. If only part of the data is required, webhooks may send unnecessary information, resulting in inefficiencies.

    5. Scalability & Polling

    • While APIs can lead to over-polling, modern APIs include optimizations such as caching or using long-polling methods (like GraphQL) to retrieve only the necessary data. This makes APIs scalable for large applications.

    • Webhooks eliminate polling by pushing real-time updates. However, frequent triggers across many users can become resource-intensive and difficult to manage.

    6. Real-time Needs

    • Webhooks are ideal for real-time updates when the client doesn’t want to poll the server frequently. They work well in event-driven systems that require instant notifications, such as payment alerts or status updates.

    • API: For use cases where real-time updates are not critical, or when the client needs precise control over when to retrieve data, APIs offer a better solution. For instance, querying data based on user actions or scheduling retrievals at specific intervals.

    Summary: When APIs are Recommended

    • On-Demand Requests: APIs are better when the client needs to control when and how often data is requested.

    • Error Handling: APIs offer more effective mechanisms for managing errors, thereby ensuring reliable data integration.

    • Security: APIs typically offer more robust and customizable security features.

    • Custom Data Needs: APIs give more flexibility for retrieving specific or customized data.

    • Scalability: APIs can be more efficient for large-scale systems that require avoiding constant event-triggered updates.

    When Webhooks are Preferred

    • Real-Time Notifications: Webhooks are well-suited for event-driven systems that require immediate updates, making polling an inefficient approach.

    • Low-Frequency, Event-Driven Integrations: For infrequent events, webhooks minimize unnecessary API calls.

    Best of Both Worlds: Combining APIs and Webhooks

    In many cases, combining both webhooks and APIs provides the best solution. Webhooks can handle real-time notifications, while APIs can be used to fetch additional data or control access when necessary.

    In AIR, for instance, while webhooks enable you to perform acquisitions, APIs allow for a wider range of operations, making them more versatile for comprehensive incident response and investigation workflows.

    Background

    AMMYY Admin (AmmyAdmin) is a remote desktop application that has been used both legitimately and by threat actors. The software maintains logs of remote connections and sessions.

    Data Collected

    This collector gathers structured data about ammyadmin logs.

    Collection Method

    This collector gathers log files from the AMMYY ProgramData directory containing connection history and activity records.

    Forensic Value

    AmmyAdmin logs are important for investigations as the software has been used by scammers and threat actors for unauthorized access. Logs reveal remote connection attempts, session times, and can identify malicious use of the tool.

    Windows: "C:\Program Files (x86)\Binalyze\AIR\agent\AIR.exe" configure --prepare-golden-image

    Linux/macOS: /opt/binalyze/air/agent/air configure --prepare-golden-image

    This flag does the following:

    • Stops the service.

    • Disables the service.

    • Cleans the RegisteredTo, SecurityToken, and EndpointID fields in the config.yml.

    • Uninstalls the watchdog (if tamper detection was enabled)

    --init-golden-image

    This flag activates the Responder again after the golden image is up and after the hostname is changed.

    Windows: "C:\Program Files (x86)\Binalyze\AIR\agent\AIR.exe" configure --init-golden-image --deployment-token 769aca0ff45a433a --console-address air-qa.binalyze.com --organization-id 0

    Linux/macOS: /opt/binalyze/air/agent/air configure --init-golden-image --deployment-token 769aca0ff45a433a --console-address air-qa.binalyze.com --organization-id 0

    Note: The use of --deployment-token is required. Because the deployment token is clean after the registration of the AIR Responder. The use of --console-address and --organization-id is optional. They are used to overwrite the console address and organization id which are already set in the configuration file at the first installation before the image was taken.

    This flag does the following:

    • Updates the DeploymentToken, ConsoleAddress, and OrganizationID values entered as a command in the config.yml.

    • Starts the service.

    • Enables the service.

    • Watchdog is installed automatically after registration if it is enabled by AIR Console.

    Troubleshooting

    Exit code other than 0 (zero) means an error occurred while executing commands. The terminal will print the error messages, and also log file will contain the error messages.

    If something goes wrong first option is to re-run the same command.

    If a re-run of the command doesn’t succeed, the user should perform the same steps manually.

    PhysicalAddress

    MAC address

    00:50:56:C0:00:08

    IPAddress

    IP address

    192.168.1.1

    Adapter

    Network adapter index

    12

    Type

    Entry type

    4 (Static)

    Title

    Title

    Example value

    Profile

    Profile

    Example value

    Path

    Path

    Example value

    UserName

    User Name

    Example value

    Browser

    Browser

    Example value

    URL

    URL

    Example value

    URLRank

    URL Rank

    123

    FileSize

    File size in bytes

    10485760

    Type

    File type

    SecureSDS

    Name

    File name

    $Secure:$SDS

    SourcePath

    Original path

    C:$Secure:$SDS

    FilePath

    Path in evidence

    NTFSFiles/$Secure_$SDS

    Name

    Consumer name

    MaliciousConsumer

    PayloadScriptEngine

    Scripting engine

    VBScript

    PayloadScriptText

    Script code

    Set objShell = CreateObject("WScript.Shell")...

    Linux

    170

    IBM AIX

    15

    ESXi

    35

    Grand Total

    741

    Collection Platform:

    Item Count

    Windows

    313

    macOS

    Windows Collections
    macOS Collections
    Linux Collections
    IBM AIX Collections
    ESXi Collections

    208

    How to install a Relay Server on different Linux platforms: Successful installation
    How to install a Responder with Relay Server support: Connection Route

    IP range: Indicate the range of IP addresses using a hyphen (-) between the start and end IP addresses.

    Whitelist:
      - testpage.com
      - test.binalyze.com
      - 10.5.2.1
      - *.google.com
      - 10.2.5.1/24
      - 10.2.5.3-10.2.5.16
    $ cd ~/Downloads 
    $ export AIR_DEPLOYMENT_TOKEN=dce4e59125c545a2 
    $ sudo -E dpkg -i ./binalyze-air-relay-server_2.22.0_arm64.deb 
    
    (Reading database ... 244560 files and directories currently installed.) Preparing to unpack binalyze-air-relay-server_2.22.0_arm64.deb ... 
    Trying to send SIGHUP to processes 
    Trying to lock for single instance 
    Locked for single instance remove service in progress 
    remove service OK 
    Unpacking binalyze-air-relay-server (2.22.0) over (2.22.0) ... Setting up binalyze-air-relay-server (2.22.0) ... 
    Failed to acquire lock. An instance of the AIR responder is running. Trying to stop the service... 
    Checking lock if it is still held... 
    Lock is held. AIR responder is not running 
    AIR responder service started 
    Completed 
    Relay service is configured successfully 
    AIR Relay successfully read and set environment variables. 
    Trying to lock for single instance 
    Locked for single instance 
    add service in progress 
    add service OK 
    AIR Relay is installed.
    $ cd /opt/binalyze/air/responder 
    $ sudo ./air configure relay --address 192.168.1.XX 
    
    Failed to acquire lock. An instance of the AIR responder is running. Trying to stop the service... 
    Checking lock if it is still held... 
    Lock is held. AIR responder is not running 
    AIR responder service started 
    Completed 
    $ cat config.yml | grep ConnectionRouteAddress 
    ConnectionRouteAddress: 192.168.1.XX
    sudo systemctl reload Binalyze.AIR.Relay.service
    ~25-11-17_6-6-0-026_v4_AIRv5.5.1.abf

    FIS USAGE STATS

    FEATURE FLAGS

    USAGE ANALYTICS

    This domain is used by AIR Server instances to

    • Collect case activity & Organization ID metrics for FIS License charges/billing.

    • Feature flag service to enable/disable features on AIR.

    • Analytics to analyse usage statistics.

    UPDATE

    This domain is a container registry for AIR Server instances to update server components like the application server images, database images, caching server images etc.

    FIS USAGE STATS:

    OrganizationID’s, Case Id, License Key, CaseEventType, CaseEventTime, endpoint Id, Task Id

    i.e.: "logId": 764149386100000, "type": "endpointTaskAddedToCaseEvent", "publishedDate": "2022-06-03T10:22:18.610Z", "data": { "caseId": "C-2022-0028", "endpointId": "2b2ea7b0-be61-445c-b735-ac1a9a39e448", "taskAssignmentId": "2b1d5b2c-72ac-4828-9a82-b3510ce9fd5a" }, "license": "LICENSE-KEY"

    FEATURE FLAGS: License Key

    USAGE ANALYTICS: Amplitude event structure

    FEATURE FLAGS: Feature flag states

    USAGE ANALYTICS: N/A

    N/A

    Binary Packages

    https://binalyze.com

    UPDATE

    This domain is used by AIR Server instances to check if there is any new version to update.

    https://license.binalyze.com

    LICENSE

    This domain is used by AIR Server instances to check the licence information

    https://api.binalyze.com

    TIMESTAMP

    This domain is used by AIR Server for RFC 3161 features which requires integration with a timestamp server.

    https://cdn.binalyze.com

    UPDATE

    https://binalyze.com

    N/A

    Version Information

    https://license.binalyze.com

    License Key

    License Status Details

    https://api.binalyze.com

    Hash of PPC

    Ref: [AIR] Timestamp PPC Files RFC-3161

    RFC-3161 Timestamp Token

    https://cdn.binalyze.com

    N/A

    This domain is used by AIR Server instances to update artefacts like MITRE Attack Rules , docker compose files, update scripts, offline installer packages.

    Packages

    Primary Communication Channels
    • HTTPS (TCP 443) – The main communication channel from assets to the console (e.g., yourcompany.binalyze.io).

    • WebSocket over HTTPS (TCP 443) – Used for interACT features.

    • NATS (TCP 4222) (Optional) – Supports real-time task pushes to assets. If this port is unavailable, AIR defaults to HTTP(S) polling for task retrieval.

    • DNS (UDP/TCP 53) – Required for name resolution services.

    External Communication

    • HTTPS to responder.cdn.binalyze.com – Used for responder updates and installation packages. If the CDN is unavailable, the AIR console acts as a fallback source.

    Evidence Repository Communication (When Configured)

    • Cloud Storage: HTTPS communication to services like Amazon S3 and Azure.

    • Traditional Storage: Supported via SFTP, FTPS, or SMB.

    Proxy Support

    If a proxy is configured in your environment, assets can communicate using:

    • HTTP

    • HTTPS

    • SOCKS5

    Firewall Rules

    • The console installer automatically adds inbound allow rules for the required ports in the Windows Firewall.

    • The responder installer does not modify firewall settings. You must ensure that enterprise firewall policies allow assets to communicate with the console over the required ports.


    How Does the AIR UI Connect?

    The AIR user interface (UI) requires access to the following domains:

    • https://binalyze.com

    • https://cdn.binalyze.com

    • https://one.binalyze.com

    • https://kb.binalyze.com

    Domain Functions:

    Domain

    Categories

    Description

    UPDATE

    This domain is used by AIR Server instances to check if there is any new version to update.

    LICENSE

    This domain is used by AIR Server instances to check the licence information

    TIMESTAMP

    This domain is used by AIR Server for RFC 3161 features which requires integration with a timestamp server.

    UPDATE

    This domain is used by AIR Server instances to update artefacts like MITRE Attack Rules , docker compose files, update scripts, offline installer packages.

    Data Transmitted:

    Domain

    Data Sent To Domain

    Data Received From Domain

    N/A

    Version Information

    License Key

    License Status Details

    RFC-3161 Timestamp Token

    N/A

    Installation Packages

  • Full Name:

    • Name: The first name of the user being added (e.g., "John").

    • Surname: The last name of the user (e.g., "Doe"). These fields are crucial for identifying and managing users within the system, particularly in larger organizations.

  • Username*:

    • The username is a mandatory field (indicated by the asterisk). This is the unique identifier that the user will use to log in to the AIR platform (e.g., [email protected]).

    • The username is often based on the user's email address to ensure uniqueness and facilitate easy recognition.

  • Email*:

    • The email is also a mandatory field. It is used for account-related communications, such as password resets, system alerts, or notifications.

    • This email should be valid and associated with the user being created to ensure they receive important platform-related information.

  • User Groups:

    • Select the User Groups to which the new user needs to be added.

  • Organization*:

    • This field allows you to assign the new user to a specific organization within the AIR system.

    • If multiple organizations are managed within the AIR platform (e.g., in a multi-tenant setup), you can select the organization to which the user belongs.

    • The system can restrict users from viewing or managing other organizations, depending on their access privileges.

  • Role*:

    • The Role dropdown allows you to assign the user's role within the platform. Roles define the level of access and permissions the user will have. Common roles could include:

      • Administrator: Full access to manage the platform, users, and assets.

  • Password*:

    • This is where you set the password for the user’s account. The password should meet the organization's security requirements (e.g., complexity, length).

    • A secure password is crucial to prevent unauthorized access to the platform.

  • Confirm Password*:

    • This field is used to confirm the password entered above. Ensuring that the passwords match helps avoid login issues caused by incorrect entries.

  • Individual 2FA Setup and Reset: Users can enable two-factor authentication (2FA) independently in 'Account > Setup Two Factor Authentication'. Global Admin and users with the "user update" privilege can reset 2FA.

    Two-factor authentication: Set Up
    • Enhanced Security Posture: By enabling 2FA, AIR significantly reduces the risk of unauthorized access, even in the event of compromised credentials. This is a critical step in safeguarding sensitive investigation data and maintaining the confidentiality and integrity of your forensic and cybersecurity operations.

    • User-Friendly Configuration: The integration of 2FA in AIR is designed to be user-friendly, making it easy for administrators to enable and enforce 2FA without complex configuration steps.

    • If you have activated the AIR SSO feature, this will override 2FA.

    Troubleshooting 2FA Issues: Time Synchronization

    If you are experiencing issues with Two-Factor Authentication (2FA) in AIR, it may often be due to time synchronization problems on your system. Ensuring your system's time is correctly synchronized with an NTP (Network Time Protocol) server is crucial for the proper functioning of 2FA.

    Steps to Check Time Synchronization:

    1. Run the timedatectl Command: Open a terminal and execute the following command:

    2. Verify the Output: After running the command, check the output for the following two lines:

      • System clock synchronized: yes

      • NTP service: active

      Here's an example of what the correct output should look like:

    3. What to Do if the Time is Not Accurate: If your system clock is not synchronized or the NTP service is not active, this could be the root cause of your 2FA issues. To resolve this, you may need to synchronize your system's time using NTP.

    How to Synchronize Your System Time:

    1. Enable NTP Synchronization: You can synchronize your system's time by running:

    2. Re-check the Time Status: After enabling NTP, re-run the timedatectl command to ensure that the system clock is now synchronized and the NTP service is active.

    By ensuring your system's time is accurate and synchronized, you can help prevent potential issues with 2FA in AIR. If the issue persists even after correcting the time, please contact our support team for further assistance.

    Background

    The $Boot file contains the boot sector and bootstrap code for the NTFS volume. It includes critical volume parameters such as cluster size, MFT location, volume size, and other fundamental file system metadata. This file is essential for mounting and accessing NTFS volumes.

    Data Collected

    This collector gathers structured data about $boot.

    $Boot Data

    Field
    Description
    Example

    Type

    File type

    Boot

    Name

    File name

    $Boot

    SourcePath

    Original path

    C:$Boot

    FilePath

    Path in evidence

    NTFSFiles/$Boot

    Collection Method

    This collector uses kernel driver NTFS raw access to read $Boot from each fixed NTFS drive.

    Forensic Value

    The boot sector provides essential information about NTFS volume configuration and can reveal volume tampering or corruption. Forensic analysis of the boot sector can identify disk geometry, partition parameters, and potential bootkits or other boot sector malware.

    Switch Organizations

  • Add new Organizations

  • Each responder is associated with a single Organization, ensuring integrity and clarity in investigations.

    Organization Overview

    Organization Settings: Overview

    When viewing an Organization, you’ll see key details like:

    • Name, ID, Owner

    • Created At timestamp

    • Asset count, and case stats (Open, Closed, Archived)

    Configuration Tabs

    Each Organization has four main configuration areas:

    1. Deployment

    • Displays the Organization’s deployment token

    • Includes a Shareable Deployment Page for fast responder distribution

    • The link can be regenerated or disabled from this view

    2. Relay Server

    • Manage Relay Servers used to support off-network response

    • Includes search and "New Relay" functions

    3. User Settings

    • View and manage users, roles, and groups

    • Use the Assign Users button to add new team members

    4. Contact

    • Optional form fields for storing the Organization’s contact name, title, and phone number

    Use Cases

    Organizations help:

    • MSSPs manage multiple customers

    • Enterprises segment data by business unit, region, or compliance zone

    • Security teams isolate cloud, on-prem, and off-network assets

    Access & Policy Enforcement

    • Policies can be global or overridden at the Organization level

    • Shareable deployment links and responder access are organization-scoped

    • User roles support granular privileges

    Summary

    Organization Settings are central to structuring your AIR environment securely and efficiently. They govern deployment, user access, case management, and responder scope—all from a single, intuitive interface.

    Organization Settings: Access vis the top bar
    Background

    Transactional NTFS (TxF) allows applications to perform file operations as atomic transactions. The $TxfLog directory contains transaction logs, and the $Tops:$T stream maintains transaction metadata. While TxF is deprecated in modern Windows versions, these files may still exist on systems and contain historical transaction data.

    Data Collected

    This collector gathers structured data about $txflog $tops:$t.

    $TxfLog $Tops:$T Data

    Field
    Description
    Example

    Type

    File type

    TxfLogTopsT

    Name

    File name

    $Tops:$T

    SourcePath

    Original path

    C:$Extend$RmMetadata$TxfLog$Tops:$T

    FilePath

    Path in evidence

    NTFSFiles/$Tops_$T

    Collection Method

    This collector uses kernel driver NTFS raw access to read $TxfLog $Tops:$T from each fixed NTFS drive.

    Forensic Value

    TxF logs can provide evidence of transactional file operations and application activity. Although TxF is deprecated, these files may contain valuable historical data about file system transactions and can reveal application behavior patterns.

    Background

    The $LogFile is NTFS's transaction log that records all changes to the file system before they are committed. This logging mechanism ensures file system consistency and enables recovery from system crashes or power failures. The log file maintains both redo and undo information for file system operations.

    Data Collected

    This collector gathers structured data about $log file.

    $Log File Data

    Field
    Description
    Example

    Type

    File type

    LogFile

    Name

    File name

    $LogFile

    SourcePath

    Original path

    C:$LogFile

    FilePath

    Path in evidence

    NTFSFiles/$LogFile

    Collection Method

    This collector uses kernel driver NTFS raw access to read $LogFile from each fixed NTFS drive.

    Forensic Value

    The $LogFile provides forensic evidence of recent file system activity including file creation, deletion, and modification operations. It can reveal transient files that may have been deleted and provide precise timing information about file system changes. Particularly valuable for detecting data manipulation and understanding recent system activity.

    Background

    The Application Compatibility Cache (also known as Shimcache) tracks metadata about executable files to improve application compatibility. Windows records information about executables when they are run, and this data persists across reboots.

    AppCompatCache can provide evidence of program execution and file presence, including programs that may have been deleted. The cache is stored in the registry and contains up to 1024 entries (varies by Windows version).

    Data Collected

    This collector gathers structured data about appcompactcache.

    AppCompactCache Data

    Field
    Description
    Example

    KeyPath

    Registry key path

    HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\AppCompatCache

    EntryName

    Control set name

    CurrentControlSet

    Position

    Position in cache

    0

    CachedFileSize

    File size recorded in cache

    1048576

    Collection Method

    This collector:

    • Searches registry for AppCompatCache locations:

      • HKLM\SYSTEM\ControlSet00*\Control\Session Manager\AppCompatibility

      • HKLM\SYSTEM\ControlSet00*\Control\Session Manager\AppCompatCache

    • Reads the AppCompatCache binary registry value

    • Parses the cache data format (varies by Windows version)

    • Extracts file paths, timestamps, and execution flags

    • Normalizes file paths to full paths

    Forensic Value

    AppCompatCache is critical for establishing program execution and file presence. Investigators use this data to identify executed programs (even if deleted), establish execution timelines, detect malware execution, identify reconnaissance tools, track lateral movement utilities, detect portable executable usage, and correlate with other execution artifacts.

    Background

    The App Paths registry key allows applications to register custom search paths so they can be launched by name without specifying the full path. When a user types just the executable name (e.g., "chrome"), Windows searches the App Paths registry to find the full path.

    Malware can abuse this mechanism to hijack application launches or establish persistence by registering malicious executables under legitimate application names.

    Data Collected

    This collector gathers structured data about apppaths.

    AppPaths Data

    Field
    Description
    Example

    KeyName

    Application executable name

    chrome.exe

    KeyDefaultValue

    Default value (full path to exe)

    C:\Program Files\Google\Chrome\Application\chrome.exe

    Path

    Additional search path

    C:\Program Files\Google\Chrome\Application

    Username

    User account (empty for HKLM)

    user or empty

    Collection Method

    This collector searches both machine and user registry locations:

    • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\*

    • HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\*

    For each application, it reads:

    • Default value (full executable path)

    • Path value (additional search path)

    • Registry key last write time

    Forensic Value

    App Paths can reveal application installations and detect persistence mechanisms. Investigators use this data to identify registered applications, detect application hijacking, track custom executable paths, identify persistence mechanisms, verify application locations, and detect malware masquerading as legitimate applications.

    Background

    Browser favicons are cached website icons that provide visual history of visited sites. This data supplements browsing history by revealing sites accessed even if history was deleted.

    Data Collected

    This collector gathers structured data about brave favicons.

    Brave Favicons Data

    Field
    Description
    Example

    ID

    ID

    123

    UserName

    User Name

    Example value

    BrowserName

    Browser Name

    Example value

    Profile

    Profile

    Example value

    Collection Method

    This collector queries the browser's Favicons database to extract cached website icons and associated URLs.

    Forensic Value

    Favicon analysis can recover evidence of deleted browsing history, identify visited sites through icon fingerprinting, and correlate with other browser artifacts to establish comprehensive activity timelines.

    Bookmarks
  • Cookies

  • Downloads

  • Extensions

  • Platform Keys

  • Privacy Settings

  • Proxy Settings

  • Sessions

  • Storage

  • Top Sites

  • Windows & Tabs

  • Add the extension to your Chrome.

    AIR For Chrome: New Asset
    Responder in Windows 'Safe Mode': Boot Options

    Terminology

    A brief overview of AIR terminology

    Acquisition Profile

    A collection of evidence types, application artifacts, network captures, and custom content items grouped into reusable sets known as Acquisition Profiles. While several profiles are provided out-of-the-box, users can also create and customize their own, adding them to the Acquisition Profile Library, accessible via the Main Menu.

    AIR Console

    The AIR Console is a web-based management interface that enables users to efficiently manage assets, assign tasks, and oversee the entire investigation lifecycle. From evidence acquisition to in-depth analysis, report generation, and case management, all activities are streamlined through the Investigation Hub. Users can also personalize their experience by switching between light and dark modes via the main menu, enhancing usability and visual comfort.

    Asset and Asset Status

    In AIR, an asset is defined as any entity, whether a device or system, physical or virtual, that operates on a supported operating system such as Windows, macOS, Linux, Chrome, IBM AIX, and ESXi. Assets are the foundational elements on which AIR performs various actions, including evidence collection and task execution, crucial for responding to and hunting cyber threats. Examples of assets include computers, servers, hosts, cloud accounts, and disk images.

    In AIR, an Asset can be in one of 3 states:

    1. Managed: The asset's responder has been successfully deployed to the device and is ready to collect tasking assignments from the console.

    2. Unmanaged: An asset is categorized as Unmanaged under two specific conditions:

      • Discovery without Deployment: The asset is identified through Active Directory or Cloud Account scans, but does not have the AIR responder installed.

    The Assets Summary window on the home page can also report the asset as:

    1. Unreachable: The asset's responder is currently unreachable. If an Asset's Responder fails to connect to the AIR console for over 30 days, its status changes to "unreachable." Until then, its status will be managed as online or offline.

    2. Update Required: The responder on the asset requires an update to function correctly.

    3. Update Advised: The responder is still functional, but for full functionality, an update is recommended.

    4. Isolated:

    Asset Management - Using Persistent Saved Filters

    Persistent Saved Filters enable users to create and store custom asset filters, making it easier to locate and manage assets without having to reapply filter conditions in each session.

    A Case

    In AIR, a Case — can often be thought of simply as an 'investigation' — as it is where all related activity and evidence are grouped together. By collecting acquisitions, DRONE findings, timelines, interACT sessions and hunt results within a single case, AIR automatically builds a unified view of all of that activity in the Investigation Hub. This case-based approach gives investigators a clear, consolidated picture of their entire investigation in one place — the single pane of glass.

    Evidence Item

    In Binalyze AIR, evidence refers to any data collected from an asset during acquisition or triage that supports forensic investigation and incident response. This may include system metadata, logs, configuration information, user-activity traces, or other information useful in reconstructing events.

    AIR organizes all collectible data into evidence items, each of which belongs to one of the defined evidence categories in the acquisition profile. An evidence item represents a specific data source with a clear description of what it contains and why it is relevant for investigation.

    The current evidence categories are:

    1. System - Core operating system information, including system configuration, environment details, and fundamental OS state.

    2. Memory - Volatile memory sources such as RAM snapshots, memory sections, and other data that reflect live system state at the time of acquisition.

    3. Network - Network-related evidence including connections, configurations, interface details, and network activity indicators.

    4. Event Logs - Structured logs generated by the operating system that record authentication events, system changes, service activity, and other audit information.

    5. Disk & File System - File system metadata, mount points, directory information, file activity indicators, and other disk-level sources that reflect how data is organized and accessed.

    6. Applications - Evidence produced by installed or active applications, including logs, caches, configuration files, usage traces, and other application-specific data sources.

    7. Custom Content - Items defined directly by the user based on file paths or directories of interest. This allows investigators to collect additional files or folders that fall outside the standard evidence set.

    8. osquery - Items collected by executing osquery queries on the asset. These provide structured, table-driven insights into system and application state using the osquery framework.

    Evidence Repository

    A remote location for saving evidence collected as a result of an AIR tasking. These include:

    1. SMB

    2. SFTP

    3. FTPS

    4. Amazon S3

    To create a New Repository, go to Settings in the Main Menu and select Evidence Repositories from the secondary Menu. From the window 'New Repository' complete the mandatory fields and select the type of repository you wish to add.

    Read more details about

    Organizations

    In AIR, an organization is a structural entity that allows for the separation of assets, users, and cases within a multi-tenant environment. The multi-tenancy capability of AIR enables a single console to manage multiple organizations, each with its own isolated environment. Here's how it works:

    1. Asset Management: An asset (e.g., a device or endpoint) can belong to only one organization, ensuring clear boundaries between different organizational environments. However, within that organization, the same asset can be assigned to multiple cases.

    2. Case Management: Cases could perhaps also be called 'investigations' or 'incidents', and they are also aligned to a specific organization. Access to cases can be restricted based on user privileges within that organization.

    3. Global and Organization-Specific Settings: Certain settings, such as policies and evidence repositories, can be configured globally across all organizations or individually for each organization. This flexibility allows administrators to enforce global standards while still providing the ability to customize configurations at the organizational level when required.

    This multi-tenant architecture in AIR enables organizations to operate independently within the same platform, benefiting from both shared resources and isolated environments, depending on their specific needs.

    Real-Time User Online Status Indicators

    User real-time status is shown throughout the AIR via colored dots—green for online, gray for offline—helping teams coordinate more effectively across the platform.

    This live collaboration capability extends to the Investigation Hub where investigators can see real-time user presence, track comment updates, and observe evidence flag changes as they happen. These live updates allow multiple investigators to work simultaneously on the same evidence without needing to refresh the view. Every action—whether adding notes, updating findings, or adjusting flags—appears instantly for all connected users, creating a fully synchronized collaborative workspace within the Investigation Hub.

    In the Investigation Hub screenshot above, you can see that three users are currently active in this case. Their profile icons indicate not only who is present, but also where each person is working in real time. In this example, one user is viewing the Findings page, another is focused on the System Info evidence, and a third is examining the Amcache File evidence. This provides instant visibility into team activity and helps avoid duplication of effort during collaborative investigations.

    Responder

    The AIR responder is a compact, cross-platform, zero-dependency, and zero-configuration package that functions as a virtual incident responder, delivering Level 3–4 SOC expertise directly to your assets.

    Unlike 'agents' that constantly monitor systems and consume significant resources, AIR responders only activate to perform precise, user-defined DFIR tasks on demand. This approach enables the deployment of thousands of virtual responders across your IT ecosystem, ready to execute proactive and reactive incident response activities, such as evidence collection, threat hunting, and forensic-level analysis, as needed.

    Binalyze's approach prioritizes efficient security enhancement, marrying minimal asset impact with maximum readiness and incident response capability. Read more here:

    Task

    Operations are assigned to the assets by the AIR console, either manually or automatically via a trigger. A task can be assigned to multiple assets, and this is managed through 'task assignments.' Each individual assignment, known as a 'task assignment,' creates a one-to-one correspondence between the task assigned by the console and the specific asset on which the task assignment is executed, ensuring precise management and tracking across all assigned tasks.

    Tasks could be either:

    1. Manual: Assigned manually by users,

    2. Scheduled: Created by users to start at a future date. Scheduled tasks can be either one-time or recurring (daily, weekly, or monthly).

    3. Triggered: Assigned to the assets as a response to a trigger request, which is sent by a SIEM/SOAR/EDR solution.

    Triggers (Webhooks)

    Triggers are the primary extensibility mechanism for AIR to receive alerts from other security suites, such as SIEM, SOAR, and EDRs.

    A trigger is the combination of a parser, an acquisition profile, and a destination for saving the collected evidence (either local or remote).

    AIR takes this to the next level by allowing the trigger to further automate the post-acquisition analysis by leveraging DRONE and MITRE&CK scanners. In effect, the alert from your security tools can launch AIR into the collection of relevant forensic data, facilitate the analysis of that data, and deliver any DFIR findings into the Intelligence Hub with no analyst intervention required.

    Hunt/Triage

    Hunt/Triage in AIR refers to searching for indicators of compromise—such as file hashes, processes, or malicious domains—across assets at scale. AIR provides built-in YARA, Sigma, and osquery capabilities, enabling analysts to detect anomalies in live systems, memory, and logs. Users can write their own rules or import large rule sets for rapid deployment, all of which are centrally stored and managed in the AIR Libraries to ensure consistency and collaboration across investigations.

    General

    Version Information

    This section provides details on the versions of various components of the AIR platform, helping administrators ensure that all parts of the system are up to date.

    1. AIR: The main application version (e.g., 4.41.1). This represents the core platform's release and includes the latest features and security updates.

    2. DB (Database): The version of the database used by AIR (e.g., 6.0.7), which stores all data related to the platform’s tasks and configuration settings.

    3. Responder: The version of the AIR responder (e.g., 2.50.5) installed on assets for data acquisition and remote interaction.

    4. DRONE: The version of the DRONE analysis engine (e.g., 3.11.0), which processes collected evidence to deliver findings and insights on this and some live artifacts through automated analyzers.

    5. TACTICAL: These versions indicate the status of various responders for different operating systems, including Linux, macOS, Windows, and the legacy version for older Windows systems. For example, the latest responders are at version 3.12.1, ensuring compatibility with the latest operating system environments.

    6. MITRE ATT&CK Analyzer: This version (e.g., 7.0.0) refers to the built-in mapping against the MITRE ATT&CK framework, which helps identify adversary tactics, techniques, and procedures during investigations.

    7. Disk Image Explorer: This component (e.g., version 1.0.0) provides functionality for exploring disk and volume images acquired during investigations.

    Logging

    1. Log Level: Determines the level of verbosity in logging within AIR. Adjusting the log level can help with debugging or tracking system activity.

    2. Log Files: Provides access to the system's log files, which are helpful for auditing, troubleshooting, and reviewing system performance and security events.

    License

    This section provides details about the current licensing status of the AIR installation.

    1. License Key: Displays the license key currently in use (e.g., TEST-LICENSE).

    2. Valid Until: The expiration date of the license (e.g., 2025.09.29), indicating the duration for which the platform is licensed.

    3. Max Client: The maximum number of assets (clients) that can be managed under this license (e.g., 1,000,000 assets).

    4. In Use: The number of assets currently being monitored by AIR (e.g., 447,908 assets).

    Connection

    1. Console Address: This is the current address of the AIR Console (e.g., air-demo.ACME.com), where asset responders poll to check for any tasking assignments that require execution.

      • Important: Changing this address will trigger a migration process, which will cause all assets to connect to the new address while they are deregistered from the old one.

    2. Console Proxy: Settings for configuring an internet proxy that AIR can use to connect to external services, such as updates or external evidence storage.

    System Resources

    Displays information about the system where AIR is installed, helping monitor and optimize performance.

    1. CPU:

      • Cores: The number of processor cores (e.g., 8), indicating the processing power available for handling AIR tasks.

      • CPU Type: Details of the CPU model (e.g., Intel Xeon Processor, Skylake architecture).

      • Flags: A list of supported CPU features (e.g., SSE, HT, etc.), indicating hardware capabilities relevant to performance.

    Console Updating - SaaS

    AIR provides a controlled and predictable update process for SaaS tenants by using maintenance windows. These windows allow you to define exactly when updates may occur, helping you align upgrades with organisational change-control processes and minimise operational impact.

    All update settings are available from:

    Settings → Update

    Console Updating SaaS: The UI for SaaS maintenance

    Update Methods

    Auto Update (Recurring Maintenance Window)

    Auto Update allows AIR to automatically install new versions during a recurring update window that you configure.

    When Auto Update is enabled, you can define:

    Time Window

    Select a 30-minute update window (e.g., 02:00–02:30 or 14:00–14:30 (Europe/Istanbul – UTC +03:00)).

    Updates will only run within this defined window.

    Days of the Week

    Choose one or more days on which updates are permitted (e.g., Monday–Friday, Saturday only, or Wednesday).

    At least one day must be selected.

    How it works:

    When a new version becomes available, AIR identifies the next selected day and applies the update during the time window you have configured.

    One-time Scheduled Update

    Use a One-time Scheduled Update when you want to apply the next update at a specific upcoming window outside your normal recurring schedule.

    • When selected, AIR displays the next available maintenance windows.

    • Choose your preferred window and save the configuration.

    • The system will update once during that window and then revert to your existing Auto Update settings.

    This option is ideal for:

    • Alignment with a formal change-control event

    • Situations where you want to temporarily override your regular update pattern

    • Urgent updates that cannot wait for the next recurring window

    Disabling Automatic Updates

    If you wish to temporarily halt updates:

    • Set Auto Update to off

    • Ensure One-time Scheduled Update is not selected

    Your tenant will not update until a new maintenance window is configured.

    Note: Critical or mandatory updates may still be applied to ensure security, stability, or compliance.

    Update Status Information

    The Update Settings page displays your current version, for example:

    If an update has been scheduled, the page will show:

    • The update version

    • The scheduled maintenance window

    • Any relevant notifications

    Automatic Backup Before SaaS Updates

    AIR automatically creates a backup before every SaaS console update. If the update fails, the system can roll back to the previous working state. No manual backup action is required.

    Summary

    AIR's SaaS update management offers:

    • Controlled and predictable updates

    • Recurring and one-time maintenance window options

    • Full alignment with change-control practices

    • Built-in automatic backups for safety

    These controls ensure uninterrupted operation while keeping your environment consistently up-to-date.

    Brave Local Storage

    Overview

    Evidence: Brave Local Storage Description: Collect Brave Local Storage Category: Applications Platform: windows Short Name: bls Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No

    Background

    Browser local storage contains persistent key-value data stored by websites. This data includes user preferences, session state, cached data, and potentially authentication tokens or sensitive information.

    Data Collected

    This collector gathers structured data about brave local storage.

    Brave Local Storage Data

    Field
    Description
    Example

    Collection Method

    This collector extracts local storage data from browser storage databases and files.

    Forensic Value

    Local storage analysis reveals stored credentials, session tokens, tracking identifiers, and application state that can indicate compromised accounts, persistent tracking, or malicious website activity. Analysts can identify credential theft, session hijacking, and data exfiltration attempts.

    Assets

    Responder Updates

    Manage updates for the AIR responders installed on assets.

    • This feature enables or disables automatic updates for responders. If enabled, the responders will automatically update to the latest version when a new release is available. This ensures that responders are always running the most current version, complete with all the latest features and security patches.

    • Deployment Tokens: These tokens are used to securely install and register responders on new assets, ensuring the responders communicate correctly with the AIR Console upon installation.

    Backward Compatibility for AIR and Responder Updates

    Clarifying Backward Compatibility since AIR v4.29+

    Overview In AIR v4.29, we introduced a major improvement: decoupling AIR console updates from Responder updates. This gives teams greater flexibility when deploying AIR updates, especially in large-scale environments.

    What This Means (and What It Doesn’t)

    Tamper Detection

    Enable alerts for tampering attempts on responders.

    • When Tamper Detection is enabled, the responder will actively monitor its own operation for any interference or attempts to disable it.

    • Functionality: If there is an attempt to modify or interfere with the responder (e.g., by disabling it or altering its files), the responder will notify the AIR Console, ensuring that any malicious attempts are flagged immediately.

    • This feature is critical for ensuring the integrity and continuous operation of responders in high-security environments.

    Uninstallation Password

    Prevent unauthorized uninstallation of responders by requiring a password.

    • When this feature is enabled, users must enter a protection password to uninstall the responder from an asset. This prevents unauthorized personnel from removing the responder, which could otherwise leave the asset vulnerable or unmonitored.

    • Uninstallation Method: The uninstallation process will be restricted to shell commands, meaning it can't be removed via a simple GUI or file system manipulation, adding an extra layer of security.

    Active Directory (AD) Integration

    Synchronize assets from Active Directory with AIR.

    • This feature allows AIR to integrate with your Active Directory (AD) environment. You can specify the AD server (e.g., 10.0.0.1) and the domain (e.g., company.local) to automatically synchronize information about computers and users from AD into AIR.

    • LDAP Synchronization: By manually starting the LDAP synchronization, you can query Active Directory for specific objects such as computers, ensuring that AIR can discover and manage assets from your organization's AD.

    • The Query For Computers field (e.g., (&(objectCategory=computer))) uses an LDAP filter to query and sync only computer objects from the directory.

    FDA via Jamf and Apple's PPPC utility

    Jamf is a software company that supplies one of the most well-known and popular Mobile Device Management (MDM) software solutions used to manage Apple devices. Using Jamf, and following the steps below, you can silently grant full disk access to AIR responder's remotely.

    Full Disk Access (FDA) on macOS can be activated by importing a Privacy Preferences Policy Control (PPPC) config file instead of manually providing permission options via the Jamf UI.

    Why is FDA required?

    AIR (and all other platforms) will only achieve complete macOS data acquisitions if FDA is enabled. Typically some of the artifacts that will give partial or no results if FDA is not active include:

    • App Usage

    • Bluetooth Connections

    • Document Revisions

    • Downloads

    • DS_Store

    • Notification Info

    • TCC

    A PPPC config file in macOS manages permissions for apps to access sensitive data and system features like Full Disk Access, camera, and microphone. It's used by organizations to pre-configure these permissions, often through MDM, ensuring necessary apps run without user prompts. These files are in .mobileconfig (XML) format and help balance security with convenience by automating privacy settings for applications.

    Steps to follow:

    1. Download and open the Jamf PPPC Utility:

    2. From a MacBook where AIR is already installed, go to the path /opt/binalyze/air/agent, drag the "air" binary to PPPC Utility, and you will be able to see identifier details

    3. In properties - "Full Disk Access" -> Choose "Allow"

    4. Bottom right, Click "Save", and provide a Payload Name, for example, "AIR"

    Now you can Import the saved config file into Jamf - Configuration Profiles.

    Identifier and Identifier Type for importing the config created using PPPC utility to achieve FDA:

    Verification of Full Disk Access:

    • An entry is created in /Library/Application Support/com.apple.TCC/TCC.db for all the applications that were assigned FDA (Manual Install)

    • For remote deployments, an entry is created in /Library/Application Support/com.apple.TCC/MDMOverrides.plist

    • For practical verification, users should try to collect KnowledgeC evidence. Successful collection confirms that the responder has Full Disk Access.

    • Reference:

    Brave Form History

    Overview

    Evidence: Brave Form History Description: Collect Brave Form History Category: Applications Platform: windows Short Name: bfh Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No

    Background

    Browser form history stores previously entered form data including search queries, usernames, and other input fields. This data reveals user search patterns, account information, and potential data leakage through autofill.

    Data Collected

    This collector gathers structured data about brave form history.

    Brave Form History Data

    Field
    Description
    Example

    Collection Method

    This collector queries the browser's form history database to extract saved form field data, search queries, and associated timestamps.

    Forensic Value

    Form history exposes reconnaissance activities, credential enumeration attempts, search queries revealing attacker intent, and potentially sensitive information entered into web forms. Analysts can identify data exfiltration, account compromise indicators, and targeted search patterns.

    Brave Sessions

    Overview

    Evidence: Brave Sessions Description: Collect Brave Sessions Category: Applications Platform: windows Short Name: brvss Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No

    Background

    Browser sessions maintain active tab state, cookies, and authentication context. This data reveals currently active user sessions, open websites, and authenticated connections at the time of collection.

    Data Collected

    This collector gathers structured data about brave sessions.

    Brave Sessions Data

    Field
    Description
    Example

    Collection Method

    This collector captures browser session data including active tabs, session cookies, and authentication state.

    Forensic Value

    Session analysis identifies active compromises, authenticated sessions to malicious sites, concurrent suspicious activities, and real-time indicators of ongoing attacks. Analysts can detect active C2 connections, authenticated malware communications, and live attacker sessions.

    Asset Isolation

    Isolating assets from all network access except the AIR Console

    Asset Isolation enables you to completely isolate an asset from all network communication except its connection to the AIR Console. This allows your investigation to proceed with full AIR capabilities while preventing threat actors from accessing the asset or external parties from interfering with the investigation.

    Key Point: An isolated asset can only communicate with the AIR Console. All other network connections—inbound and outbound—are blocked.

    Maintenance Mode

    Preventing task creation for assets during maintenance or diagnostic sessions

    Maintenance Mode prevents the AIR Console from generating or assigning tasks to an asset. When activated, the Console will not allow you to create tasks for that asset—this includes manual task creation, scheduled tasks, and bulk task assignments.

    Key Point: Maintenance Mode is a console-side control. The Responder continues to operate normally, but the Console blocks all task creation for the maintained asset.

    Brave Downloads

    Overview

    Evidence: Brave Downloads Description: Collect Brave Downloads Category: Applications Platform: windows Short Name: bdwnlds Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No

    Note: If no organization is selected or assigned, the user may have limited or no permissions within the platform.

    Investigator: Access to forensic and incident investigation features.
  • Viewer: Read-only access to view data and reports.

  • This field is crucial for setting user permissions and ensuring that they can only perform actions aligned with their responsibilities.

  • Remaining: The number of asset slots still available (e.g., 552,092 assets). This helps ensure scalability and license compliance.

  • Address: The IP address of the proxy (e.g., 10.0.0.1).

  • Port: The port used for proxy communication (e.g., 0).

  • Username and Password: Credentials for authenticating with the proxy.

  • Certificate Authority (CA): If your organization uses a custom CA for SSL communication, this setting allows you to upload the certificate in the appropriate format for secure connections between assets and the AIR Console.

  • Memory:

    • Total Memory: The total available system memory (e.g., 32.87 GB).

    • Used Memory: The amount of memory currently in use (e.g., 5.29 GB).

    • Free Memory: The remaining available memory (e.g., 27.58 GB), ensures that there are enough resources to handle future operations.

  • File System:

    • Total Storage: The total storage space available (e.g., 315.93 GB).

    • Used Storage: How much storage is currently used (e.g., 189.46 GB).

    • Partition: The partition where AIR data is stored (e.g., /dev/sdb1). Monitoring this ensures sufficient space for data storage and logging.

  • Starting with AIR v4.29, the AIR console can be updated independently of Responder updates.
  • All AIR versions (4.29 and onward) will maintain backward compatibility with Responders that are also on version 4.29 or newer.

  • Responders running versions older than 4.29 (e.g., 2.54.3) are not compatible with certain key features such as:

    • Evidence acquisition

    • Hunt/Triage

    • interACT

  • Users with older Responder versions will see messages like:

    "The asset’s AIR Responder must be updated to accept tasks."

    To summarize: Backward compatibility was introduced with AIR version 4.29 and onwards. If your Responders are still on versions earlier than 4.29, they must be upgraded at least once to benefit from this compatibility model going forward.

  • Authentication: You will need to provide an AD username and password to authenticate and pull information from the directory.

  • FileSize

    File size in bytes

    8192

    FileSize

    File size in bytes

    524288

    FileSize

    File size in bytes

    67108864

    CachedFileModified

    Modification time in cache

    2023-10-15T14:30:00

    Executed

    Whether file was executed (varies by OS version)

    TRUE

    KeyPath

    Registry key path

    SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\chrome.exe

    LastWriteTime

    Registry key last write time

    2023-10-15T14:30:00

    RegPath

    Path to registry hive

    Registry/SOFTWARE or Registry/ntuser.dat

    URL

    URL

    Example value

    IconType

    Icon Type

    123

    Path

    Path

    Example value

    Value

    Value

    Example value

    Path

    Path

    Example value

    UserName

    User Name

    Example value

    ProfileName

    Profile Name

    Example value

    BrowserName

    Browser Name

    Example value

    Key

    Key

    Example value

    ValueLower

    Value Lower

    Example value

    Count

    Count

    123

    Profile

    Profile

    Example value

    Path

    Path

    Example value

    DateCreated

    Date Created

    2023-10-15 14:30:25+03:00

    DateLastUsed

    Date Last Used

    2023-10-15 14:30:25+03:00

    UserName

    User Name

    Example value

    BrowserName

    Browser Name

    Example value

    Name

    Name

    Example value

    Value

    Value

    Example value

    Title

    Title

    Example value

    Deleted

    Deleted

    true

    Group

    Group

    Example value

    History

    History

    []

    BrowserName

    Browser Name

    Example value

    ID

    ID

    123

    WindowID

    Window ID

    123

    Active

    Active

    true

    Url

    Url

    Example value

    https://one.binalyze.com
    https://cr.binalyze.com
    https://one.binalyze.com
    https://cr.binalyze.com

    https://one.binalyze.com

    FIS USAGE STATS

    FEATURE FLAGS

    USAGE ANALYTICS

    This domain is used by AIR Server instances to

    • Collect case activity & Organization ID metrics for FIS License charges/billing.

    • Feature flag service to enable/disable features on AIR.

    • Analytics to analyse usage statistics.

    https://cr.binalyze.com

    UPDATE

    This domain is a container registry for AIR Server instances to update server components like the application server images, database images, caching server images, etc.

    https://one.binalyze.com

    FIS USAGE STATS:

    OrganizationID’s, Case Id, License Key, CaseEventType, CaseEventTime, endpoint Id, Task Id

    i.e.: "logId": 764149386100000, "type": "endpointTaskAddedToCaseEvent", "publishedDate": "2022-06-03T10:22:18.610Z", "data": { "caseId": "C-2022-0028", "endpointId": "2b2ea7b0-be61-445c-b735-ac1a9a39e448", "taskAssignmentId": "2b1d5b2c-72ac-4828-9a82-b3510ce9fd5a" }, "license": "LICENSE-KEY"

    FEATURE FLAGS: License Key

    USAGE ANALYTICS: Amplitude event structure

    FEATURE FLAGS: Feature flag states

    USAGE ANALYTICS: N/A

    https://cr.binalyze.com

    N/A

    Binary Packages

    https://www.googletagmanager.com
    https://binalyze.com
    https://license.binalyze.com
    https://api.binalyze.com
    https://cdn.binalyze.com
    https://binalyze.com
    https://license.binalyze.com
    https://api.binalyze.com
    Hash of PPC
    Ref: [AIR] Timestamp PPC Files RFC-3161
    https://cdn.binalyze.com
    Unreachable with No Data: The asset has been disconnected from the AIR console for over 30 days (Unreachable), and no forensic data from that asset is stored in the AIR console.
  • Off-Network: An asset is classified as Off-Network under two specific scenarios:

    • Data Supplied: The asset has previously provided data through methods such as an Off-Network Acquisition or a Hunt/Triage task.

    • Unreachable with Stored Data: The asset holds forensic data within the console but is currently inaccessible for further data collection or task assignments.

    For both scenarios, investigation of the existing data is possible, and additional data can be manually imported as required.

  • The asset is currently isolated from the network, except for communication with the AIR console.
    Azure Blob
  • Network Shares

  • Policies and Evidence Repositories: Policies can be applied either globally or on an organization-by-organization basis. For example, evidence repositories, which store collected data, can be aligned to all organizations (global) or set up uniquely for each organization, allowing for localized data control.

    Evidence Repositories here.
    Responder Deployment
    Terminology: Real-Time User Online Status Indicators
    Terminology: Real time user presence in the Investigation Hub

    User Groups

    User Groups are a powerful feature in AIR designed to streamline user access management across organizations, especially in large environments or those using Single Sign-On (SSO).

    What Are User Groups?

    User Groups allow you to manage users collectively instead of individually. This simplifies role assignments and organization-level access across AIR. Whether you're handling internal teams or integrating with Azure AD or Okta, User Groups provide scalable, centralized control.

    Why Use User Groups?

    Managing user access across multiple organizations can be time-consuming. With User Groups, you can:

    • Group users by function, department, or region

    • Assign them to organizations and roles in bulk

    • Sync groups directly from SSO providers like Azure AD or Okta

    This reduces manual overhead and ensures consistency in access management.

    Accessing the User Groups Page

    To access this feature:

    • Navigate to Settings → User Groups

    Note: Only Global Admins can access and manage User Groups.

    Creating a New User Group

    1. Click Create Group

    2. Enter a Group Name (e.g., "HR Team")

    3. Optionally, provide a description for context

    Adding Users to a Group

    After creating a group:

    1. Select users from your existing AIR user list

    2. Users in the group automatically inherit all organization and role assignments associated with the group

    You can always view and manage group membership from the main User Groups table.

    Syncing with SSO (Optional)

    If you're using Azure AD or Okta:

    • Toggle "Sync with SSO" when creating or editing a group

    • Once enabled, group membership is pulled from your identity provider

    • Manual editing of group members in AIR will be disabled

    A tooltip will indicate that synced groups are read-only within AIR.

    Assigning a User Group to an Organization

    1. Go to Settings → Organizations

    2. Create or edit an organization

    3. In Step 2 of the wizard, assign the desired User Group(s)

    All users in the selected group will be granted access to the organization with their predefined roles.

    Managing Group Membership

    • In the User Groups table, click the user count to view members

    For SSO-synced groups, membership cannot be modified in AIR.

    Safeguards When Removing Users

    Users added via a group cannot be removed individually from an organization. To revoke access:

    • Remove the user from the User Group

    A tooltip will appear if removal is attempted at the individual level.

    Viewing Group Membership from the Users Page

    The Users list now includes a Groups column to show which user groups a person belongs to. This offers helpful context when reviewing or auditing user access.

    Notes and Limitations

    • Only Global Admins can create and edit User Groups

    • Group duplication is not yet available, but it is planned

    • When a user is assigned to an organization both individually and via a group, the group assignment takes precedence

      • To fully remove access, remove the user from the group

    Summary

    User Groups simplify access control and scale with your environment. Benefits include:

    • Centralized user and role management

    • SSO directory sync support

    • Consistent access inheritance across organizations

    Whether you're managing 10 users or 10,000, User Groups provide a more efficient and secure way to manage access in AIR.

    timedatectl
    sudo timedatectl set-ntp true
    Your system is up-to-date – v5.7.0.xxxxx

    Save AIR.mobileconfig.

    https://github.com/jamf/PPPC-Utility/releases/tag/1.5.0
    https://docs.sophos.com/central/customer/help/en-us/PeopleAndDevices/ProtectDevices/EndpointProtection/MacCheckSecurityPermissions/index.html#terminal
    FDA via Jamf and Apple's PPPC utility: Adding AIR to PPPC and generating the config file for Jamf
    FDA via Jamf and Apple's PPPC utility: Importing the config created using PPPC utility to achieve FDA
    Why Use Asset Isolation?

    When you suspect an asset has been compromised, you face a dilemma:

    • Leave it connected → Risk the threat actor maintaining access, exfiltrating data, or destroying evidence

    • Disconnect it completely → Lose the ability to perform remote forensic collection

    Asset Isolation solves this by cutting off the threat actor while preserving your investigative access. The asset remains fully manageable through AIR, enabling you to collect evidence, run queries, and interact with the system—all while the asset is protected from external interference.

    How It Works

    When you isolate an asset:

    1. All existing network connections are terminated — Any active connections to other systems are immediately dropped

    2. New network connections are blocked — The asset cannot establish connections to any external system

    3. AIR Console communication is preserved — The Responder maintains its connection to the Console

    4. Full AIR capabilities remain available — Acquisition, Hunt/Triage, interACT, and Time-lining all continue to function

    Technical Implementation

    This feature uses a Kernel Mode Driver for performing the isolation. It operates independently of Windows Firewall, ensuring reliable isolation regardless of firewall configuration or state.

    Persistence: Asset Isolation survives reboots. If you restart an isolated asset from the AIR Console, it will remain isolated after the reboot until you explicitly un-isolate it from the Asset Details page.

    What Remains Available

    During isolation, all AIR capabilities continue to function:

    Action
    Status
    Purpose

    Acquisition

    ✅ Available

    Collect forensic evidence

    Hunt/Triage

    ✅ Available

    Search for indicators of compromise

    interACT

    ✅ Available

    Live interaction with the asset

    Time-lining

    ✅ Available

    Build activity timelines

    Use Cases

    Incident Response Containment

    When you identify a potentially compromised asset, immediately isolate it to prevent:

    • Threat actors from maintaining command and control access

    • Data exfiltration to external servers

    • Lateral movement to other assets on the network

    • Remote destruction of evidence

    Active Investigation

    Isolation allows you to investigate a live system without interference. The threat actor cannot detect your investigation activities or take countermeasures while the asset is isolated.

    Evidence Preservation

    By isolating the asset, you ensure that evidence remains intact during collection. No external process can modify, encrypt, or delete files while you're acquiring them.

    Best Practice: When responding to a suspected compromise, isolate the asset first, then begin your forensic acquisition. This ensures you capture evidence in its current state without risk of tampering.

    Isolating and Un-isolating Assets

    To Isolate an Asset

    1. Navigate to the asset in the AIR Console

    2. Open the More Actions menu

    3. Select Isolate Asset

    The asset will immediately be isolated from all network communication except the AIR Console.

    To Un-isolate an Asset

    1. Navigate to the isolated asset's Asset Details page

    2. Select Un-isolate Asset

    Network connectivity will be restored and the asset can resume normal operations.

    Comparison with Maintenance Mode

    Both features control asset behaviour, but serve different purposes:

    Feature
    Asset Isolation
    Maintenance Mode

    Primary Purpose

    Network containment

    Prevent task creation

    Network Access

    ❌ Blocked (except Console)

    ✅ Normal

    Task Creation

    ✅ Allowed

    ❌ Blocked

    Acquisition

    ✅ Available

    When to use which?

    • Use Asset Isolation when you need to contain a potentially compromised asset—cut off threat actor access while continuing your investigation

    • Use Maintenance Mode when you need to prevent task creation for an asset during planned maintenance or diagnostics

    How It Works

    When you place an asset into Maintenance Mode:

    1. Task creation is blocked — You cannot generate new tasks for the asset from the Console

    2. Scheduled tasks are skipped — Any scheduled tasks that would target this asset will not execute

    3. Bulk tasks exclude the asset — The asset is automatically excluded from bulk task operations

    4. In-progress tasks continue — Tasks that were already executing when Maintenance Mode was activated will run to completion

    What Remains Available

    To support essential diagnostic and investigative activities, the following actions are still permitted:

    Action
    Status
    Reason

    interACT

    ✅ Available

    Essential for live diagnostics

    Log Gathering

    ✅ Available

    Required for troubleshooting

    New Task Creation

    ❌ Blocked

    Primary function of Maintenance Mode

    Scheduled Tasks

    ❌ Blocked

    Prevented by Console

    Enabling Maintenance Mode

    Maintenance Mode can be enabled from the More Actions menu on any asset.

    Maintenance Mode: Enabling via the More Actions button

    Visibility and Status

    When an asset is in Maintenance Mode, this status is clearly visible:

    • Asset Details Page: The Maintenance Mode status is displayed in the asset information panel

    • Asset Filters: Filter by Maintenance Mode status to identify maintained assets across large environments

    Maintenance Mode: Status displayed on the Asset Info page

    Use Cases

    Planned Maintenance Windows

    During system updates, patches, or configuration changes, activate Maintenance Mode to ensure no tasks—manual or automated—can be created for the asset until maintenance is complete.

    Diagnostic Sessions

    When troubleshooting an asset, Maintenance Mode prevents accidental task execution while you investigate. interACT and log gathering remain available for diagnostics.

    Handling Cloned or Duplicated Assets

    When working with cloned or duplicated asset instances, Maintenance Mode prevents conflicting task assignments. This helps analysts maintain chain-of-custody and ensures collected information remains contextually accurate.

    Best Practice: When working with cloned environments or forensic duplicates, place the original asset in Maintenance Mode to prevent task conflicts and preserve evidence integrity.

    Comparison with Asset Isolation

    Both features control asset behaviour, but serve different purposes:

    Feature
    Maintenance Mode
    Asset Isolation

    Primary Purpose

    Prevent task creation

    Network containment

    Network Access

    Normal

    Terminated

    Task Creation

    ❌ Blocked

    ✅ Allowed

    Scheduled Tasks

    ❌ Blocked

    When to use which?

    • Use Maintenance Mode when you need to prevent any task creation for an asset—keeping it operational but protected from Console-initiated actions

    • Use Asset Isolation when you need to contain a potentially compromised asset on the network while continuing forensic collection

    Background

    Browser download history records files downloaded by users, including file paths, timestamps, URLs, referrer information, and download status. This data is essential for tracking file acquisition, identifying potentially malicious downloads, and reconstructing user activity timelines.

    Data Collected

    This collector gathers structured data about brave downloads.

    Brave Downloads Data

    Field
    Description
    Example

    UserName

    User Name

    Example value

    Browser

    Browser

    Example value

    ProfileName

    Profile Name

    Example value

    URL

    URL

    Example value

    Collection Method

    This collector queries the browser's History database to extract download records, including file paths, download times, source URLs, and security flags.

    Forensic Value

    Download history reveals malware delivery vectors, data exfiltration attempts, unauthorized software installation, and user interaction with suspicious websites. Analysts can identify downloaded malicious files, track attack chains, and correlate downloads with other security events.

    Features

    Enable interACT

    This feature enables or disables the interACT functionality in AIR.

    • interACT allows users to remotely open a shell session to interact with assets. Users can execute commands and scripts based on their assigned privileges.

    • Security Requirement: To use interACT, users must have enhanced security in place—either Two-Factor Authentication (2FA) or Single Sign-On (SSO). This ensures secure access to sensitive systems, limiting unauthorized use.

    • Read more about interACT here:

    Two-Factor Authentication (2FA) for isolated AIR installations

    To enhance security, AIR interACT requires Two-Factor Authentication (2FA) using Time-Based One-Time Passwords (TOTP). You can set up offline 2FA solutions such as Google Authenticator or Microsoft Authenticator, making it suitable for use in isolated networks.

    Why is 2FA Mandatory in interACT?

    Resolve Responder Public IP

    This feature allows AIR to capture and associate the public IP of an asset.

    • When enabled, the AIR Console parses HTTP request headers to extract the X-Forwarded-For header provided by proxies. This header reveals the public IP address of the responder (asset), even if it's behind a proxy or firewall.

    • Visibility: If the feature is enabled, AIR will display the X-Forwarded-For IP address instead of the communication IP (the one directly visible to AIR). This provides more accurate forensic visibility of an asset's location and origin.

    Case Selection

    Enforce mandatory case selection when starting tasks.

    • This feature requires users to associate every task they run in AIR with a specific case.

    • Benefit: It enforces structured workflows, ensuring that all investigations are organized and traceable to a particular case, which is critical for auditing and maintaining clarity in incident response efforts.

    RFC3161 Timestamping

    Provides cryptographic proof of when data was acquired and its integrity.

    • RFC3161 timestamping ensures that the data collected during acquisition has a digital signature, proving that the data existed at a specific time and has not been altered since.

    • When enabled, every new acquisition task will include a signature file with metadata, adding legal and forensic robustness to your investigation process.

    • Read more in this blog:

    Chain of Custody

    Protect evidence integrity by registering it on the blockchain via LOCARD, which is a blockchain-based system for secure evidence handling in digital forensics. It has seen some adoption in Europe but remains underutilized in the U.S. due to regulatory and infrastructure challenges, leading to slower adoption and less frequent use​​.

    • This feature integrates with LOCARD, a blockchain-based platform for evidence integrity. When enabled, the chain of custody for digital evidence is secured by submitting evidence metadata to the blockchain, ensuring it hasn't been tampered with.

    • LOCARD Credentials: To use this, you'll need to provide the Organization, Host, Username, and Password for your LOCARD account.

    SMTP (Email Configuration)

    Set up email notifications, such as password-reset emails.

    • Specifying an SMTP server allows AIR to send out automated emails, particularly for password resets. This is useful for self-service password recovery.

    • You must configure the SMTP server address, port, sender email, username, and password. For example, using mail.smtp2go.com as the server.

    Syslog / SIEM Integration

    Enable integration with Syslog servers or SIEM systems.

    • This feature allows AIR to send event logs to a centralized Syslog or SIEM (Security Information and Event Management) system for enhanced log monitoring and analysis.

    • You will need to configure the protocol (TCP/UDP), server address, and port to send logs from AIR to your preferred log management system.

    Banner Message

    Display a custom banner message across all AIR Console pages.

    • This feature allows you to set a banner message that will appear on all pages of the AIR Console. This is useful for displaying system notices, warnings, or other important information to all users.

    Policies

    Enforce task options and preferences across assets.

    Policies allow administrators to define global task preferences and restrictions for assets in the organization.

    • Customizability: Policies can be tailored for different subsets of assets using filters, and a user must have the "Override Policy" privilege to modify the default organizational policies.

    Auto Asset Tagging

    Automate tagging of assets when they are added to AIR.

    • When this feature is enabled, AIR automatically applies asset tags based on predefined rules as soon as a responder is installed on an asset.

    • Flexibility: Even if this feature is disabled, users can still run the Auto Asset Tagging task manually on assets.

    Enable/Disable Fleet.AI

    Activate AI-powered assistance for investigations.

    Fleet.AI is an AI-driven assistant integrated into AIR. Fleet AI is designed to integrate seamlessly into users’ workflows and rather than having a single chatbot, it leverages a Multi-Agent System (MAS) architecture to assist analysts with specific investigation tasks such as rule creation, threat hunts, and investigation planning—all within the AIR console. At the center is Blacklight, an orchestrator that routes analyst prompts to the best-fit agent and manages execution.

    Brave Cookies

    Overview

    Evidence: Brave Cookies Description: Collect Brave Cookies Category: Applications Platform: windows Short Name: bcookies Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No

    Background

    Browser cookies store session tokens, authentication credentials, user preferences, and tracking data. This data is essential for understanding authenticated sessions, tracking user activity across websites, and identifying session hijacking or credential theft.

    Data Collected

    This collector gathers structured data about brave cookies.

    Brave Cookies Data

    Field
    Description
    Example

    Collection Method

    This collector extracts cookies from the browser's Cookies database, including domain, name, value, path, expiration, and security flags.

    Forensic Value

    Cookie analysis reveals active sessions, authentication tokens, persistent tracking identifiers, and potential session hijacking. Investigators can identify stolen credentials, unauthorized access, and cross-site tracking used for reconnaissance or targeting.

    Brave Browsing History

    Overview

    Evidence: Brave Browsing History Description: Collect Visited URLs from Brave Category: Applications Platform: windows Short Name: bhst Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No

    Background

    Browser history records all websites visited by users, including URLs, page titles, visit timestamps, visit counts, and transition types. This data is essential for reconstructing user activity, identifying malicious websites, and tracking lateral movement or reconnaissance activities.

    Data Collected

    This collector gathers structured data about brave browsing history.

    Brave Browsing History Data

    Field
    Description
    Example

    Collection Method

    This collector queries the browser's History database to extract visited URLs, timestamps, referrer information, and user interaction patterns.

    Forensic Value

    Browsing history reveals phishing sites, malicious domains, command-and-control servers, data exfiltration targets, and reconnaissance activities. Analysts can identify compromised credentials, track attacker infrastructure, and correlate web activity with other security events to establish attack timelines.

    Brave Bookmarks

    Overview

    Evidence: Brave Bookmarks Description: Collect Brave Bookmarks Category: Applications Platform: windows Short Name: bbkmrks Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No

    Background

    Browser bookmarks represent user-saved favorite websites and organizational folders. This data reveals frequently accessed sites, user interests, and potential indicators of reconnaissance, phishing targets, or suspicious infrastructure.

    Data Collected

    This collector gathers structured data about brave bookmarks.

    Brave Bookmarks Data

    Field
    Description
    Example

    Collection Method

    This collector parses the browser's Bookmarks file to extract saved URLs, folder structures, timestamps, and metadata.

    Forensic Value

    Bookmark analysis identifies targeted websites, phishing pages, command-and-control servers, internal resources, and organizational reconnaissance patterns. Investigators can detect social engineering campaigns, credential harvesting attempts, and lateral movement preparation.

    Brave Login Data

    Overview

    Evidence: Brave Login Data Description: Collect Brave Login Data Category: Applications Platform: windows Short Name: blgd Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No

    Background

    Browser login data stores saved passwords and credential information. This data is critical for identifying stored credentials, password reuse patterns, and potential credential theft targets.

    Data Collected

    This collector gathers structured data about brave login data.

    Brave Login Data Data

    Field
    Description
    Example

    Collection Method

    This collector extracts saved credentials from the browser's Login Data database, including URLs, usernames, and encrypted passwords.

    Forensic Value

    Login data analysis reveals stored credentials, password reuse across services, targeted accounts, and potential credential harvesting. Investigators can identify compromised accounts, credential theft attempts, and unauthorized access to saved credentials by malware or attackers.

    Acquisition Profiles

    Acquisition profiles in AIR define the specific types of data to be collected during an acquisition task. These profiles enable you to customize and streamline data collection to meet the unique requirements of your investigation. Saved within the AIR Libraries, acquisition profiles can be easily shared, reused, or edited for further refinement, ensuring efficiency and consistency across investigations.

    Using Out-of-the-Box Acquisition Profiles

    As shown above, AIR comes with several predefined acquisition profiles that you can use immediately, for example:

    Scheduled Tasks

    ✅ Available

    Automated task execution continues

    External Network Access

    ❌ Blocked

    Threat actor access denied

    ❌ Blocked

    Hunt/Triage

    ✅ Available

    ❌ Blocked

    interACT

    ✅ Available

    ✅ Available

    TargetPath

    Target Path

    Example value

    CurrentPath

    Current Path

    Example value

    Referrer

    Referrer

    Example value

    LastModified

    Last Modified

    2023-10-15 14:30:25+03:00

    DangerType

    Danger Type

    123

    Opened

    Opened

    123

    TabURL

    Tab URL

    Example value

    TabReferrerURL

    Tab Referrer URL

    Example value

    StartTime

    Start Time

    2023-10-15 14:30:25+03:00

    EndTime

    End Time

    2023-10-15 14:30:25+03:00

    HistoryFilePath

    History File Path

    Example value

    Name

    Name

    Example value

    Path

    Path

    Example value

    Value

    Value

    Example value

    IsSecure

    Is Secure

    123

    IsHTTPOnly

    Is HTTP Only

    123

    HasExpires

    Has Expires

    123

    IsPersistent

    Is Persistent

    123

    Priority

    Priority

    123

    SameSite

    Same Site

    123

    SourcePort

    Source Port

    123

    SourceScheme

    Source Scheme

    123

    CreationTime

    Creation Time

    2023-10-15 14:30:25+03:00

    ExpiresTime

    Expires Time

    2023-10-15 14:30:25+03:00

    LastAccessTime

    Last Access Time

    2023-10-15 14:30:25+03:00

    UserName

    User Name

    Example value

    BrowserName

    Browser Name

    Example value

    ProfileName

    Profile Name

    Example value

    Domain

    Domain

    Example value

    Title

    Title

    Example value

    VisitDuration

    Visit Duration

    Example value

    Referrer

    Referrer

    Example value

    TypedCount

    Typed Count

    123

    IsHidden

    Is Hidden

    true

    TransitionType

    Transition Type

    Example value

    VisitID

    Visit ID

    123

    TransitionQualifiers

    Transition Qualifiers

    Example value

    User

    User

    Example value

    Profile

    Profile

    Example value

    HistoryFilePath

    History File Path

    Example value

    AccessTime

    Access Time

    2023-10-15 14:30:25+03:00

    AccessCount

    Access Count

    123

    URL

    URL

    Example value

    Browser

    Browser

    Example value

    BookmarkID

    Bookmark ID

    Example value

    Name

    Name

    Example value

    Type

    Type

    Example value

    URL

    URL

    Example value

    ParentFolder

    Parent Folder

    Example value

    DateAdded

    Date Added

    2023-10-15 14:30:25+03:00

    DateLastUsed

    Date Last Used

    2023-10-15 14:30:25+03:00

    DateModified

    Date Modified

    2023-10-15 14:30:25+03:00

    UserName

    User Name

    Example value

    ProfileName

    Profile Name

    Example value

    BrowserName

    Browser Name

    Example value

    GUID

    GUID

    Example value

    SignonRealm

    Signon Realm

    Example value

    BlacklistedByUser

    Blacklisted By User

    123

    Scheme

    Scheme

    Example value

    PasswordType

    Password Type

    Example value

    TimesUsed

    Times Used

    123

    Profile

    Profile

    Example value

    Path

    Path

    Example value

    DateCreated

    Date Created

    2023-10-15 14:30:25+03:00

    DateLastUsed

    Date Last Used

    2023-10-15 14:30:25+03:00

    ID

    ID

    123

    UserName

    User Name

    Example value

    BrowserName

    Browser Name

    Example value

    OriginURL

    Origin URL

    Example value

    Preventing Unauthorized Access interACT provides direct access to systems, making security a top priority. Relying solely on a password increases the risk of unauthorized individuals gaining control. 2FA significantly reduces this risk by adding an extra layer of authentication.

  • Securing Critical Command Execution interACT allows users to execute commands directly on a system. Without a strong authentication mechanism, a malicious actor could exploit access to perform harmful operations. 2FA ensures that only authorized users can issue commands, maintaining system integrity and security.

  • By enforcing 2FA, interACT safeguards against unauthorized access and potential misuse, ensuring a secure and controlled environment for forensic investigations.

    interACT
    https://www.binalyze.com/blog/dfir-lab/protect-your-chain-of-custody-with-content-hashing-and-timestamping

    Bulk Tasks

    ❌ Blocked

    Asset is excluded

    ✅ Execute normally

    interACT

    ✅ Available

    ✅ Available

    Acquisition

    ❌ Blocked

    ✅ Available

    Hunt/Triage

    ❌ Blocked

    ✅ Available

    Quick: Designed for fast data acquisition with essential evidence types.

  • Full: Collects a comprehensive and rich set of data from the assets.

  • Compromise Assessment: Focuses on locations commonly abused by malicious actors, defined by the Binalyze threat hunting team.

  • These out-of-the-box profiles are ideal for common scenarios and provide an ideal quick start for your investigations.

    Creating your own Acquisition Profiles

    To create your own custom acquisition profile, follow these steps:

    (1) Navigate to Acquisition Profiles

    • Go to the "Libraries > Acquisition Profiles" section from the main dashboard.

    (2) Create a New Profile

    • Click on the "+ New Profile" Action Button.

    • Provide your new profile with a name that will help you identify its purpose later.

    (3) Select the Operating System(s) for your new profile

    • Windows

    • Linux

    • macOS

    • IBM AIX

    • Or a cross-platform eDiscovery collection

    Acquisition Profiles: Supported platforms and eDiscovery option

    (4) Select Evidence Types

    • AIR supports the most comprehensive, and ever-growing number of evidence types for collection and presentation in the Investigation Hub. To build your profile, choose the data you want to collect from the extensive options grouped under the following eight tabs:

      • System

        • System artifacts (e.g., registry, jump lists, UAL, Cron Jobs)

      • Memory

        • Memory files (e.g., RAM image, Page File, Memory Map)

      • Network

        • Network artifacts (e.g., IP Tables, TCP Tables, DNS Servers)

      • Event Log Records

        • AIR allows users to collect and present event logs or define specific channels for log collection.

      • Disk & File System

        • Collect disk & file System items (e.g., $mft, $Boot File, Mounts, fseventsd)

      • Applications

        • Data for specific applications (e.g., browsers, AV logs, RDM tools, Microsoft application data)

      • Custom Content Profiles

        • Select bespoke file locations for collection.

      • osquery

        • Use bespoke osquery commands to collect live system artifacts, including processes, network activity, and configuration files.

    Custom Content Profile Path Tips

    • You can omit the drive letter — start from the folder name (e.g., Program Files\Common Files).

    • Use ** for recursive matching:

      • C:\Users\**\*.txt collects all .txt files under that path.

      • **\malware.exe (or **/malware.exe on Unix) finds all malware.exe files system-wide.

    • Windows paths can use / or \ — both are supported.

    • Network Capture

      Network Flow captures TCP/UDP connections and stores them as a CSV.

      PCAP will capture IP packets and save them as a PCAP file.

      The duration of the Network Capture is determined by the user.

      • osquery

        • Use your own bespoke osquery commands to collect live system artifacts, including processes, network activity, and configuration files.

    Acquisition Profiles: Choose items for collection from the 8 tabbed groupings

    View in Knowledge Base

    • Note that in the screenshot above, you can click the Info button at the end of each item in the collection list to open the Knowledge Base for a detailed explanation of the item and what we collect.

    (5) Save the Profile

    • Once you have configured all the necessary settings, click "Save" to create your custom acquisition profile.

    Managing Acquisition Profiles

    • Edit Profiles: You can edit existing profiles by selecting the profile and making necessary changes.

    • Delete Profiles: Remove profiles that are no longer needed to keep your list organized.

    • Duplicate Profiles: Create a copy of an existing profile to use as a template for a new one.

    • User Privileges for acquisition profiles can be managed via ‘Settings > Roles’

    Best Practices

    • Check Profiles: Ensure your acquisition profiles are up-to-date with the latest evidence types and investigation requirements.

    • Test Profiles: Test new profiles in a controlled environment to ensure they collect the intended data.

    • Average Time Taken: In the Acquisition Profiles table, you can see the ‘Average Time’ taken by each profile. This can be useful when considering the performance and efficiency of individual profiles.

    • The Profile Types column provides a quick visual reference to indicate which operating systems—Windows, Linux, or macOS—are supported by each acquisition profile.

    Acquisition Profiles: Average time to run profiles and action button to duplicate the profile.

    By using acquisition profiles in AIR, you can efficiently gather relevant data for your investigations, saving time and ensuring comprehensive evidence collection.

    Acquisition Profiles: Built-in Profiles

    AIR Responder Architecture; overview and performance analysis

    What is an AIR responder?

    The AIR Responder is a compact, cross-platform, zero-dependency, and zero-configuration package that functions as a virtual incident responder, delivering Level 3–4 SOC expertise directly to your assets. It interfaces with the AIR Console to execute precise, user-defined tasks with minimal resource consumption. This design offers comprehensive investigative coverage without the overhead of continuous monitoring, thereby enhancing both cyber resilience and operational efficiency.

    The AIR responder maintains regular communication with the AIR Console via what, in its simplest form, is known as HTTP polling, and what we like to call ‘a visit’. The visit interval is typically around 30 seconds for environments with fewer than 1,000 assets. For larger environments, the interval is calculated using the following formula:

    intervalSeconds = MANAGED_ENDPOINT_COUNT / 100

    AIR for Chrome - Chrome Web Storechrome.google.com
    Learn more about Windows Event Records
    For instance, in a scenario with 5000 assets, the calculated visit interval would be 50 seconds.

    The responder sends these visit requests to inform the AIR console that it is online and ready to receive any task assignments awaiting action.

    If the responder does not make a visit at the required interval, it will be shown as offline in the AIR console.

    If the responder does not make a visit for 30 days, it will be marked as unreachable. This status will be resolved immediately once the asset is back online.

    If the responder does not collect a task assignment within 30 days of its creation, it will expire and will not be actioned even when the asset reconnects and the responder visits next.

    How does the AIR responder work?

    Simply put, when the AIR responder collects a task assignment from the AIR console, it carries out the task and provides a report back to the AIR console upon completion. On the other hand, when the AIR responder is in an idle state, it periodically (as discussed above) sends visit requests to the AIR console to check if any new tasks have been assigned to it. During these visit requests, the AIR responder only checks for task assignments and does not perform any other operations.

    The AIR responder is capable of executing various tasks when assigned by the AIR Console. These tasks include:

    • Acquisition

    • Hunt/Triage scanning (YARA, Sigma, osquery, MITRE ATT&CK)

    • Isolation

    • interACT sessions

    • Auto Tagging

    • Disk/Volume Imaging

    • Investigation (Timeline)

    • Baseline

    • Log Retrieval

    • Certificate Authority Update

    • Migration

    • Reboot

    • Shutdown

    • Update

    • Uninstall

    Windows Safe Mode: AIR, like most forensic tools, has limitations in Safe Mode, where minimal drivers—including network access—restrict functionality. We’re working on a solution and hope to have a solution in AIR soon (Q1 2025)

    Both the Acquisition and Disk Image tasks support uploading collected evidence to external repositories, including Amazon S3, Azure Blob Storage, FTPS, SFTP, and SMB. These tasks enable the AIR responder to securely transfer the acquired evidence or disk images to the designated repositories for storage and further analysis.

    By utilizing the supported protocols and repositories, the AIR responder ensures that the collected evidence or disk images are transmitted and stored securely in the designated locations. This enables efficient storage, accessibility, and collaboration, facilitating the management and analysis of acquired data in a secure and scalable manner.

    AIR has an option for Windows, macOS, and Linux AIR responders to transmit evidential collections directly to external evidence repositories, thereby efficiently minimizing the utilization of local disk space:

    AIR Responder Architecture; overview and performance analysis: Tool Tip explaining Direct Collection for Evidence Repositories

    How is the AIR responder secured?

    The AIR responder maintains robust security by implementing a range of measures, including:

    Encrypted Traffic: The traffic between the AIR responder and the AIR Console, as well as between the AIR responder and any evidence repositories, is encrypted using TLS 1.2 and, if available on the server, TLS 1.3. If neither of these two TLS protocols is available, the connection will not be established. This ensures that data in transit is protected against interception and unauthorized access.

    Communication: The AIR Console does not initiate the sending of task assignments to the AIR responder; rather, it is the AIR responder that initiates the interaction by asking the AIR Console if it has any tasking assignments ready for it to run. This approach significantly reduces the risk of various security attacks, as it controls the communication flow and reduces the AIR responder's exposure to external threats.

    Privileged Account Usage: On macOS and Linux, the AIR responder uses the root account, while on Windows, it uses the system account. This level of access control makes it difficult for other users to tamper with the application, thereby enhancing its security.

    Regular Internal Penetration Testing: Before every release, our internal penetration testing team conducts thorough penetration testing. This proactive approach helps identify and mitigate potential vulnerabilities.

    Secure Libraries and Third-Party Applications: We consistently use updated and vulnerability-free libraries and third-party applications. This precaution in maintaining up-to-date software components protects against known security vulnerabilities.

    Supply Chain Attack Prevention: Measures are in place to protect against supply chain attacks, and our DevOps team continuously improves these. This is crucial to prevent threats that could compromise the software development and deployment process.

    Continuous Source Code Scanning: The source code is regularly scanned by security tools to identify potential vulnerabilities. This constant monitoring enables the quick identification and resolution of any security issues that arise in the codebase.

    Digital Signing: The use of digital signatures adds a layer of security, ensuring the authenticity and integrity of our software. This helps prevent tampering and verifies that the software has not been altered after it was signed.

    Blackbox Analysis: The binary undergoes Blackbox analysis, a method of testing the software’s external functioning without delving into its internal structure. This type of analysis has been performed on the AIR responder. It helps in identifying security vulnerabilities from an outsider’s perspective, providing a critical view of the system's external defenses.

    Graybox Analysis: For the AIR responder project, Graybox analysis has been conducted. This testing method combines both the internal and external examination of the software, providing a more comprehensive security overview.

    Are databases used by the AIR responder?

    Functioning like a server application, the AIR responder does not use databases. Instead, it operates by saving reports as individual files using SQLite. These reports are subsequently forwarded to the AIR Console. This approach simplifies the data handling process, enabling the efficient and secure storage and transfer of information.

    What is the Binalyze AIR design process?

    We continuously advance our development process by implementing the SCRUM methodology, complemented by unit and integration testing. The use of both unit and integration testing is crucial for maintaining high-quality standards and ensuring that each component of our product functions seamlessly individually and as part of the whole system.

    Resource monitoring for the AIR responder

    After the initial installation, it is normal to observe a small amount of memory being allocated, typically around 30MB to 40MB, with no significant CPU or disk usage during idle states. This behavior is expected and can be attributed to the necessary resources required for the AIR responder to function correctly.

    During idle states, the AIR responder remains in standby mode, pending its next call to the Console to collect any new tasking assignments. The allocated memory is utilized to maintain the AIR responder's core functionality and to ensure prompt responsiveness when new tasks are assigned.

    When the AIR responder receives an acquisition task, the evidence collection process is carried out by a subprocess called Tactical (or Incident Response Evidence Collector on Windows). During the acquisition process, it is normal to observe increased CPU and memory usage as the Tactical sub-process actively collects and processes the evidence.

    The increase in CPU and memory usage is a result of the intensive data gathering and analysis performed by the Tactical sub-process. It utilizes system resources to capture and process the required evidence efficiently, ensuring the integrity and completeness of the collected data.

    The extent of CPU and memory usage during the acquisition task may vary depending on factors such as the size and complexity of the evidence being collected. Once the acquisition is completed, the CPU and memory usage will typically return to normal levels, reflecting the completion of the resource-intensive task.

    If you prefer to limit CPU usage during acquisition or hunt and triage tasks, you have the option to set a CPU policy that restricts maximum CPU usage to a specified percentage. This setting, adjustable in the AIR Console before execution, allows you to limit CPU usage. Setting a lower percentage may extend task completion times.

    A Hunt/Triage task does not involve running the Tactical sub-process for evidence collection. Instead, the Hunt/Triage task is executed within the AIR responder, utilizing its internal capabilities to analyze and evaluate the collected data.

    Although the CPU usage for a Hunt/Triage task is typically low, it is still possible to set a CPU policy for the task.

    The log file of the running AIR responder provides valuable information about CPU usage, memory usage, and other system resources. Here is an example of the log entries about system and service resources:

    1. INFO 2024-01-04 18:45:25+03:00 2.31.2 triage: resmon: SysStats{GoHeapAlloc: 2.3 MB, GoHeapSys: 12 MB, NumGoroutines: 27, NumCPU: 16} file:pkg/resmon/handlers.go:16 func:resmon.(*LoggingStatsHandler).HandleSysStats

    2. INFO 2024-01-04 18:45:26+03:00 2.31.2 triage: resmon: PidStats{PID: 9460, Name: AIR.exe, CPU: 14.7%, AvgCPU: 25.9%, Mem: 56 MB, NumFDs: 341, NumCPU: 16} file:pkg/resmon/handlers.go:21 func:resmon.(*LoggingStatsHandler).HandlePidStats

    The log file for the AIR responder can be found at the following location:

    C:\Program Files (x86)\Binalyze\AIR\agent\AIR.log.txt

    You can navigate this path on your system to access the log file and view the relevant information about CPU usage, memory usage, and other resources as logged by the AIR responder during its operation.

    These usages were observed on a system equipped with an Intel Core i7-10875H running at 2.30GHz (with 16 processors) and 32GB of memory (Windows 10 Pro).

    Similar scenarios can be observed on macOS with the built-in Activity Monitor application. To access detailed process information, simply click on the (i) button within the Activity Monitor.

    On Linux, an alternative option for resource monitoring is to use htop instead of the built-in app top. The htop option offers enhanced capabilities and can be installed by following these steps:

    1. Open the terminal.

    2. Run the command: sudo apt-get install htop (for Ubuntu/Debian-based distributions) or sudo yum install htop (for CentOS/Fedora-based distributions).

    3. Once installed, type htop in the terminal and press Enter to launch the application.

    Using htop provides a more comprehensive and user-friendly interface for monitoring system resources on Linux.

    Resource Monitoring with resmon

    There is also a CLI tool named resmon specifically developed for internal usage. It can be used to gather resource usage data related to the AIR responder and its subprocesses, storing them in a local database.

    By default, resmon will monitor the AIR responder if no flags are given. However, you can monitor other processes by providing a PID flag or a process name flag. For more detailed information on its usage, a usage document for resmon can be provided upon request.

    The information collected by resmon is stored in a local database, which includes numerous entries for the monitored process and its subprocesses. Due to the abundance of entries with comprehensive details, reading and interpreting the data can be a challenging task.

    To address this, a script has been developed alongside resmon to visualize these outputs. It displays the CPU and memory usage of the processes (including subprocesses) monitored by resmon in a graphical format.

    In the following section, we will share the resmon results as it monitored various task assignments being executed by the AIR responder. Throughout the tasks, resmon will continuously monitor the AIR responder and its subprocesses, generating a comprehensive local database that captures the output of resource monitoring.

    For easy visualization, we will utilize a feature of a resmon designed to focus on visualizing its output by presenting the CPU and memory usage in intuitive graphical representations. These visualizations offer valuable insights into the resource utilization of the AIR responder and its subprocesses throughout each tasking assignment, from start to finish.

    The following scenarios were observed on a system equipped with an Intel Core i7-10875H running at 2.30GHz (with 16 processors) and 32GB of memory (Windows 10 Pro).

    Analysis of an Acquisition Task

    Below, you will find two graphs illustrating the CPU and Memory usage of the AIR responder. These graphs represent the resource utilization from the moment an acquisition task is started through to its completion.

    Duration

    Report Size (Zipped)

    Database Size

    Event Record Count

    Drone

    Total Disk Space

    Used Disk Space

    06m29s

    199KB

    38KB

    10091

    Enabled

    512 GB

    176 GB

    Analysis of an Acquisition Task (with CPU limit of 50%)

    In this scenario, we will examine the CPU and Memory usage of the AIR responder while running tasks received from the AIR Console, with a specific condition: the CPU usage of the AIR responder is limited to 50%.

    This limitation is possible due to the AIR responder's capability to control and restrict its CPU utilization during task execution.

    The visualized graphs provided below depict the resource utilization, explicitly focusing on the CPU and Memory usage of the AIR responder. These graphs illustrate the performance of the AIR responder, highlighting its ability to effectively manage CPU allocation while executing tasks received from the AIR Console.

    The script can occasionally display temporary CPU usage spikes that surpass the process's CPU limit as a result of aggregating subprocesses.

    Duration

    Report Size (Zipped)

    Database Size

    Event Record Count

    Drone

    Total Disk Space

    Used Disk Space

    06m48s

    200KB

    39KB

    10102

    Enabled

    512 GB

    176 GB

    Analysis of a Hunt/Triage Task

    Let's examine the resource usage of the AIR responder when a Hunt/Triage task is received from the AIR Console.

    Duration

    Hunt/Triage Rule Type

    Total Disk Space

    Used Disk Space

    CPU Limit

    19m33s

    YARA

    512 GB

    176 GB

    100%

    Analysis of a Hunt/Triage Task (with CPU limit of 50%)

    Similar to an acquisition task, a Hunt/Triage task can also be configured with a CPU limit for executing the AIR responder. The following graphs illustrate the resource usage of a Hunt/Triage task running with a CPU limit of 50%.

    Duration

    Hunt/Triage Rule Type

    Total Disk Space

    Used Disk Space

    CPU Limit

    27m09s

    YARA

    512 GB

    176 GB

    50%

    Responder

    Installation of the AIR Responder on your assets is managed via the Assets button in the Main Menu:

    The AIR Responder installer is a zero-configuration package that contains the console address already embedded in it.

    You can deploy the AIR Responder in multiple ways:

    1. Downloading an installation package (Windows, macOS, Linux, Chrome, and ESXi)

    2. Copying a PowerShell Command (Windows)

    Copying a CURL Command (macOS and Linux)

  • Copying a WGET Command (macOS and Linux)

  • Downloading a PowerShell Script (Windows)

  • Downloading the Asset installer (macOS and Linux)

  • Manual installation via Active Directory/SCCM.

  • Generation of a shareable Deployment Link (Windows, macOS, Linux, Chrome, and ESXi)

  • The cards below show the default location paths for the AIR Responder:

    In the sections that follow, we will look at the deployment of AIR Responders to Windows, Linux, and Mac operating systems.

    The AIR Responder is a 'zero-config' deployment, as the file name has all the information you need for quickly deploying a Responder.

    This level of detail in the filename provides all the information needed as a digitally signed binary - this prevents issues with security solutions, and to date, not one issue has arisen.

    The file name example shown here has 4 main components:

    1. 2.38.7 - is the Responder version number.

    2. air-demo.ACME.com - is the address of the console with which the Responder will be communicating

    3. 176 - is the console's internal organization number ID.

    4. And the apparently random mixture of letters and numbers, 9df51c56a73341f4, is the - Deployment Token.

    5. 386 - describes the processor architecture of the machine on which the Responder will run.

    There are multiple ways of deploying the responder, all of which are designed to be quick and scalable. Let's take a look at the different ways in which you can deploy the AIR Responder to your assets:

    From the Main Menu, select 'Assets' and then 'All Assets' from the Secondary Menu. Now you will see the page name 'Assets' and next to that is the Action Button, which for the Assets page is labeled '+ Add New.'

    When this '+ Add New' button is selected, three deployment options are offered in a drop-down menu:

    Responder Deployment: Three deployment options for adding AIR Responders to assets.

    Each one of the options will present the user with a wizard that will walk through the options needed for the chosen deployment method:

    1. Deploy New - For assets that are attached to a network that is visible to the AIR console

    2. Cloud Account - For assets that reside in AWS EC2, and Virtual Machines in Microsoft Azure.

    3. Off-Network - To generate triage and collection packages for assets that are not connected to a visible network.

    Deploy Responder to New Asset Wizard

    1. When you choose 'Deploy New', you'll be prompted via a wizard to determine if the Responder should establish a direct connection to the AIR console or if utilizing a Relay Server connection would be more suitable for your environment. Relay Server is explained here.

    Responder Deployment: Select a connection route
    1. The second step of the deployment wizard offers distinct deployment options for all currently supported network-attached operating systems: Windows, Linux, and macOS.

    Responder Deployment: Choose Platform

    Windows PowerShell Command:

    • The command varies based on the Organization affiliation. An example PowerShell command to copy is provided below:

    This command is specific to your console address and Organization.

    Windows PowerShell Script:

    • This script can be downloaded from your AIR Console. Ensure you select or are working in the appropriate Organization before downloading.

    SCCM Deployment for Windows Responder:

    • If you prefer, the Windows responder can be deployed using SCCM with the following command:

    For a silent installation you can use the following command:

    These commands are specific to your console address and Organization.

    Windows Responder MSI Download:

    • The MSI for the Windows Responder can be downloaded directly from the page, as depicted in the screenshot below:

    Responder Deployment: MSI Download

    Shareable Deployment Link for Windows/Linux/macOS:

    • All three operating systems support the Shareable deployment link available in the console. This method is often the most straightforward—simply share the link with your client, allowing them to download and install the Responder. An example link is shown below:

    macOS and Linux Deployments:

    • Unlike Windows, macOS and Linux do not utilize PowerShell commands or scripts. Instead, they can employ CURL or WGET commands. Alternatively, you can use the Shareable deployment page link mentioned above.

    Example of CURL deployment command:

    Example of WGET deployment command:

    These commands are specific to your console address and Organization.

    Granting Full Disk Access for Responder on macOS

    For macOS, the user/administrator must allow Full Disk Access (FDA) to the AIR Responder for it to have full access to the disk for collections.

    Open "System Settings -> Privacy & Security -> Full Disk Access"

    Toggle the switch 'on' to enable Full Disk Access for the AIR Responder.

    After installing a responder on macOS, users will need to grant Full Disk Access permission. To guide users through this process, a pop-up will appear after installation stating: "Allow AIR to access files on your disk. Open System Settings > Security & Privacy > Full Disk Access to grant permission to "AIR".

    If Full Disk Access permission is not granted when starting any Acquisition, this will be shown in the Acquisition logs:

    Responder Deployment: Full Disk Access permission is not enabled
    Responder Deployment: Full Disk Access toggled on

    After toggling on the FDA on this page, select the /opt/binalyze/air/agent/air file in the file manager that opens. Once this is done, our responder will appear in the list under the name 'air', ready for the user to toggle 'on'.

    Responder Deployment: Allow access to data.

    Why is there no logo next to AIR on the Full Disk Access page in macOS?

    The AIR responder operates as an executable binary running as a service rather than a traditional macOS application. This approach ensures consistency across platforms like Linux and macOS.

    Since AIR is not packaged as a macOS app, it does not include a .plist file, which typically contains the application icon metadata. Consequently, it cannot display a logo on the Full Disk Access page.

    This design choice does not affect the functionality or performance of AIR.

    Problem with MDM Installation

    While the pop-up effectively guides users in manually installed scenarios, it presents challenges for enterprise environments where macOS devices are managed via Mobile Device Management (MDM). MDM allows remote application installation and security policy enforcement, including granting Full Disk Access.

    Customers prefer silent installations for MDM-deployed responders, as permissions are already set through security policies, eliminating the need for pop-ups. However, our current setup cannot distinguish between user-initiated and MDM-initiated installations, resulting in the pop-up appearing in all cases.

    We are actively working on a solution to address this issue for seamless enterprise deployments.

    Updating the AIR responder is discussed on this page.

    Responder Deployment: Assets button in the Main Menu

    Adding proxy to Responder

    Why Proxy Support

    Responder establishes connections to remote servers over HTTP, HTTPS, NATS, SFTP, FTPS, SMB, and Websocket over HTTPS. Please note that the supported protocols are subject to change in the future.

    Responder primarily communicates with the AIR Console via HTTP/S, as HTTP/S is the most essential protocol.

    There is a requirement to tunnel the responder’s connections over a different server, not to directly communicate with AIR Console or other servers. As a result, we implemented the proxy feature for all types of communication methods, which is entirely optional. Although it is optional, we enable the Proxy feature of the responder by default during the initial installation. However, previous installations without the proxy feature are unaffected, and the feature remains disabled. This means upgrading an existing responder to a version <= v2.15.x will not be affected by this new feature as long as it is not enabled explicitly. Enabling and disabling the proxy feature manually is documented below. Please note that, as of now, the only way to enable or disable the proxy feature is to run the related commands on the machine. That is to say, it cannot be changed remotely via the AIR Console.

    Proxy Server Types

    In this document, we are only interested in Forward proxy servers. Other types of proxy servers, such as reverse proxy servers and transparent proxy servers, are out of scope.

    We only support forward proxy servers that support HTTP Tunneling with the HTTP Connect method and SOCKS5 proxy servers.

    Note that we also support HTTP proxy servers using SSL/TLS encryption via HTTPS protocol; however, the SSL certificate of the server must be a valid certificate, or the CA certificate of the server certificate must be loaded to the machine to determine whether the encrypted connection is secure or not.

    The responder uses the system’s SSL/TLS certificate validation methods and AIR Console’s CA certificate to validate the certificates of the remote server.

    We will also describe how we handle Authenticated Proxy Servers below.

    We anticipate encountering more issues with HTTPS proxy servers, authenticated proxy servers, and SSL interception/bumping in the future. Because of this, the proxy configuration of these types of servers and the Agent must be performed carefully.

    Configure Proxy Settings

    There are different ways to configure the proxy settings for all supported platforms, including the machine and the Agent. Due to historical reasons, responders can detect proxy settings on different platforms from various sources. As a result, our detection of the proxy settings logic is described below.

    1. If ProxyEnabled: false or missing ProxyEnabled option in the agent’s config.yml file, we skip reading proxy settings. Missing ProxyEnabled option means ProxyEnabled: false, implicitly.

    2. Try to find proxy settings using AIR_HTTP_PROXY and AIR_HTTPS_PROXY environment variables. If they are set, they will be used as the source of proxy settings.

    Note that setting one of the HTTP_PROXY, HTTPS_PROXY, AIR_HTTP_PROXY, or AIR_HTTPS_PROXY environment variables is sufficient to use a single proxy address.

    You must restart the responder’s service if there is a change in the environment variables or config.yml file changes to let the Agent take the new values into account.

    Configure Proxy Settings on Linux

    AIR_HTTP_PROXY, AIR_HTTPS_PROXY, HTTP_PROXY, HTTPS_PROXY, http_proxy, and https_proxy proxy server environment variables are used if they are set. We use them to configure the Agent's proxy behavior. In addition to these environment variables AIR_NO_PROXY, NO_PROXY, and no_proxy environment variables are also used if they are set as long as a proxy server is set in the proxy environment variables.

    We use an additional AIR_ prefix for responder-specific proxy environment variables to let users set a proxy server for only the Agent or use a different proxy server for the responder.

    Since the Agent runs as a service or daemon, users need to configure the proxy settings using the following method.

    If /etc/environment.d/binalyze-air-agent.conf does not exist, create it.

    Open /etc/environment.d/binalyze-air-agent.conf and add the following example lines to it:

    AIR_HTTP_PROXY=proxy.example.com:3128 AIR_HTTPS_PROXY=proxy.example.com:4128 AIR_NO_PROXY=localhost,127.0.0.0/8,::1

    The responder's systemd service file will read the changes made to the edited file. Therefore, it is necessary to reload the changes and restart the service for the changes to take effect. You can do this by running the following commands:

    sudo systemctl daemon-reload sudo systemctl restart Binalyze.AIR.Agent.service

    You should keep in mind that using systemd’s approach to override service settings to set proxy settings can create an issue after uninstalling the responder from the machine. Because the overridden service settings are retained after uninstallation, installing a responder to that machine after uninstallation will utilize the overridden service configuration.

    Configure Proxy Settings on macOS

    Setting proxy environment variables, as in Linux, is a way to configure a proxy for the responder.

    As the agent works as a daemon in the macOS system with root privileges under the launchd service manager, we can set the environment variables like this

    Open the launchd.conf file to add environment variables (Note that the file may not exist, you can create it)

    sudo nano /etc/launchd.conf

    Append the proxy environment variables like this. Alternatively, you can skip AIR_ prefix but it will affect other programs in the system.

    # ... setenv AIR_HTTP_PROXY proxy.example.com:3128 setenv AIR_HTTPS_PROXY proxy.example.com:4128 setenv AIR_NO_PROXY *.local,169.254/16

    The method above will require a reboot to be effective. Alternatively, you can use the other methods mentioned below without needing to reboot.

    The second method for setting environment variables on macOS is to use the following commands.

    sudo launchctl setenv AIR_HTTP_PROXY proxy.example.com:3128 # You should use the same command for other environment variables

    The method above requires restarting the responder’s service like this:

    sudo launchctl unload /Library/LaunchDaemons/com.binalyze.air-agent.plist sudo launchctl load -w /Library/LaunchDaemons/com.binalyze.air-agent.plist


    Apple explains the third way to set a proxy for macOS systems with this link

    You should bear in mind that only HTTP and HTTPS proxies are supported via System Settings > Network > ... > Proxies not SOCKS or other types.

    macOS saves the credentials of the proxies set by System Sessions to the Key Chain. The responder doesn’t support Key Chain access to get the credentials, so we don’t recommend using authenticated proxies using this method. You can set the username and password of the proxy server using environment variables, which are explained in this document.

    macOS launchd Tips

    Question:

    How do I set environment variables that persist across reboots for a specific daemon/service on a macOS system?

    Answer:

    To set environment variables that are persisted across reboots for a specific daemon or service on a macOS system, you can use the launchctl setenv command as follows:

    1. Identify the name of the daemon or service that you want to set the environment variables for. This name is typically specified in the Label key in the daemon's property list file, which is stored in /Library/LaunchDaemons or /System/Library/LaunchDaemons for system-level daemons, or in ~/Library/LaunchAgents for user-level daemons and services.

    2. Use the launchctl setenv command to set the environment variables for the daemon or service, using the -n option to specify the name of the daemon or service. For example, to set the FOO

    sudo launchctl setenv -n com.example.myservice FOO bar

    1. To verify that the environment variable has been set, you can use the launchctl getenv command, using the -n option to specify the name of the daemon or service. For example:

    sudo launchctl getenv -n com.example.myservice FOO

    This should print bar.

    Keep in mind that the launchctl setenv command only sets environment variables for processes launched by launchd, and it does not modify the environment of processes that are already running. If you want to set environment variables for a running process, you will need to use a different method, such as setting the variables in the process's shell configuration file or using the export command in the process's shell.

    Also, note that the launchctl setenv command only sets environment variables for daemons and services managed by launchd. If you want to set environment variables for other processes, you will need to use a different method.

    The responder’s service/daemon name is com.binalyze.air-agent on macOS systems.

    Configure Proxy Settings on Windows

    As explained for Linux and macOS, the responder can also use the specified proxy environment variables for Windows.

    The responder runs as a service using SYSTEM account on Windows systems. Because of this, a user’s proxy settings cannot be accessed by the SYSTEM account without using unnecessarily complex methods.

    The responder can only access the system’s environment variables, not the user’s environment variables.

    The first method is to use the proxy environment variables to set a proxy for the responder. There are different ways to set environment variables for Windows.

    Question:

    Please instruct me on how to set system environment variables for Windows systems.

    Answer:

    To set system environment variables on a Windows system, you will need to follow these steps:

    1. Press the Windows key + R to open the Run dialog.

    2. Type "sysdm.cpl" and press Enter to open the System Properties window.

    3. Switch to the "Advanced" tab.

    4. Click the "Environment Variables" button.

    • To set a new system environment variable, click the "New" button under the "System variables" section.

    • To edit an existing system environment variable, select it from the list and click the "Edit" button.

    1. In the Edit Environment Variable window, enter the name and value for the environment variable.

    2. Click "OK" to save the changes.

    3. Close the Environment Variables and System Properties windows.

    Note: You will need to have administrator privileges to make these changes.


    The second method is to use the netsh command to set winhttp proxy.

    Question:

    Please instruct me on how to set a proxy using the netsh command on a Windows system with an administrator account.

    Answer:

    1. Press the Windows key + X and select "Command Prompt (Admin)" to open an elevated Command Prompt window.

    2. Type the following command and press Enter to set the proxy server:

    netsh winhttp set proxy [proxy_server_name]:[port]

    Replace [proxy_server_name] and [port] with the actual values for your proxy server and port.

    1. If your proxy requires authentication, you can use the following command to set the username and password:

    netsh winhttp set proxy [proxy_server_name]:[port] "user=[username]&password=[password]"

    Replace [proxy_server_name], [port], [username], and [password] with the actual values for your proxy server, port, username, and password.

    1. To verify that the proxy has been set, you can use the following command:

    netsh winhttp show proxy

    This will display the current proxy settings.

    Note: You will need to have administrator privileges to run these commands.


    The third way of setting a proxy is to use the netsh winhttp set advproxy command. This is introduced after Windows 11.

    Create a settings.json file like this:

    {"Proxy": "10.211.55.3:3128", "ProxyBypass": "", "AutoconfigUrl": "", "AutoDetect": false}

    Run the command like this:

    netsh winhttp set advproxy setting-scope=machine settings-file=settings.json

    To clear advproxy settings, you need to run the same command but settings.json should have empty fields like this

    {"Proxy": "", "ProxyBypass": "", "AutoconfigUrl": "", "AutoDetect": false}


    The fourth way of setting a proxy using the Windows registry is as follows:

    Open the registry editor and go to the Internet Settings key

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings

    Set the values using proxy settings like this

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings] "ProxyEnable"=dword:00000001 "ProxyOverride"="*.noproxy.example.com" "ProxyServer"="example.com:3128" "AutoConfigURL"="http://example.com/wpad.dat"

    You need to restart the responder’s service if proxy settings are changed.

    Static vs Automatic Proxy

    Automatic proxy means that we use the URL of the PAC file to get the proxy URL from the Operating System. Automatic proxy support is only applicable to macOS and Windows platforms. Other proxy settings are considered static proxy settings, and they require restarting the responder service if any changes are made.

    There may be some issues if Automatic Proxy is used with our Isolation feature on Windows.

    Because, for automatic proxies, wpad.dat or PAC files are fetched from the AutoConfigURL address by the Windows platform’s own services. Therefore, these services may not have access to the target URL during DNS resolution or HTTP request processing. This may grant the responder direct access to the remote servers, bypassing the proxy. If a direct connection is not allowed from that machine, the responder will not be able to communicate with the AIR Console. It is recommended that users exercise such scenarios for Windows platforms.

    Authenticated Proxies

    The responder obtains the proxy server’s authentication information using the proxy server's URL. For example, if a proxy is set using an environment variable AIR_HTTP_PROXY=http://username:[email protected]:3128 then the responder parses the URL and uses the username and password of the proxy server to send to the proxy server with an HTTP header, e.g. Proxy-Authorization: Basic encoded-credentials`

    For authenticated SOCKS5 proxy servers, the URL structure is the same for authorization, and it uses the SOCKS5 protocol's authentication method, e.g. socks5://username:[email protected]:1080

    NATS & Evidence Repositories

    The responder uses a NATS client to connect to a NATS server over port 4222. NATS is used to get notifications from the AIR Console about the tasks in the queue. This helps the responder complete tasks promptly when assigned.

    As our proxy requirement for the responder is to connect over a proxy server always, if it is set, the responder tries to connect to AIR Console’s NATS server using HTTP or SOCKS5 proxies, like regular HTTP connections. It uses the same HTTP Connect method to create a tunnel to the server for the NATS protocol.

    If the proxy server does not support tunneling on port 4222, the responder attempts to connect to the NATS server directly, thereby bypassing the proxy server. Note that this is the default behavior for all non-HTTP protocols, SMB, FTPS, and SFTP.

    SMB uses port 445.

    SFTP uses port 22.

    FTPS uses port 21 and high ports for data transfer.

    If the proxy server is configured to open a tunnel for our supported protocols, there shouldn’t be any problem. Because of the fallback mechanism we use to bypass the proxy server when creating a tunnel fails, the responder should be able to send data to the remote server.

    SSL Bumping/Interception

    If the proxy server is configured to intercept SSL traffic between the responder and the AIR Console, several essential points must be considered.

    1. CA certificate of the AIR Console should be considered valid by the proxy server. Otherwise, the proxy server cannot open a tunnel to the AIR Console.

    2. The responder uses Websocket for interACT communication over the HTTPS protocol. However, some proxy servers, e.g., Squid, may not support WebSocket communication well when SSL Bumping is enabled. So, the proxy server must be configured to handle Websocket over HTTPS with SSL bumping if interACT is used. This can be verified by opening an interACT terminal on the AIR Console and seeing the established connection.

    Enable / Disable Proxy

    By default, the proxy support is enabled after fresh new installations of version >=2.16.x.

    When the proxy support is enabled, the config.yml file contains theProxyEnabled: true entry. When this configuration is set to false or missing, it means it is disabled.

    You can enable or disable proxy support by running the following commands after the installation or upgrade is successful. Note that you must be an administrator or root to run these commands.

    Windows Enable:

    "C:\Program Files (x86)\Binalyze\AIR\agent\AIR.exe" configure --enable-proxy

    Windows Disable:

    "C:\Program Files (x86)\Binalyze\AIR\agent\AIR.exe" configure --disable-proxy

    Linux/macOS Enable:

    /opt/binalyze/air/agent/air configure --enable-proxy

    Linux/macOS Disable:

    /opt/binalyze/air/agent/air configure --enable-proxy

    These commands enable or disable proxy support to perform the following actions.

    • Check if the configuration change can be applied; otherwise, exit

    • Stop the responder’s service

    • Change the responder’s configuration

    • Start the responder’s service

    Note that exit code 0 (zero) means success. Other exit codes indicate that an error occurred.

    AIR.Responder_2.38.7_air-demo.ACME.com_176_9df51c56a73341f4_386_.msi
    [System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true}
    (New-Object System.Net.WebClient).DownloadFile("https://air-demo.ACME.com/api/endpoints/download/0/deploy/windows?deployment-token=d297145XXXXXXXX", "$PWD\deploy-responder.ps1")
    .\deploy-responder.ps1
    <#
    2022-2024 (c) AIR
    AIR Responder Powershell Script for Windows
    PLEASE DO NOT EDIT! This file is automatically generated at 2024-05-02T13:49:58
    VERSION 2.39.9
    #>
    
    <#
    .SYNOPSIS
        This script installs the AIR Responder using given parameters or default values are used.
        This script requires administrator privileges!
    
        MSI file is temporarily stored in %LOCALAPPDATA%\binalyze\air\agent
    .DESCRIPTION
        Powershell script to deploy the AIR Responder.
    .PARAMETER Version
        The version of the AIR Responder to be deployed.
    .PARAMETER ConsoleAddress
        The address of the AIR Console without https:// prefix, only domain address.
    .PARAMETER OrganizationId
        The organization id to register the AIR Responder.
    .PARAMETER DeploymentToken
        A Valid deployment token to deploy the AIR Responder.
    .PARAMETER ConnectionRouteID
        Set Connection Route Id for the AIR Responder.
    .PARAMETER ConnectionRouteAddress
        Set Connection Route Address for the AIR Responder.
    .PARAMETER AllowInsecureTlsVersion
        Allow insecure TLS version for the AIR Responder.
    #>
    
    Param ([string]$Version="2.39.9", 
           [string]$ConsoleAddress="air-demo.ACME.com",
           [string]$OrganizationId="0",
           [string]$DeploymentToken="d297145dXXXXXXXX",
           [string]$ConnectionRouteID="{{.AIR_CONNECTION_ROUTE_ID}}",
           [string]$ConnectionRouteAddress="{{.AIR_CONNECTION_ROUTE_ADDRESS}}",
           [switch]$AllowInsecureTlsVersion)
    
    $downloadDir = "$env:LOCALAPPDATA\binalyze\air\agent"
    
    Remove-Item $downloadDir -Force -Recurse -ErrorAction Ignore
    New-Item -Path $downloadDir -ItemType Directory
    Push-Location
    Set-Location -Path $downloadDir
    
    $arch = "386"
    if ([Environment]::Is64BitProcess) {
        $arch = "amd64"
    }
    
    if ($ConnectionRouteID -like '{*') {
        $ConnectionRouteID = ""
    }
    if ($ConnectionRouteAddress -like '{*') {
        $ConnectionRouteAddress = ""
    }
    
    $fileSuffix = ""
    if ($ConnectionRouteID) {
        $fileSuffix = "{0}_{1}_" -f $arch,$ConnectionRouteID
        if ($ConnectionRouteAddress) {
            $fileSuffix = "{0}{1}_" -f $fileSuffix,$ConnectionRouteAddress
        }
    }
    
    $file = "{0}\AIR.Responder_{1}_{2}_{3}_{4}_{5}.msi" -f $downloadDir,$Version,$ConsoleAddress,$OrganizationId,$DeploymentToken,$fileSuffix
    $url = "https://{0}/api/endpoints/download/{1}/windows/msi/{2}?deployment-token={3}" -f $ConsoleAddress,$OrganizationId,$arch,$DeploymentToken
    
    Write-Debug "file: $file"
    Write-Debug "url:  $url"
    
    if ($AllowInsecureTlsVersion) {
        Write-Host "Allowed insecure TLS versions for the AIR Responder. If this flag is set, the AIR Responder will connect to the AIR Console with system default TLS version"
    } else {
        try {
            [System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12 -bor [System.Net.SecurityProtocolType]::Tls13
        } catch {
            Write-Host "TLS1.3 and TLS1.2 is not supported on this operating system, please try to use AllowInsecureTlsVersion flag."
        }
    }
    
    [System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true}
    (New-Object system.net.webclient).DownloadFile($url,$file)
    
    $process = Start-Process C:\Windows\System32\msiexec.exe -ArgumentList "/i $file /quiet /norestart" -PassThru -Wait
    $process.WaitForExit()
    if ($process.ExitCode -eq 0) {
        Write-Debug "AIR Responder is installed successfully."
        Remove-Item -Path $file -ErrorAction Ignore
    } else {
        Write-Debug "MSI failed. ExitCode: $($process.ExitCode)"
        Pop-Location
        exit $process.ExitCode
    }
    Pop-Location
    
    msiexec /i AIR.responder_2.24.2_air-demo.ACME.com_0_d297145XXXXXXXX_.msi /qn /norestart
    msiexec /i AIR.responder_2.26.4_air-demo.ACME.com_176_9df51c56XXXXXXXX_.msi /qn /norestart
    https://air-demo.ACME.com/#/shareable-deploy?token=d297145dXXXXXXXX
    sudo curl -kfsSL "https://air-demo.ACME.com/api/endpoints/download/176/deploy/darwin?deployment-token=9df51c56XXXXXXXX" | sudo sh
    sudo wget --no-check-certificate -O- "https://air-demo.ACME.com/api/endpoints/download/176/deploy/darwin?deployment-token=9df51c56XXXXXXXX" | sudo sh
    Logo

    Windows

    C:\Program Files (x86)\Binalyze\AIR\agent

    macOS

    /opt/binalyze/air/agent

    Linux

    /opt/binalyze/air/agent

    Try to find proxy settings using HTTP_PROXY, HTTPS_PROXY, http_proxy, and https_proxy environment variables. If they are set, they will be used as the source of proxy settings. Note that this is the default approach for UNIX-like systems.

  • If the proxy environment variable is not set, we use the operating system's API to retrieve the proxy settings.

  • environment variable to
    bar
    for the
    com.example.myservice
    service, you would use the following command:
    In the Environment Variables window, you can set system environment variables by doing the following:
    Change proxy settings on Mac

    ESXi Standalone Collector

    The AIR standalone collector currently provides support for execution on ESXi 6.5+ systems.

    VMware ESXi is a type of hypervisor, which is software that creates and runs virtual machines (VMs). It is a part of VMware's vSphere product suite and is used for enterprise-level virtualization. ESXi is popular due to its stability, performance, and extensive feature set for managing and running virtual machines.

    AIR offers a robust approach for evidence collection from ESXi platforms. DRONE is not currently supported for ESXi systems. This is achieved through a standalone ESXi collector, available for download on the Assets page of your AIR console:

    Assets>Add New>Deploy New>Direct connection to AIR Console >ESXi

    ESXi Standalone Collector: New Asset

    After running Responder using your chosen method, the collected evidence should be converted into a PPC file. This PPC file can then be imported into the AIR Console. Once imported, the asset will be displayed alongside all other assets in AIR, ensuring seamless integration and visibility within the platform.

    ESXi Standalone Collector: ESXi platform is shown on the AIR Asset page

    For the conversion to PPC, you'll need an off-network Responder binary specific to your operating system on which you want to carry out the conversion.

    Here's an example for Microsoft:

    1. Download the Off-Network Responder Package:

      • If you are not sure where to get the binary, visit the following link for an explanation: .

    After ingestion into AIR the ESXi evidence is parsed and pesented in the Investigation Hub in the normal way:

    However, you can if required decompress the tar.gz file to independently access and examine the evidence. Typically, the evidence will include the following: :

    • System Info: Basic system information about the ESXi machine.

    • Bash History: Command history executed on the Bash shell.

    • Collect Bash Files: Gathering files associated with the Bash shell.

    • Environment Variables: Variables defined in the system environment.

    Having run the binary the progress will be displayed in the user's terminal/shell:

    Full list of ESXi collected items

    File Collectors:

    Hunt/Triage Collectors

    Other Collectors:

    Extract the Package:

    • Extract the contents of the downloaded Off-Network Responder zip file.

  • Prepare Your Evidence:

    • Copy your ESXi evidence file into the same extracted folder.

  • Run the Command:

    • Execute the following command, replacing your_ESXi_evidence_name with the actual name of your ESXi evidence file:

  • Following these steps will create a new folder containing a Case.ppc file. Please import this Case.ppc file into the AIR Console.

    This process will ensure that your ESXi evidence is accurately processed and seamlessly integrated into the AIR platform.

    Collect /etc Files: Gather files under the /etc directory.

  • Log Files: Collecting various log files.

  • SSH Config: Retrieves the configuration settings related to the SSH (Secure Shell) protocol.

  • SSH Authorized Keys: Collects information about authorized SSH keys, which are used for secure authentication.

  • SSH Known Hosts: Gathers details about known hosts in the context of SSH.

  • File System Enumeration: Involves enumerating and collecting information about the file system on the ESXi machine.

  • /etc Collector

    All files under /etc is collected

    6

    Log Files

    All files under /var/log and /scratch/log is collected

    7

    Spool Files

    All files under /var/spool is collected

    Disk Usage Human Readable

    8

    System Hostname

    9

    VMware Version

    10

    System Info

    11

    Shell Aliases

    12

    Environment Variables

    13

    ESX Advanced Configuration

    14

    ESX FCoE Configuration

    15

    ESX FCoE Networking

    16

    ESX IPSec Configuration

    17

    ESX IPsec Policy

    18

    ESX Module List

    19

    ESX Module Query

    20

    ESX Multipathing Info

    21

    ESX NAS Configuration

    22

    ESX Network Interface Cards

    23

    ESX Routing Table

    24

    ESX Network Routes

    25

    ESX IPv6 Routing Table

    26

    ESX IPv6 Network Routes

    27

    ESX SCSI Devices List

    28

    ESX VMKnic List

    29

    ESX Volume List

    30

    ESX VSwitch List

    31

    ESX Configuration Info

    32

    List all of the CPUs on this host.

    33

    List usb devices and their passthrough status.

    34

    List the boot device order, if available, for this host.

    35

    Display the current hardware clock time.

    36

    Get information about memory.

    37

    List all of the PCI devices on this host.

    38

    Get information about the platform.

    39

    Information about the status of trusted boot. (TPM, DRTM status).

    40

    List active TCP/IP connections.

    41

    List configured IPv4 routes.

    42

    List configured IPv6 routes.

    43

    List ARP table entries.

    44

    List the VMkernel network interfaces currently known to the system.

    45

    List configured Security Associations.

    46

    List configured Security Policys.

    47

    Print a list of the DNS server currently configured on the system in the order in which they will be used.

    48

    List the rulesets in firewall.

    49

    List the Physical NICs currently installed and loaded on the system.

    50

    List the virtual switches current on the ESXi host.

    51

    Hostname

    52

    Get Open Network Files

    53

    Get Unix Socket Files

    54

    Get the network configuration.

    55

    Get the DNS configuration.

    56

    Get the IP forwarding table.

    57

    Gets information about virtual NICs.

    58

    Displays information about virtual switches.

    59

    Lists the installed VIB packages.

    60

    Gets the host acceptance level. This controls what VIBs will be allowed on a host.

    61

    Display the installed image profile.

    62

    List the VMkernel UserWorld processes currently on the host.

    63

    Collect the list open files.

    64

    Report a snapshot of the current processes including used time, verbose, session ID and process group, state and type.

    65

    List the NAS volumes currently known to the ESX host.

    66

    List the NFS v4.1 volumes currently known to the ESX host.

    67

    List the volumes available to the host. This includes VMFS, NAS, VFAT and UFS partitions.

    68

    Display the mapping of logical volumes with physical disks.

    69

    List the VMkernel modules that the system knows about.

    70

    List the enforcement level for each domain.

    71

    Get FIPS140 mode of ssh.

    72

    Get FIPS140 mode of rhttpproxy.

    73

    List the advanced options available from the VMkernel.

    74

    List VMkernel kernel settings.

    75

    Display the date and time when this system was first installed. Value will not change on subsequent updates.

    76

    Show the current global syslog configuration values.

    77

    Show the currently configured sub-loggers.

    78

    Display WBEM Agent configuration.

    79

    List local user accounts.

    80

    Display the current system clock parameters.

    81

    List permissions defined on the host.

    82

    Display the product name, version and build information.

    83

    List networking information for the VM's that have active ports.

    84

    List the virtual machines on this system. This command currently will only list running VMs on the system.

    85

    Get the list of virtual machines on the host.

    86

    List Summary status from the vm.

    87

    Configuration object for the vm.

    88

    Virtual devices for the vm.

    89

    Datastores for all virtual machines.

    90

    List of networks for all virtual machines.

    91

    List registered VMs.

    ID

    Collector Name

    Collected Files

    1

    History Files

    .ash_history, .bash_history, .sh_history, .tsch_history, .psql_history, .sqlite_history, .mysql_history, .vsql_history, .lesshst, .viminfo

    2

    Files of Interest

    .bashrc, .bash_logout, .bash_login, .bash_profile .mkshrc, .pam_environment, .profile, .zshrc, authorized_keys, known_hosts, ssh_config

    3

    Cronjob Files

    /etc/cron.hourly, /etc/cron.daily, /etc/cron.weekly, /etc/cron.monthly, /etc/cron.d

    4

    Cronjob Related Files

    *If any executable file is found in crontabs, it is collected.

    ID

    Collector Name

    1

    Process Snapshot Detailed

    2

    Process Snapshot Verbose

    3

    Open Files

    4

    User Info

    5

    Disk Usage

    6

    Disk Usage By User

    ID

    Collector Name

    Description

    1

    File Listing

    All files in the system is enumerated with following infos; File Name,File Type,Size (bytes),Access Rights,User ID,User Name,Group ID,Group Name,Number of Hard Links,Mount Point,Inode Number,Birth Time,Last Access Time,Modification Time,Change Time

    2

    Executable Hashes

    All files' MD5 hashes that has executable permission in the system is collected

    Off-Network Responder Package
    A full list of ESXi collected items is shown here
    ESXi Standalone Collector: ESXi evidence in the Investigation Hub
    ESXi Standalone Collector: ESXi collection example

    5

    7

    offnetwork_windows_amd64 esxi --input 220240621113447-EsxiDATA.tar.gz
    

    AmCache

    Overview

    Evidence: AmCache Description: Collect Amcache and Parse Category: System Platform: windows Short Name: amc Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): Yes

    Background

    Amcache.hve is a registry hive maintained by Windows Application Compatibility infrastructure. It tracks information about executed programs, installed applications, device drivers, and application shortcuts.

    Amcache provides historical evidence of program execution and can contain information about programs that have been deleted. The format changed significantly between Windows 7/8 (old format with Root\File and Root\Programs keys) and Windows 10 (new format with Root\InventoryApplication* keys).

    Data Collected

    This collector gathers structured data about amcache.

    AmCache Data

    Field
    Description
    Example

    Collection Method

    This collector:

    • Collects Windows\appcompat\Programs\Amcache.hve and transaction logs

    • Parses the offline registry hive using OfflineRegistry library

    • Detects format version (old vs new)

    • Extracts data from appropriate registry keys based on version

    New Format Keys:

    • Root\InventoryApplication

    • Root\InventoryApplicationFile

    • Root\InventoryApplicationShortcut

    Old Format Keys:

    • Root\File

    • Root\Programs

    Forensic Value

    Amcache is invaluable for program execution analysis and historical application tracking. Investigators use this data to prove program execution (even deleted programs), establish installation timelines, identify malware execution, track application versions and updates, correlate file hashes with known malware, detect portable executable usage, and reconstruct user application usage patterns.

    RootDirPath

    Installation directory

    C:\Program Files\Google\Chrome

    InstallDate

    Installation date

    2023-10-01T10:00:00

    KeyLastWriteTime

    Registry key modification time

    2023-10-15T14:30:00

    PackageFullName

    UWP package name

    InstallSourceType

    Installation source

    2

    MSIProductCode

    MSI product code GUID

    {12345678-1234-1234-1234-123456789ABC}

    MSIPackageCode

    MSI package code GUID

    {12345678-1234-1234-1234-123456789ABC}

    UninstallKey

    Uninstall registry key

    SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall...

    UninstallString

    Uninstall command

    "C:\Program Files\App\uninstall.exe"

    ProgramID

    Associated program ID

    00001234567890abcdef

    FileID

    File identifier (SHA1)

    a1b2c3d4e5f6...

    ProductName

    Product name from file metadata

    Google Chrome

    ProductVersion

    Product version

    118.0.5993.89

    Name

    File name

    chrome.exe

    FilePath

    Lowercase long path

    c:\program files\google\chrome\application\chrome.exe

    OriginalFileName

    Original file name from PE header

    chrome.exe

    SHA1

    SHA1 hash

    a1b2c3d4e5f6...

    Publisher

    Publisher name

    Google LLC

    FileSize

    File size in bytes

    3145728

    USN

    Update Sequence Number

    123456789

    IsOsComponent

    Whether file is OS component

    FALSE

    KeyLastWriteTime

    Registry key modification time

    2023-10-15T14:30:00

    KeyName

    Registry key name

    chrome.lnk

    LNKPath

    Path to shortcut file

    C:\Users\user\Desktop\Chrome.lnk

    KeyLastWriteTime

    Registry key modification time

    2023-10-15T14:30:00

    KeyName

    Device identifier

    USB\VID_1234&PID_5678

    Class

    Device class

    USB

    Description

    Device description

    USB Mass Storage Device

    DriverName

    Driver name

    usbstor.inf

    DriverPackageStrongName

    Driver package identifier

    oem12.inf:...

    Model

    Device model

    SanDisk Ultra

    FirstInstallDate

    First installation date

    2023-09-01T12:00:00

    InstallDate

    Last installation date

    2023-10-01T14:00:00

    KeyLastWriteTime

    Registry key modification time

    2023-10-15T14:30:00

    Manufacturer

    Device manufacturer

    SanDisk

    Provider

    Driver provider

    Microsoft

    Service

    Associated service

    USBSTOR

    DriverVerDate

    Driver version date

    2023-06-15T00:00:00

    DriverVerVersion

    Driver version

    10.0.19041.1234

    HWID

    Hardware ID

    USB\VID_1234&PID_5678&REV_0100

    Inf

    INF file name

    usbstor.inf

    ParentID

    Parent device ID

    USB\ROOT_HUB30

    DriverID

    Driver identifier

    usbstor.inf:...

    ContainerID

    Container ID GUID

    {12345678-1234-1234-1234-123456789ABC}

    ClassGuid

    Class GUID

    {36FC9E60-C465-11CF-8056-444553540000}

    COMPID

    Compatible IDs

    USB\Class_08

    BusReportedDescription

    Bus-reported description

    USB Mass Storage Device

    KeyName

    Driver key name

    ntfs.sys

    Product

    Product name

    Microsoft Windows

    ProductVersion

    Product version

    10.0.19041.1234

    DriverName

    Driver file name

    ntfs.sys

    DriverVersion

    Driver version

    10.0.19041.1234

    DriverPackageStrongName

    Driver package identifier

    oem0.inf:...

    DriverCompany

    Driver company

    Microsoft Corporation

    DriverLastWriteTime

    Driver last write time

    2023-06-01T00:00:00

    DriverTimeStamp

    Driver timestamp

    2023-06-01T00:00:00

    KeyLastWriteTime

    Registry key modification time

    2023-10-15T14:30:00

    DriverIsKernelMode

    Whether driver is kernel-mode

    TRUE

    DriverSigned

    Whether driver is signed

    TRUE

    Service

    Associated service

    NTFS

    Inf

    INF file name

    ntfs.inf

    DriverId

    Driver identifier

    ntfs.sys:...

    DriverCheckSum

    Driver checksum

    0x12345678

    ImageSize

    Driver image size

    524288

    VolumeID

    Volume GUID

    {12345678-1234-1234-1234-123456789ABC}

    FileID

    File entry identifier

    00001234abcd

    ProgramID

    Associated program ID

    00005678efgh

    ProductName

    Product name

    Google Chrome

    CompanyName

    Company name

    Google LLC

    FilePath

    File path

    C:\Program Files\Google\Chrome\Application\chrome.exe

    FileDescription

    File description

    Google Chrome

    FileVersion

    File version

    118.0.5993.89

    FileSize

    File size in bytes

    3145728

    SHA1

    SHA1 hash

    a1b2c3d4e5f6...

    CompilationTime

    PE compilation timestamp

    2023-09-15T10:00:00

    FileModificationTime

    File modification time

    2023-09-20T14:00:00

    FileCreationTime

    File creation time

    2023-10-01T12:00:00

    EntryCreationTime

    Amcache entry creation

    2023-10-01T12:05:00

    KeyLastWriteTime

    Registry key modification time

    2023-10-15T14:30:00

    MFTEntryNumber

    MFT entry number

    12345

    MFTSequenceNumber

    MFT sequence number

    1

    ProgramID

    Program identifier

    00005678efgh

    VolumeIDFileID

    Space-separated list of file IDs

    00001234abcd 00005678ijkl

    ProgramName

    Program name

    Google Chrome

    ProgramVersion

    Program version

    118.0.5993.89

    FilePaths

    Space-separated file paths

    C:\Program Files\Google\Chrome...

    Publisher

    Publisher name

    Google LLC

    InstallDate

    Installation date

    2023-10-01T10:00:00

    KeyLastWriteTime

    Registry key modification time

    2023-10-15T14:30:00

    InstallSourceType

    Installation source type

    2

    UninstallKeys

    Uninstall registry keys

    SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall...

    ProductCode

    Product code GUID

    {12345678-1234-1234-1234-123456789ABC}

    PackageCode

    Package code GUID

    {12345678-1234-1234-1234-123456789ABC}

    MSIProductCodes

    MSI product codes

    {12345678-1234-1234-1234-123456789ABC}

    MSIPackageCodes

    MSI package codes

    {12345678-1234-1234-1234-123456789ABC}

    Root\InventoryDevicePnp
  • Root\InventoryDriverBinary

  • ProgramID

    Program identifier

    00001234567890abcdef

    ProgramName

    Application name

    Google Chrome

    Version

    Application version

    118.0.5993.89

    Publisher

    Software publisher

    Google LLC

    Windows Collections

    AIR supports the following Windows Evidences

    Windows Evidence List

    #

    Evidence (click for details)

    Category

    Parsed

    Sent to the Investigation Hub

    Raw Files Collected

    1

    $Boot

    DiskFilesystem

    No

    Yes

    Yes

    2

    $Log File

    DiskFilesystem

    No

    Yes

    Yes

    3

    $Secure:$SDS

    DiskFilesystem

    No

    Yes

    Yes

    4

    $TxfLog $Tops:$T

    DiskFilesystem

    No

    Yes

    Yes

    5

    ARP Table

    Network

    Yes

    Yes

    No

    6

    AVG Logs

    Applications

    No

    No

    Yes

    7

    Action1 RMM Logs

    Applications

    No

    No

    Yes

    8

    Active Directory Logs

    Applications

    No

    No

    Yes

    9

    AmCache

    System

    Yes

    Yes

    Yes

    10

    AmmyAdmin Logs

    Applications

    No

    No

    Yes

    11

    Antivirus Information

    System

    Yes

    Yes

    No

    12

    AnyDesk Logs

    Applications

    No

    No

    Yes

    13

    Apache Logs

    Applications

    No

    No

    Yes

    14

    AppCompactCache

    System

    Yes

    Yes

    No

    15

    AppPaths

    System

    Yes

    Yes

    No

    16

    Avast Logs

    Applications

    No

    No

    Yes

    17

    Avira Logs

    Applications

    No

    No

    Yes

    18

    Bitdefender Logs

    Applications

    No

    No

    Yes

    19

    Brave Bookmarks

    Applications

    Yes

    Yes

    No

    20

    Brave Browsing History

    Applications

    Yes

    Yes

    No

    21

    Brave Cookies

    Applications

    Yes

    Yes

    No

    22

    Brave Downloads

    Applications

    Yes

    Yes

    No

    23

    Brave Extensions

    Applications

    Yes

    Yes

    No

    24

    Brave Favicons

    Applications

    Yes

    Yes

    No

    25

    Brave Form History

    Applications

    Yes

    Yes

    No

    26

    Brave Local Storage

    Applications

    Yes

    Yes

    No

    27

    Brave Login Data

    Applications

    Yes

    Yes

    No

    28

    Brave Sessions

    Applications

    Yes

    Yes

    No

    29

    Brave Thumbnails

    Applications

    Yes

    Yes

    No

    30

    Brave User Profiles

    Applications

    Yes

    Yes

    No

    31

    Brave Web Storage

    Applications

    Yes

    Yes

    No

    32

    CIDSizeMRU

    System

    Yes

    Yes

    No

    33

    CLR

    System

    No

    Yes

    Yes

    34

    Carbon Black Logs

    Applications

    No

    No

    Yes

    35

    Chrome Bookmarks

    Applications

    Yes

    Yes

    No

    36

    Chrome Browsing History

    Applications

    Yes

    Yes

    No

    37

    Chrome Cookies

    Applications

    Yes

    Yes

    No

    38

    Chrome Downloads

    Applications

    Yes

    Yes

    No

    39

    Chrome Extensions

    Applications

    Yes

    Yes

    No

    40

    Chrome Favicons

    Applications

    Yes

    Yes

    No

    41

    Chrome Form History

    Applications

    Yes

    Yes

    No

    42

    Chrome Local Storage

    Applications

    Yes

    Yes

    No

    43

    Chrome Login Data

    Applications

    Yes

    Yes

    No

    44

    Chrome Sessions

    Applications

    Yes

    Yes

    No

    45

    Chrome Thumbnails

    Applications

    Yes

    Yes

    No

    46

    Chrome User Profiles

    Applications

    Yes

    Yes

    No

    47

    Chrome Web Storage

    Applications

    Yes

    Yes

    No

    48

    Cisco AMP Logs

    Applications

    No

    No

    Yes

    49

    Collect LNK Files

    System

    Yes

    Yes

    Yes

    50

    Collect SRUM Database Files

    System

    No

    No

    Yes

    51

    ComboFix

    Applications

    No

    No

    Yes

    52

    Cortana History

    Applications

    No

    No

    Yes

    53

    Crash Dump Information

    System

    Yes

    Yes

    No

    54

    Cybereason Logs

    Applications

    No

    No

    Yes

    55

    Cylance Logs

    Applications

    No

    No

    Yes

    56

    DHCP Server Logs

    Applications

    No

    No

    Yes

    57

    DNS Cache

    Network

    Yes

    Yes

    No

    58

    DNS Server Logs

    Applications

    No

    No

    Yes

    59

    DNS Servers

    Network

    Yes

    Yes

    No

    60

    Deep Instinct Logs

    Applications

    No

    No

    Yes

    61

    Default Browser

    Applications

    Yes

    Yes

    No

    62

    Discord Desktop Cache

    Applications

    No

    No

    Yes

    63

    Docker Changes

    Applications

    Yes

    Yes

    No

    64

    Docker Container Logs

    Applications

    Yes

    Yes

    No

    65

    Docker Containers

    Applications

    Yes

    Yes

    No

    66

    Docker Image History

    Applications

    Yes

    Yes

    No

    67

    Docker Images

    Applications

    Yes

    Yes

    No

    68

    Docker Info

    Applications

    Yes

    Yes

    No

    69

    Docker Networks

    Applications

    Yes

    Yes

    No

    70

    Docker Processes

    Applications

    Yes

    Yes

    No

    71

    Docker Volumes

    Applications

    Yes

    Yes

    No

    72

    Downloaded Files Information

    System

    Yes

    Yes

    No

    73

    Driver Objects

    System

    Yes

    Yes

    No

    74

    Drivers List

    System

    Yes

    Yes

    No

    75

    Dropbox Cache

    Applications

    No

    No

    Yes

    76

    Dropbox Databases

    Applications

    No

    No

    Yes

    77

    Dropbox Logs

    Applications

    No

    No

    Yes

    78

    Dump Brave Indexed DB

    Applications

    Yes

    Yes

    No

    79

    Dump Chrome Indexed DB

    Applications

    Yes

    Yes

    No

    80

    Dump Edge Indexed DB

    Applications

    Yes

    Yes

    No

    81

    Dump Opera Indexed DB

    Applications

    Yes

    Yes

    No

    82

    Dump QQ Indexed DB

    Applications

    Yes

    Yes

    No

    83

    Dump Vivaldi Indexed DB

    Applications

    Yes

    Yes

    No

    84

    ETL

    System

    No

    Yes

    Yes

    85

    Edge Bookmarks

    Applications

    Yes

    Yes

    No

    86

    Edge Cookies

    Applications

    Yes

    Yes

    No

    87

    Edge Downloads

    Applications

    Yes

    Yes

    No

    88

    Edge Extensions

    Applications

    Yes

    Yes

    No

    89

    Edge Favicons

    Applications

    Yes

    Yes

    No

    90

    Edge Form History

    Applications

    Yes

    Yes

    No

    91

    Edge Local Storage

    Applications

    Yes

    Yes

    No

    92

    Edge Login Data

    Applications

    Yes

    Yes

    No

    93

    Edge Sessions

    Applications

    Yes

    Yes

    No

    94

    Edge Thumbnails

    Applications

    Yes

    Yes

    No

    95

    Edge User Profiles

    Applications

    Yes

    Yes

    No

    96

    Edge Web Storage

    Applications

    Yes

    Yes

    No

    97

    Elastic Logs

    Applications

    No

    No

    Yes

    98

    Environment Variables

    System

    Yes

    Yes

    No

    99

    Eset Logs

    Applications

    No

    No

    Yes

    100

    Event Log EVT Files

    EventLogs

    Yes

    Yes

    No

    101

    Event Log EVT Records

    EventLogs

    Yes

    Yes

    Yes

    102

    Event Log EVTX Files

    EventLogs

    Yes

    Yes

    No

    103

    EventTranscript DB

    System

    Yes

    Yes

    Yes

    104

    Evernote Databases

    Applications

    No

    No

    Yes

    105

    Evernote Drag and Drop Files

    Applications

    No

    No

    Yes

    106

    Evernote Logs

    Applications

    No

    No

    Yes

    107

    Everything History

    Applications

    No

    No

    Yes

    108

    F-Secure Logs

    Applications

    No

    No

    Yes

    109

    Facebook Cache

    Applications

    No

    No

    Yes

    110

    Facebook Databases

    Applications

    No

    No

    Yes

    111

    FileExts

    System

    Yes

    Yes

    No

    112

    FileZilla Sessions

    Applications

    No

    No

    Yes

    113

    FireEye Logs

    Applications

    No

    No

    Yes

    114

    Firefox Browsing History

    Applications

    Yes

    Yes

    No

    115

    Firefox Cookies

    Applications

    Yes

    Yes

    No

    116

    Firefox Downloads

    Applications

    Yes

    Yes

    No

    117

    Firefox Extensions

    Applications

    Yes

    Yes

    No

    118

    Firewall Rules

    Network

    Yes

    Yes

    No

    119

    FirstFolder

    System

    Yes

    Yes

    No

    120

    Github Desktop Cache

    Applications

    No

    No

    Yes

    121

    Github Desktop Databases

    Applications

    No

    No

    Yes

    122

    Github Desktop Logs

    Applications

    No

    No

    Yes

    123

    GoTo Logs

    Applications

    No

    No

    Yes

    124

    Google Drive Databases

    Applications

    No

    No

    Yes

    125

    Hibernation File

    Memory

    No

    Yes

    Yes

    126

    HitmanPro Logs

    Applications

    No

    No

    Yes

    127

    Hosts

    Network

    Yes

    Yes

    Yes

    128

    IE 10,11,Edge Browsing History

    Applications

    Yes

    Yes

    Yes

    129

    IE 7,8,9 Browsing History

    Applications

    Yes

    Yes

    Yes

    130

    IIS Logs

    Applications

    No

    No

    Yes

    131

    INF Setup

    System

    No

    Yes

    Yes

    132

    IPv4 Routes

    Network

    Yes

    Yes

    No

    133

    Iconcache

    System

    No

    Yes

    Yes

    134

    Installed Applications

    System

    Yes

    Yes

    No

    135

    JumpList Automatic Entries

    System

    Yes

    Yes

    No

    136

    JumpList Automatic Files

    System

    Yes

    Yes

    Yes

    137

    JumpList Custom Entries

    System

    Yes

    Yes

    No

    138

    JumpList Custom Files

    System

    Yes

    Yes

    Yes

    139

    Kaseya Logs

    Applications

    No

    No

    Yes

    140

    LastVisitedPidlMRU

    System

    Yes

    Yes

    No

    141

    Level Logs

    Applications

    No

    No

    Yes

    142

    LinkedIn Cache

    Applications

    No

    No

    Yes

    143

    LogMeIn Logs

    Applications

    No

    No

    Yes

    144

    MBR

    DiskFilesystem

    No

    Yes

    Yes

    145

    MFT

    DiskFilesystem

    No

    Yes

    Yes

    146

    MFT Mirror

    DiskFilesystem

    No

    Yes

    Yes

    147

    MFT as CSV

    DiskFilesystem

    Yes

    No

    No

    148

    MSSQL Logs

    Applications

    No

    No

    Yes

    149

    MalwareBytes Logs

    Applications

    No

    No

    Yes

    150

    Map Network Drive MRU

    System

    Yes

    Yes

    No

    151

    McAfee Logs

    Applications

    No

    No

    Yes

    152

    Microsoft Calendar

    Applications

    No

    No

    Yes

    153

    Microsoft Exchange Logs

    Applications

    No

    No

    Yes

    154

    Microsoft Mail

    Applications

    No

    No

    Yes

    155

    Microsoft Maps

    Applications

    No

    No

    Yes

    156

    Microsoft Outlook

    Applications

    No

    No

    Yes

    157

    Microsoft People

    Applications

    No

    No

    Yes

    158

    Microsoft Photos

    Applications

    No

    No

    Yes

    159

    Microsoft Sticky Notes

    Applications

    No

    No

    Yes

    160

    Microsoft Store Applications List

    Applications

    No

    No

    Yes

    161

    Microsoft Voice Record History

    Applications

    No

    No

    Yes

    162

    MongoDB Logs

    Applications

    No

    No

    Yes

    163

    Mozilla Thunderbird

    Applications

    No

    No

    Yes

    164

    NTDS.dit

    System

    No

    Yes

    Yes

    165

    Network Adapters

    Network

    Yes

    Yes

    No

    166

    Network Shares

    Network

    Yes

    Yes

    No

    167

    Notepad++ Sessions

    Applications

    No

    No

    Yes

    168

    Object Directory

    System

    Yes

    Yes

    No

    169

    OfficeMRU

    System

    Yes

    Yes

    No

    170

    Old Registry Hives

    System

    No

    Yes

    Yes

    171

    OneDrive Logs

    Applications

    No

    No

    Yes

    172

    OpenSavePidlMRU

    System

    Yes

    Yes

    No

    173

    OpenVPN Config

    Applications

    No

    No

    Yes

    174

    Opera Bookmarks

    Applications

    Yes

    Yes

    No

    175

    Opera Browsing History

    Applications

    Yes

    Yes

    No

    176

    Opera Cookies

    Applications

    Yes

    Yes

    No

    177

    Opera Downloads

    Applications

    Yes

    Yes

    No

    178

    Opera Extensions

    Applications

    Yes

    Yes

    No

    179

    Opera Favicons

    Applications

    Yes

    Yes

    No

    180

    Opera Form History

    Applications

    Yes

    Yes

    No

    181

    Opera Local Storage

    Applications

    Yes

    Yes

    No

    182

    Opera Login Data

    Applications

    Yes

    Yes

    No

    183

    Opera Sessions

    Applications

    Yes

    Yes

    No

    184

    Opera Thumbnails

    Applications

    Yes

    Yes

    No

    185

    Opera User Profiles

    Applications

    Yes

    Yes

    No

    186

    Opera Web Storage

    Applications

    Yes

    Yes

    No

    187

    PDB Information

    System

    Yes

    Yes

    No

    188

    Page File

    Memory

    No

    Yes

    Yes

    189

    Palo Alto Logs

    Applications

    No

    No

    Yes

    190

    Parse LNK Files

    System

    Yes

    Yes

    No

    191

    Parse SRUM Application Timeline

    System

    No

    Yes

    No

    192

    Parse SRUM Application Usage

    System

    No

    Yes

    No

    193

    Parse SRUM Energy Usage

    System

    No

    Yes

    No

    194

    Parse SRUM Network Connectivity

    System

    No

    Yes

    No

    195

    Parse SRUM Network Usage

    System

    No

    Yes

    No

    196

    Powershell ConsoleHost History

    System

    Yes

    Yes

    No

    197

    Powershell Logs

    System

    No

    Yes

    Yes

    198

    Prefetch Files

    System

    Yes

    Yes

    Yes

    199

    Proxy List

    Network

    Yes

    Yes

    No

    200

    QQ Bookmarks

    Applications

    Yes

    Yes

    No

    201

    QQ Browsing History

    Applications

    Yes

    Yes

    No

    202

    QQ Cookies

    Applications

    Yes

    Yes

    No

    203

    QQ Downloads

    Applications

    Yes

    Yes

    No

    204

    QQ Extensions

    Applications

    Yes

    Yes

    No

    205

    QQ Favicons

    Applications

    Yes

    Yes

    No

    206

    QQ Form History

    Applications

    Yes

    Yes

    No

    207

    QQ Local Storage

    Applications

    Yes

    Yes

    No

    208

    QQ Login Data

    Applications

    Yes

    Yes

    No

    209

    QQ Sessions

    Applications

    Yes

    Yes

    No

    210

    QQ Thumbnails

    Applications

    Yes

    Yes

    No

    211

    QQ User Profiles

    Applications

    Yes

    Yes

    No

    212

    QQ Web Storage

    Applications

    Yes

    Yes

    No

    213

    Quick Assist

    System

    Yes

    Yes

    No

    214

    RAM Image

    Memory

    No

    Yes

    Yes

    215

    RDP Cache

    System

    No

    Yes

    Yes

    216

    RealVNC Logs

    Applications

    No

    No

    Yes

    217

    Recent File Cache

    System

    No

    Yes

    Yes

    218

    RecentDocs

    System

    Yes

    Yes

    No

    219

    Recycle Bin Information

    System

    Yes

    Yes

    No

    220

    Registry Hives

    System

    No

    Yes

    Yes

    221

    Registry Items

    System

    Yes

    Yes

    Yes

    222

    RemComSvc Logs

    Applications

    No

    No

    Yes

    223

    Remote Utilities Logs

    Applications

    No

    No

    Yes

    224

    RogueKiller Reports

    Applications

    No

    No

    Yes

    225

    RunMRU

    System

    Yes

    Yes

    No

    226

    Running Processes and Modules

    System

    Yes

    Yes

    No

    227

    SAM Users and Groups

    System

    Yes

    Yes

    No

    228

    SDB

    System

    No

    Yes

    Yes

    229

    SRUM

    System

    Yes

    Yes

    Yes

    230

    SUPERAntiSpyware Logs

    Applications

    No

    No

    Yes

    231

    Scheduled Tasks

    System

    Yes

    Yes

    Yes

    232

    ScreenConnect (ConnectWise Control) Application Data

    Applications

    No

    No

    Yes

    233

    Search History

    Applications

    No

    No

    Yes

    234

    SentinelOne Logs

    Applications

    No

    No

    Yes

    235

    Service List

    System

    Yes

    Yes

    Yes

    236

    Shadow Copy as CSV

    DiskFilesystem

    Yes

    Yes

    No

    237

    ShellBags

    System

    Yes

    Yes

    No

    238

    ShellFolders

    System

    Yes

    Yes

    No

    239

    Skype Databases

    Applications

    No

    No

    Yes

    240

    Skype Media

    Applications

    No

    No

    Yes

    241

    Sophos Logs

    Applications

    No

    No

    Yes

    242

    Sourcefire FireAMP Logs

    Applications

    No

    No

    Yes

    243

    Splashtop Logs

    Applications

    No

    No

    Yes

    244

    Spotify Cache

    Applications

    No

    No

    Yes

    245

    Spotify Recently Played List

    Applications

    No

    No

    Yes

    246

    Startup Items

    System

    Yes

    Yes

    Yes

    247

    Sublime Text Sessions

    Applications

    No

    No

    Yes

    248

    Superfetch

    System

    No

    Yes

    Yes

    249

    Supremo Remote Desktop Logs

    Applications

    No

    No

    Yes

    250

    Swap File

    Memory

    No

    Yes

    Yes

    251

    Symantec Logs

    Applications

    No

    No

    Yes

    252

    System Restore Points Information

    System

    Yes

    Yes

    No

    253

    TCP Table

    Network

    Yes

    Yes

    No

    254

    Tanium Logs

    Applications

    No

    No

    Yes

    255

    Teamviewer Logs

    Applications

    No

    No

    Yes

    256

    Telegram Desktop Data

    Applications

    No

    No

    Yes

    257

    Telegram Desktop Download

    Applications

    No

    No

    Yes

    258

    Thumbcache

    System

    No

    Yes

    Yes

    259

    TightVNC Logs

    Applications

    No

    No

    Yes

    260

    Tortoise Git Logs

    Applications

    No

    No

    Yes

    261

    TotalAv Logs

    Applications

    No

    No

    Yes

    262

    Trend Micro Logs

    Applications

    No

    No

    Yes

    263

    Twitter Cache

    Applications

    No

    No

    Yes

    264

    Twitter Databases

    Applications

    No

    No

    Yes

    265

    TypedPaths

    System

    Yes

    Yes

    No

    266

    TypedURLs

    System

    Yes

    Yes

    No

    267

    UDP Table

    Network

    Yes

    Yes

    No

    268

    USB Storage History

    DiskFilesystem

    Yes

    Yes

    No

    269

    USN Journal

    DiskFilesystem

    No

    Yes

    Yes

    270

    USN Journal $Max

    DiskFilesystem

    No

    Yes

    Yes

    271

    USN Journal as CSV

    DiskFilesystem

    Yes

    Yes

    No

    272

    UltraVNC Logs

    Applications

    No

    No

    Yes

    273

    Ultraviewer Logs

    Applications

    No

    No

    Yes

    274

    User Access Logs (UAL)

    System

    Yes

    Yes

    Yes

    275

    User Folders

    System

    Yes

    Yes

    No

    276

    UserAssist

    System

    Yes

    Yes

    No

    277

    Users

    System

    Yes

    Yes

    No

    278

    VIPRE Logs

    Applications

    No

    No

    Yes

    279

    VMware Config

    Applications

    No

    No

    Yes

    280

    VMware Drag and Drop Files

    Applications

    No

    No

    Yes

    281

    VMware Logs

    Applications

    No

    No

    Yes

    282

    Visual Studio Team Explorer Config

    Applications

    No

    No

    Yes

    283

    Vivaldi Bookmarks

    Applications

    Yes

    Yes

    No

    284

    Vivaldi Browsing History

    Applications

    Yes

    Yes

    No

    285

    Vivaldi Cookies

    Applications

    Yes

    Yes

    No

    286

    Vivaldi Downloads

    Applications

    Yes

    Yes

    No

    287

    Vivaldi Extensions

    Applications

    Yes

    Yes

    No

    288

    Vivaldi Favicons

    Applications

    Yes

    Yes

    No

    289

    Vivaldi Form History

    Applications

    Yes

    Yes

    No

    290

    Vivaldi Local Storage

    Applications

    Yes

    Yes

    No

    291

    Vivaldi Login Data

    Applications

    Yes

    Yes

    No

    292

    Vivaldi Sessions

    Applications

    Yes

    Yes

    No

    293

    Vivaldi Thumbnails

    Applications

    Yes

    Yes

    No

    294

    Vivaldi User Profiles

    Applications

    Yes

    Yes

    No

    295

    Vivaldi Web Storage

    Applications

    Yes

    Yes

    No

    296

    Volumes Information

    DiskFilesystem

    Yes

    Yes

    No

    297

    WBEM

    System

    No

    Yes

    Yes

    298

    WMI Active Script

    System

    Yes

    Yes

    No

    299

    WMI Command Line

    System

    Yes

    Yes

    No

    300

    WSL

    Applications

    No

    No

    Yes

    301

    Webroot Logs

    Applications

    No

    No

    Yes

    302

    WhatsApp Desktop Cache

    Applications

    No

    No

    Yes

    303

    WhatsApp Desktop Cookie

    Applications

    No

    No

    Yes

    304

    WinRAR History

    Applications

    Yes

    Yes

    No

    305

    Windows Defender Logs

    Applications

    No

    No

    Yes

    306

    Windows Error Reporting Files

    System

    No

    No

    Yes

    307

    Windows Index Search

    System

    No

    Yes

    Yes

    308

    Windows Live Mail User Settings

    Applications

    No

    No

    Yes

    309

    Windows Notification History

    Applications

    No

    No

    Yes

    310

    Windows Timeline

    System

    Yes

    Yes

    Yes

    311

    Wireless Connection History

    Network

    Yes

    Yes

    No

    312

    WordWheelQuery

    System

    Yes

    Yes

    No

    313

    Xeox Logs

    Applications

    No

    No

    Yes

    314

    ZohoAssist Logs

    Applications

    No

    No

    Yes

    315

    Zoom Databases

    Applications

    No

    No

    Yes

    316

    Zoom Media

    Applications

    No

    No

    Yes

    317

    iTunes Backups

    Applications

    No

    No

    Yes