Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
AIR is an Automated Investigation and Response platform offering the most comprehensive feature set for remotely acquiring 698 types of digital evidence in just minutes.
This Knowledge Base will guide you through all the features of AIR.
What is AIR?TerminologyArchitectureNetwork CommunicationCloud ForensicsAutomated Investigation and Response platform
AIR is an Automated Investigation and Response platform that delivers deep forensic visibility and end-to-end investigation capabilities at speed.
AIR combines the rapid remote acquisition of 737 evidence types with intelligent, efficiency-driven automation to drastically reduce investigation time, simplify workflows, and empower SOC and incident responders with accurate, collaborative insights, thereby boosting long-term cyber resilience.
AIR further accelerates investigations through DRONE—a powerful suite of integrated analyzers that automatically assess collected evidence. DRONE's findings across multiple assets are consolidated and visualized in a single pane of glass: the AIR Investigation Hub.
AIR will perform simultaneous hunt and triage on thousands of assets using YARA, Sigma, and osquery rules.
AIR protects employee privacy with targeted collections when required. It also captures the 'forensic state' of multiple assets and presents this information in an Investigation Hub.
The Investigation Hub serves as an all-encompassing, user-friendly DFIR intelligence resource. This unifying Investigation Hub consolidates Acquisition and Hunt/Triage data from all assets, presenting it in an easily digestible format. It also integrates DRONE analyzer findings through intuitive graphical visualizations, thereby identifying the most critical machines that warrant further immediate, focused investigation or remediation. The Investigation Hub streamlines the investigative process by:
Providing actionable findings to prioritize and guide investigators,
Offering comprehensive listings of all evidential artifacts,
Including a range of advanced filtering options, and
Featuring a powerful global search capability.
The AIR platform integrates with your existing SIEM, SOAR solutions, and many EDR products. This is done via Webhooks and an open API that empowers analysts to automate the response phase of IR.
So, all forensic collections can be scheduled, automated, remote, and scalable.
With evidence hashing, AES256 encryption, and RFC3161 time-stamping, the Chain of Custody for evidence handling by AIR is completely secure.
Other key features include our patent-pending Baseline Comparison technology. This allows you to be more proactive and focused in the way you target your efforts. Here, you can compare acquisitions against one another and easily identify additions, changes, and deletions to key system areas often exploited by attackers.
AIR helps you cut through the noise of security data with live YARA, Sigma, and osquery scanning combined with rapid keyword searching, automated post-acquisition analysis, and Event Scoring.
These features all combine to enable most digital forensics investigations to be concluded in less than 4 hours - which is a dramatic improvement over what is commonly achieved today with other solutions.
Our mission is to deliver solutions that reduce incident response investigation times through unparalleled forensic-level visibility, automation, speed, and collaboration at scale.
You can view our support terms and conditions here.

AIR setup instructions
The Killswitch is a powerful administrative control available under Settings > Danger Zone in the AIR Console. It allows Global Admins to immediately cancel all currently running cancellable tasks across the entire platform, without needing to select individual assets or tasks.
To safeguard against accidental activation, a case-sensitive confirmation is required. You must, before the operation can proceed. Type the exact phrase:Cancel All Tasks
Note: This action cannot be reversed.
Only tasks that are in a cancellable state will be affected.
Use this feature carefully, particularly during large-scale investigations or scheduled operations.
Updating the AIR console
Chrome 90+
In AIR, the Global Admin has full control over managing 109 specific privileges, allowing the creation of highly customized user roles. This granular access control ensures that each user or group has permissions tailored to their specific needs, such as handling evidence acquisition, interACT sessions, or audit log management.
A useful feature within this setup is the tooltips provided alongside each privilege. These tooltips highlight any dependencies that may exist between privileges, helping administrators configure roles accurately without unintentionally restricting necessary functions.
For example, an admin could create a role that enables a user to access interACT for remote evidence collection while restricting access to audit logs or system-wide settings. The tooltips ensure that admins are aware of any required privileges to avoid misconfigurations.
This approach provides both flexibility and clarity, empowering admins to manage user roles effectively.
Relay Server serves these metrics produced by Prometheus from a Unix socket.
To retrieve metrics from the Relay Server's Unix socket, you can use the curl command to make a request to the following endpoint: http://localhost/metrics on the Unix socket /var/run/Binalyze.AIR.Relay.sock. Here's an example command:
sudo curl --unix-socket /var/run/Binalyze.AIR.Relay.sock http://localhost/metricsExecuting this command will provide you with a response containing various metrics related to the Relay Server. The response will include information such as the number of active connections, request duration, request errors, reload count, and more.
Please note that you need to run this command on the same system where the Relay Server is running, as it communicates via the Unix socket.
Here's a sample response:
# HELP air_relay_info Information about the Relay Server environment.
# TYPE air_relay_info gauge
air_relay_info{arch="aarch64", build_time="2023-06-14T07:22:01", commit="f064c83645e1901d421714b8bd1dbec274425551", goarch="arm64", goos="linux", hostname="halilonay.ubuntu", os="Ubuntu 22.04.2 LTS (Jammy Jellyfish)", version="2.23.0"} 1
# HELP air_relay_proxy_active_connections Number of active connections to the Relay Server.
# TYPE air_relay_proxy_active_connections gauge
air_relay_proxy_active_connections 0
# HELP air_relay_proxy_request_duration_seconds Duration of each request handled by the Relay Server.
# TYPE air_relay_proxy_request_duration_seconds histogram
air_relay_proxy_request_duration_seconds_bucket{le="0.005"} 0
air_relay_proxy_request_duration_seconds_bucket{le="0.01"} 0
air_relay_proxy_request_duration_seconds_bucket{le="0.025"} 0
air_relay_proxy_request_duration_seconds_bucket{le="0.05"} 0
air_relay_proxy_request_duration_seconds_bucket{le="0.1"} 0
air_relay_proxy_request_duration_seconds_bucket{le="0.25"} 1
air_relay_proxy_request_duration_seconds_bucket{le="0.5"} 1
air_relay_proxy_request_duration_seconds_bucket{le="1"} 1
air_relay_proxy_request_duration_seconds_bucket{le="2.5"} 1
air_relay_proxy_request_duration_seconds_bucket{le="5"} 1
air_relay_proxy_request_duration_seconds_bucket{le="10"} 1
air_relay_proxy_request_duration_seconds_bucket{le="+Inf"} 1
air_relay_proxy_request_duration_seconds_sum 0.149310392
air_relay_proxy_request_duration_seconds_count 1
# HELP air_relay_proxy_request_errors_total Total number of request errors encountered by the Relay Server.
# TYPE air_relay_proxy_request_errors_total counter
air_relay_proxy_request_errors_total 1
# HELP air_relay_proxy_requests_total Total number of requests received by the Relay Server.
# TYPE air_relay_proxy_requests_total counter
air_relay_proxy_requests_total 1
# HELP air_relay_reload_count Number of times the Relay Server has been reloaded.
# TYPE air_relay_reload_count counter
air_relay_reload_count 0
# ...These metrics provide insights into the Relay Server's performance, resource utilization, and various other statistics related to its operations.
In today's dynamic digital environment, managing tasks efficiently within a software system is crucial for reliability, flexibility, and optimal performance. This guide explores a sophisticated task management system designed to handle a wide range of operational scenarios, focusing on task retrieval, execution, prioritization, and system resilience against failures and network disruptions.
The AIR platform features an intuitive web-based console designed to orchestrate and dispatch tasks to designated remote AIR responders effectively. Serving as the nerve center for task allocation, this console guarantees that each task is accurately assigned for execution, optimizing operational efficiency. Within this ecosystem, assigning a specific task to a particular asset is termed a 'task assignment,' ensuring a clear, one-to-one correspondence between tasks and assets for precise management and tracking.
To accommodate diverse operational needs and customer network policies, the system employs two primary mechanisms for task checking:
Regular Interval Checks: Tasks are checked at predefined intervals, which can be dynamically adjusted based on the system's current configuration and operational demands.
The NATS Protocol: For immediate task fetching or near real-time communications with assets, the system incorporates a specialized protocol named "NATS." This protocol is designed to bypass the standard checking intervals, allowing for urgent tasks to be retrieved and executed with minimal delay
AIR does not use TLS for NATS traffic because no sensitive data is transmitted over it. NATS is only used to send a lightweight “ping” message when the AIR Console assigns a task to a Responder. After receiving this signal, the Responder immediately connects back to the AIR Console over HTTPS (port 443) to securely download the full task details
Task Checking Intervals
Task-checking intervals are not static; they vary dynamically from seconds to hours, influenced by the system's configuration. This flexibility ensures the system can adapt to changing workloads and priorities efficiently.
Certain tasks, such as "cancel tasks," receive priority in the execution queue. This prioritization is crucial to prevent delays in the cancellation process, ensuring tasks are halted promptly when required.
The system employs a first-in, first-out (FIFO) queue model for task execution. This model ensures that tasks are processed in the order received, with special consideration given to tasks that might block or delay subsequent operations unnecessarily.
If a Tasking Assignment has been collected by the Responder but is interrupted before the completion of collection, triage, or analysis, the task will not resume where it left off. Instead, this interruption will result in a task failure. Such failures are automatically recorded within the console's tasking details.
When this occurs, the status of the task in the AIR console will reflect the failure, and it will be necessary to manually restart or initiate a new task to ensure that the intended data collection and analysis are completed. This approach ensures clarity and accuracy in managing task assignments, even in cases of unexpected interruptions.
For tasks that require file uploads, such as uploading to an evidence repository, the system includes built-in retry mechanisms. These mechanisms are activated to re-attempt uploads if network issues interrupt the process. The number of retries and the specific procedures for handling these retries vary depending on the task type and the destination of the file.
Additionally, if "direct collection" is enabled for an acquisition task and a failure occurs, the user must restart the acquisition process from the beginning. This ensures that all necessary data is properly collected without partial or corrupt files.
A specialized "purge local" task type exists for efficiently cleaning up local data related to completed or failed tasks. This function is crucial for maintaining optimal disk space utilization and efficient system resource allocation.
This guide emphasizes the importance of a flexible system that can adapt to diverse customer policies, including specific network configurations and security requirements. The choice of protocols and mechanisms for task management is influenced by these diverse operational needs.
Continuous improvement is a cornerstone of system development. The commitment to updating documentation reflects ongoing efforts to refine task management processes and system functionalities based on operational insights and technical advancements.
The guide offers an in-depth examination of the system's technical underpinnings, including the utilization of the "NATS" protocol, dynamic adjustment of task-checking intervals, and the logic behind task prioritization and queue management. These details offer a comprehensive understanding of the system's operational logic and its capability to handle various scenarios efficiently.
Efficient task management is pivotal in ensuring the reliability and performance of software systems. Through innovative mechanisms, such as the air console and NATS protocol, alongside dynamic task-checking intervals and a robust FIFO queue model, the system outlined in this guide represents a state-of-the-art solution for managing tasks in complex software environments. The emphasis on flexibility, resilience, and continuous improvement underscores the system's readiness to meet the evolving demands of modern digital operations.
To add the proxy configuration to Relay Server, you can modify the /etc/profile file by following these steps:
Open a terminal or command line session.
Open the /etc/profile file in your favorite editor with administrative privileges:
sudo vim /etc/profileScroll to the end of the file and add the following lines:
Alternatively, you can use the following method to set proxy settings, but be aware that it will impact the proxy behavior of other programs.
Save the changes and exit the text editor.
To apply the changes, restart your system:
By adding these lines to the /etc/profile file, the specified proxy settings will be exported as environment variables.
Like the responder, the Relay Server has the capability to proxy connections through a proxy server when communicating with responders or AIR Console. This provides flexibility in terms of configuring proxies for the responder, which connects through a Relay Server, or setting a proxy specifically for the Relay Server. Additionally, it is also possible to set proxies for both the responder and the Relay Server simultaneously. The diagram below illustrates all the possibilities for proxying the Relay Server and the responder.
Before deploying a new asset through Relay Server, you need to choose the IP address of the Relay Server to which the endpoints will connect. This chosen IP address will serve as the connection route for the assets that will be routed through this Relay Server.
You can change the address of the Relay Server by accessing the "Relay Server Details" section, which can be found in the "Organization Detail" page.
Investigators and analysts can use the AIR platform to conduct investigations on machines located in cloud platforms. Our platform supports cloud-based virtual machines, as well as on-premise and off-network devices. Investigators and analysts can install responders on virtual machines located on the cloud infrastructure for investigations and analysis. Amazon Web Services and Microsoft Azure are both supported.
We understand the unique challenges of investigating cloud-based attacks, such as Business Email Compromise (BEC). That’s why we have introduced the Tornado preview version, a standalone desktop application designed to simplify evidence collection from Google Workspace and Microsoft Office 365. Learn all about Tornado .
Investigators and analysts can easily and quickly deploy responders to their cloud assets and immediately initiate investigations, compromise assessments, and threat-hunting activities. By leveraging the automation advantages of cloud platforms, users can easily deploy multiple responders using a single authorized cloud platform account.
After adding the authorized account to the Console, it enumerates the cloud platform to discover and list assets. Then, investigators and analysts can deploy responders to individual or multiple cloud assets with one click.
AIR Relay Server is a specialized SOCKS5 proxy server specifically designed to facilitate communication between AIR responders and the AIR console. Its primary function is to act as an intermediary, enabling the seamless proxying of connections between the responders and the console.
With Relay Server, you can enhance the security of both responders and the console by only granting access via the Relay Server, eliminating the requirement for direct access to the AIR console from the responder environment.
This indirect access approach adds an extra layer of protection to the overall system architecture.
To run the Relay Server correctly, the responder must be running to manage tasks received from the AIR Console. Any modification or removal of these requirements will cause the Relay Server to fail to operate.
If responders attempting to connect through the Relay Server cannot establish a connection, they will fallback to a direct connection. Alternatively, if a proxy connection is configured, they will fallback to using the proxy for the connection.
If connections through the Relay Server are experiencing failures, you can try resolving the issue by restarting the service using the following systemctl command:
This command will initiate a restart of the Relay Server service, which may help in resolving any connectivity issues.
Modifying the config file manually can introduce several problems, particularly due to the YAML format. Therefore, if you intend to make changes to the config file, such as adding whitelist addresses, it is crucial to adhere to the correct YAML format.
Ensure that you follow the YAML syntax rules while making any alterations to the config file. This includes correctly indenting elements, using appropriate punctuation, and maintaining the structure specified by the YAML format.
Relay Server logs all incoming connections and other operational activities for the purpose of troubleshooting and investigating any failures. To access these logs, you can retrieve by clicking on "Log Retrieval" on the "Relay Server Details" page.
To ensure a successful installation of Relay Server, it is necessary to have a Linux operating system based on either Debian or Redhat, with a minimum kernel version of 3.9.0. This requirement guarantees compatibility and optimal performance.
The Relay Server functionality in an AIR deployment is not automatically available for all users. This feature's availability is contingent upon specific license configurations.
Users considering the installation and configuration of a Relay Server should liaise with their AIR installation advisor as part of the setup process.
Currently, the supported versions for Relay Server are as follows:
Policies serve to define how evidence is collected and managed, providing fine-grained control over resources and processes.
Policies in AIR provide central configuration management and support global configurations that can be overridden at the Organisation level when required.
This overriding is only possible when the user has the “Override Policy” privilege allocated to their role.
Data acquisition is the collection of forensically sound data from any computer system (disk, external storage, memory, etc.). This data generally varies based on the operating system installed on the computer or server. Acquired data often needs to be parsed, stored, and presented in a human-readable format for further analysis and investigation.
Data acquisition is the primary activity of most digital investigations. Before data acquisition, the investigators generally identify the data they’ll need. Since data or evidence is an essential element of any investigation, investigators tend to take as much as they can in the first instance to avoid, if possible, a second acquisition. Therefore, the power of the digital investigation and DFIR solution is often proportional to the acquisition capability and the features associated with it.
AIR provides easy-to-deploy and fast data acquisition capabilities with a wide range of operating systems supported for the collection of 600+ forensically sound data types. AIR provides remote data acquisition for on-premise, cloud, and off-network devices. Thus, investigators can remotely investigate multiple devices at speed and scale.
AIR supports a growing number of operating systems, including Windows, Linux, macOS, ChromeOS, ESXi, and IBM AIX.
The results of AIR's Acquisition and Hunt/Triage processes can be further analyzed using DRONE's automated Post Acquisition Analyzers. DRONE's findings, along with all collected artifacts, are then presented within the Investigation Hub.
The AIR responder needs to be deployed first to acquire data. All data acquisition is performed according to the Data Acquisition Profile created before the acquisition is started.
Operating Systems that are supported by the responder
The AIR responder can be installed on Microsoft Windows, Linux, and Apple macOS operating systems. All supported operating systems and associated versions are listed below.
To update Relay Server, you can initiate an update task for the Relay Server from the AIR Console.
Follow these steps from AIR Console:
Locate the Relay Server from the “Organization Detail” page.
Select the relay server and click “Update” button from “Relay Server Details” page.
By running the update task from the AIR Console, the Relay Server installed on the asset and the responder itself will be updated to the latest version.
Similarly, if you wish to uninstall Relay Server from an asset, you can click to red button next to the “Update” in “Relay Server Details” page from AIR Console. This will remove Relay Server and responder from the system.
As Relay Server operates as a service/daemon managed by systemd, you can utilize the following systemctl commands to start, stop, restart and reload the service:
To start the service:
To stop the service:
To restart the service:
Fast, remote, and scalable across the corporate network
macOS 10.15
macOS 11.0
macOS 12.0
macOS 13.0
Considerations for Relay Server Setup:
Public IP Requirement:
The need for a public IP address for the Relay Server depends on its intended use and positioning.
If the Relay Server is set up for internet-facing properties, a public IP address or a Fully Qualified Domain Name (FQDN) might be required.
For a Relay Server intended for internal network entities, a public IP address is not necessary.
Use Case for Managed Security Service Providers (MSSPs):
In scenarios where the Relay Server is used by MSSPs for external entities, it is likely that a public IP or FQDN will be needed.
Debian 7 and above
RHEL (Red Hat Enterprise Linux) 7 and above
CentOS 7 and above
Fedora 21 and above
Ubuntu 14.04 and above
Pardus 17 and above
Please note that this list may be subject to updates, and you can always refer to the download page and click on "See Supported Versions" for the most up-to-date information on supported systems.
Additionally, for Relay Server to function properly, a responder must be installed and registered. The responder acts as the intermediary between the Relay Server and the AIR Console, which serves as the management interface for controlling Relay Server's operations. The seamless interaction between the responder and AIR Console facilitates efficient management of the Relay Server's functionalities.
As of now, the Relay Server’s default listening port, 1080, cannot be changed and the AIR responders will always try to connect to port 1080 if they are configured to use a relay server.
Evidence Storage: Configures where evidence is stored—either locally (default paths: Binalyze\AIR\ on Windows, /opt/binalyze/air/ on Linux/macOS) or in defined repositories like SMB or SFTP.
Resource Limits: Controls CPU usage, bandwidth, and disk space during collection to prevent resource overuse. You can specify CPU limits (e.g., 100%) and restrict bandwidth and disk space.
Compression & Encryption: Enables optional compression and encryption of the collected evidence, with a password for added security.
Scan Scope: You can opt to restrict scans to local drives only, excluding network and external drives.
Isolation Settings: Policies can include an IP/Port and ‘process allow’ lists for isolation tasks, which ensures that specific communication channels remain open during an asset’s isolation.
When creating a policy for a specific investigation, you could configure it to save evidence in an AWS S3 bucket, limit the CPU to 50%, compress the evidence for efficient storage, and ensure network drives are excluded from the scan. You could also configure the policy to allow communication with critical servers even if the asset is isolated.
Data acquisition is classified into three categories: Evidence, Artifacts, and Network Capture. Additionally, investigators have the flexibility to create custom content profiles, allowing them to collect specific files or data from designated locations.
At Binalyze, we recognize the critical importance of maintaining a strong 'chain of custody' when it comes to the collection and handling of evidence. That's why we employ SHA-256 hashing in combination with RFC3161 digital timestamp certificates. This approach serves to safeguard data content and offers assurance regarding the precise timestamp of the content's creation, as well as a guarantee that it has remained unaltered.
Read more about RFC3161 and the secure way AIR maintains a strong chain of custody here: Protect Your Chain Of Custody With Content Hashing And Timestamping
This collector gathers structured data about brave extensions.
Action1 RMM is a remote monitoring and management platform that maintains logs of agent activities, remote commands, patch deployments, and system monitoring events.
This collector gathers structured data about action1 rmm logs.
This collector gathers Action1 log files from the Windows directory containing RMM agent activity and command execution records.
Action1 logs help investigate RMM-based attacks, identify executed commands, track software deployments, and reveal potential abuse of management tools for malicious purposes.
Avast Antivirus maintains comprehensive logs of malware detections, real-time shield activities, scan results, and quarantine operations. The Chest is Avast's quarantine area where suspected files are isolated, with index.xml tracking quarantined items.
This collector gathers structured data about avast logs.
This collector gathers Avast log files from Application Data and ProgramData directories across different Windows versions, plus the Chest index file that catalogs quarantined threats.
Avast logs provide critical evidence of malware detections, security threats, user actions, and system protection events. The Chest index reveals quarantined files that may indicate successful attack prevention or ongoing compromise attempts.
macOS 14.0
macOS 15.0
macOS 26.0
AVG Antivirus is a popular security solution that logs malware detections, scan activities, quarantine actions, and threat analysis. These logs are stored in dedicated log and report directories within the application data folders.
This collector gathers structured data about avg logs.
This collector gathers AVG log files and scan reports from both legacy Application Data directories and current ProgramData locations, including detection logs and scan reports.
AVG logs are valuable for identifying detected malware, understanding threat timelines, correlating infections with system activities, and verifying security response actions. They can reveal attempted attacks, quarantined files, and the system's security posture over time.
Active Directory NTDS directory contains the AD database and transaction logs. This is the core directory service database that stores user accounts, groups, computers, and organizational structure for Windows domains.
This collector gathers structured data about active directory logs.
This collector gathers files from the Windows NTDS directory, including the Active Directory database (ntds.dit) and associated transaction logs.
Active Directory data is essential for investigating credential theft, privilege escalation, unauthorized access, account manipulation, and domain compromise. The NTDS.dit database contains password hashes and is a high-value target for attackers.
Avira Antivirus records malware detections, system scans, real-time protection events, and update activities in its LOGFILES directory. These logs provide detailed information about security events and antivirus operations.
This collector gathers structured data about avira logs.
This collector gathers all log files from the Avira Antivirus LOGFILES directory located in ProgramData, which contains comprehensive antivirus activity records.
Avira logs are essential for tracking malware detections, analyzing security incidents, understanding system exposure to threats, and verifying antivirus effectiveness. They help establish timelines of security events and identify potential compromises.
Since different cloud platforms utilize distinct identity and access management infrastructures and employ different working mechanisms, their requirements may vary; however, ultimately, all we need is an authorized account with list and control permissions on cloud assets.
Investigators and analysts can add a cloud account to the Console by using the Assets page:
From the Main menu, select Assets
Click Add New and click Cloud Account
Then click the Add Account button according to the cloud platform you want to add on the appearing Cloud Platforms window
The configurations that need to be performed according to the cloud platforms are listed below.
Either of the two methods mentioned above will redirect investigators and analysts to similar pages, allowing them to enter their account details. They can either enter their existing account details, which are given below, or use the cloud formation link provided by AIR to create a new account with enough permissions.
Cloud account needs the following permissions to deploy virtual machines AIR responder.
The creation of an AWS Account with sufficient permissions flow is explained below.
Click on the URL and Create an Account
Open AWS Console -> IAM -> Users
Select the User -> Security Credentials -> Create Access Key
Fill out the Account Details Form
Either two different ways mentioned above will redirect investigators and analysts to similar pages allowing them to enter account details. They can either enter their existing account details, which are given below or create a new account with enough permissions.
Cloud accounts need the following permissions to deploy the virtual machine responder.
The creation of an Azure Account with sufficient permissions flow is explained below.
Azure portal -> App Registrations -> New Registration
Assign required roles to the new app registration for the subscription
App Registrations -> Open the created App Registration
Certificates & Secrets -> Create a new client secret
Fill out the Account Details Form
Coming soon
The Console immediately starts to enumerate the cloud platform and retrieves the assets list and asset details after the cloud account is added. It discovers the assets depending on the permissions and authorizations of the cloud accounts. All discovered assets will be shown under the Amazon AWS category under the associated organization.
The assets and their details are shown on the right side of the Secondary Menu in the Assets page as a list. Assets in which the AIR responder is deployed are shown in blue, and the assets in which the AIR responder is not deployed are shown in grey in that list.
All deployment actions are considered tasks by the AIR Console and listed under the Tasks as responder Deployment tasks. Therefore, all responder deployment actions and their status can be seen on the Tasks list.
The primary advantage of responder deployment in a cloud platform is automation. Analysts and investigators don't need to choose the operating systems and their versions. They only assign deployment tasks to the associated devices, and all deployment processes are performed quicker and easier automatically.
Investigators and analysts can deploy responders to cloud assets by using the Endpoint page:
From Assets in the Main Menu: All cloud assets are listed here in the Secondary Menu. Investigators and analysts can search, filter and see the details of the assets on this page.
Investigators and analysts can deploy the responders individually, with multiple selections or all of them with one click.
Individual deploy: Click the assets and then click the Deploy button
Multiple selections: Select the assets in the list by clicking a checkbox at the beginning of the asset line. Then Actions button immediately appears at the top of the page. Click Deploy Responder the under the Actions menu.
Deploy to All Assets: Click the three-dot on the right side of the Amazon AWS or Tag, which includes associated cloud assets. Then click Deploy Responder




The Account Settings section in AIR allows users to manage personal preferences and session details. This section is accessible via the user icon located in the top-right corner of the AIR interface toolbar.
View Account Details: Includes your registered name, surname, email address, and username.
Change Password: Locally authenticated users can update their password directly from here.
Sign Out: Securely log out of your AIR session.
Customize Theme Preferences: Switch between Light and Dark Mode or set the UI to follow system time-based settings.
The AIR interface supports a Dark Mode UI theme, providing a modern, eye-friendly visual style that is ideal for use in low-light conditions or during extended periods of use. This feature:
Enhances usability and reduces eye strain.
Can be toggled manually between Light and Dark modes.
Includes an Auto mode that adapts the UI based on your machine's time zone and daylight saving hours, ensuring a seamless experience.
Dark Mode aligns with current UI standards and user expectations, supporting a comfortable and productive working environment.
Users can upload their own profile images. These will be displayed across the AIR console UI in user-facing areas, such as the user menu, case history, and activity logs. Supported for both regular and SSO-authenticated users, although not synced from the identity provider.
This page summarizes the capabilities and current limitations of Responder for Organization Units (OUs) within an Active Directory (AD) environment.
Key Points:
Current Capability:
Once Active Directory integration is complete, the AIR will display the domain on the Assets page.
Users can filter assets by clicking on their Organization Unit on the Assets page. Further filtering for "Managed Status in Managed" will show assets where the Responder is installed.
Limitations and Requests:
As of now, AIR does not support querying or installing Responders directly at specific OU levels (e.g., SecurityTesting.AIR.local) beyond the root AD level (e.g., AIR.local).
A feature request has been submitted to allow integration directly at the OU level to enhance targeted management within the domain structure.
Installation Note:
The AIR Responder will report on systems where it is installed. It does not automatically install on systems within an AD environment where it is not already installed.
Conclusion: Efforts to extend AIR's integration capabilities to specific OUs are ongoing, following feedback and feature requests. This enhancement aims to provide more granular control and efficiency in managing cybersecurity operations across different organizational units.
Windows 7 SP1 (with latest updates)
Windows 8
Windows 8.1
Windows 10
Windows 11
Windows Server 2008 R2 (with latest updates)
Windows Server 2012
Windows Server 2012 R2
Windows Server 2016
Windows Server 2019
Windows Server 2022
Windows Server 2025
Centos 7
Centos 8
Centos 9
Fedora 21
Fedora 22
Fedora 24
Fedora 26
Fedora 34
Fedora 36
Amazon Linux 1 Latest
Amazon Linux 2 Latest
Redhat 7
Redhat 8
Redhat 9
Pardus 17
Pardus 21
Rockylinux 9
Rockylinux 8
Debian 7
Debian 8
Debian 10
Debian 11
Debian 12
Ubuntu 12.04
Ubuntu 14.04
Ubuntu 16.04
Ubuntu 18.04
Ubuntu 20.04
Ubuntu 22.10
Ubuntu 23.04
Ubuntu 24.04
Boss Linux 7
Boss Linux 8
Boss Linux 9
Boss Linux 10
All Linux distros can run on 32/64 bit and ARM64 architectures.
C:\ProgramData\.binalyze-air\ or %ProgramData%\.binalyze-air\*
The AIR Watchdog Folder (C:\ProgramData\.binalyze-air\ or %ProgramData%\.binalyze-air\) is a critical directory used by the AIR responder for storing internal data required to maintain and monitor the health and proper functioning of the AIR responder agent. This folder contains temporary files, logs, and configuration data that help the Watchdog component of the AIR platform ensure that the responder agent is running correctly and automatically restarts the agent if any issues arise.
Health Monitoring: The Watchdog monitors the responder agent's status. If the agent stops unexpectedly or malfunctions, the Watchdog uses this folder to store diagnostic data and trigger the necessary actions (e.g., restarting the agent).
Temporary Storage: The folder stores temporary files used by the AIR responder during its forensic and investigative processes. These may include logs, process monitoring data, or execution-related files.
Configuration Data: The directory can also house configuration and state files that help the agent track its operational state, ensuring that it maintains continuity of processes even in the event of interruptions.
When configuring EDR (Endpoint Detection and Response) or AV (Antivirus) software, it is essential to exclude this folder from being scanned or interfered with. Failure to do so may cause unnecessary alerts or interruptions to the operations of the AIR responder, potentially halting the forensic collection process or causing data collection to fail.
Absolute Path:
C:\ProgramData\.binalyze-air\*
This is the standard path used by the AIR Watchdog on Windows systems.
Environment Variable Path:
%ProgramData%\.binalyze-air\*
This variation uses the %ProgramData% environment variable, which points to the C:\ProgramData\ folder. It's a more dynamic way of referencing the same location in different system configurations.
For AIR to function seamlessly, especially during critical incident response tasks, excluding this folder from AV/EDR scans or interference is vital. The Watchdog service ensures that the responder remains operational and recovers automatically if disrupted.
To ensure uninterrupted operation, follow these allow-listing rules in your security setup:
Windows AV/EDR Systems: Allow-list the folder C:\ProgramData\.binalyze-air\*
Linux/macOS Equivalents: Similar watchdog components may exist in those environments within paths like /usr/share/.binalyze-air/ or /opt/binalyze/air/agent/ (adjust based on OS).
By allowing the Watchdog folder, you ensure AIR remains resilient and responsive, even in the event of unexpected issues.
This feature empowers users to manage Investigation Hub data storage effectively and is fully explained here: Investigation Hub – Data Usage Statistics Dashboard.
Evidence: Bitdefender Logs Description: Collect Bitdefender Logs Category: Applications Platform: windows Short Name: btfndrls Is Parsed: No Sent to Investigation Hub: No Collect File(s): Yes
Bitdefender is an enterprise-grade security solution that maintains detailed logs of endpoint protection, firewall activities, malware detections, and system events. Logs include XML-formatted system events, firewall logs, and database files containing threat intelligence.
This collector gathers structured data about bitdefender logs.
This collector gathers Bitdefender logs from multiple locations including Endpoint Security logs, Desktop profile logs, system XML files, firewall logs, and database files containing security event data.
Bitdefender logs are critical for investigating security incidents, tracking malware detections, analyzing firewall blocks, and understanding endpoint protection events. They provide comprehensive visibility into threats, network traffic controls, and security posture over time.
Evidence: Apache Logs Description: Collect Apache Logs Category: Applications Platform: windows Short Name: apcl Is Parsed: No Sent to Investigation Hub: No Collect File(s): Yes
Apache HTTP Server and Tomcat logs record web server activity including access logs, error logs, and application-specific logs. These logs are critical for understanding web server operations and detecting web-based attacks.
This collector gathers structured data about apache logs.
This collector gathers Apache and Tomcat log files from standard installation directories in Program Files, collecting access logs, error logs, and other server activity logs.
Apache logs are essential for detecting web attacks, unauthorized access attempts, data exfiltration, and command injection. They reveal attacker IP addresses, requested URLs, user agents, and exploitation attempts against web applications.
Evidence: AnyDesk Logs Description: Collect AnyDesk Logs Category: Applications Platform: windows Short Name: nydskl Is Parsed: No Sent to Investigation Hub: No Collect File(s): Yes
AnyDesk is a widely-used remote desktop application frequently leveraged by both legitimate users and threat actors. It stores trace logs, configuration files, connection traces, and recorded sessions. The software is commonly abused for initial access and persistence in cyber attacks.
This collector gathers structured data about anydesk logs.
This collector gathers AnyDesk trace files, configuration files, connection trace logs, and recorded session files from user and system directories.
AnyDesk artifacts are critical for investigating unauthorized remote access, as the tool is frequently used in ransomware attacks, tech support scams, and remote access trojans. Logs reveal connection IDs, session times, file transfers, and can link to specific AnyDesk addresses used by attackers.
export AIR_HTTP_PROXY=proxy.example.com:3128
export AIR_HTTPS_PROXY=proxy.example.com:4128
export AIR_NO_PROXY=localhost,127.0.0.0/8,::1export HTTP_PROXY=proxy.example.com:3128
export HTTPS_PROXY=proxy.example.com:4128
export NO_PROXY=localhost,127.0.0.0/8,::1sudo rebootThis careful handling of the shutdown process helps maintain the integrity of the ongoing communications and ensures that all necessary cleanup and termination procedures are executed properly. However, it is important to note that the actual duration may vary based on the number of connected endpoints and the complexity of the ongoing communications.
Relay Server provides support for reloading its configuration file without the need to restart the service. You can accomplish this by executing the following systemctl command:
By running this command, any changes made to the Relay Server's configuration file will be applied without requiring a full restart of the service. This allows you to update the configuration manually and have the new settings take effect immediately.
sudo systemctl start Binalyze.AIR.Relay.servicesudo systemctl stop Binalyze.AIR.Relay.servicesudo systemctl restart Binalyze.AIR.Relay.servicesudo systemctl reload Binalyze.AIR.Relay.serviceAlternatively, you can refer to the following files located in the Relay Server directory:
/opt/binalyze/air/relay/air_relay.log.txt
/opt/binalyze/air/relay/air_relay.process.log.txt
These log files contain valuable information that can assist in diagnosing issues, identifying errors, and understanding the overall behavior of the Relay Server. By reviewing the logs, you can gain insights into the operations and events occurring within the Relay Server environment.
Multiple options can be selected.
sudo systemctl restart Binalyze.AIR.Relay.serviceA brief overview of system architecture
AIR is an on-premise or cloud-based, client-server solution that allows you to remotely perform various tasks on assets such as collecting forensic evidence and performing threat hunts with YARA, Sigma, or osquery.
Management Console is a web-based application that can be viewed from any device with an up-to-date browser.
Assets are connected to the management console via a lightweight "passive" responder that can be deployed manually or via other mechanisms such as SCCM.
2.1. Passive Responder Explained
AIR responders;
DO NOT scan anything on the asset that may cause slowdowns (e.g. your Antivirus),
DO NOT block anything on the asset that may cause false positives (e.g. your DLP),
DO NOT create any alerts that may cause "alert fatigue".
A note on Cloud Infrastructure
All of the web services and API backends listed above are hosted on Microsoft Azure preferably in East/West US Datacenters and protected by Cloudflare.
To ensure proper installation of the Relay Server, the responder must be installed and registered within the same organization and on the same system. If you plan to install the responder beforehand, you should select a direct connection as the Relay Server will be located on the same system.
From the "Organizations" page, when you create a new organization or select an existing one, it will bring you to a page where you can deploy a new Relay Server.
By clicking "New Relay", a deployment page brings up for the Relay Server:
As you can see, there are packages available based on Debian or Redhat distributions. You can select either the 64-bit or ARM64 version by clicking the arrow next to the "Download" button.
Once the package is downloaded, you will need to configure the environment settings for the Relay Server to register with the AIR Console. To simplify this process, you can easily copy the necessary commands by clicking the "copy" button located in the right corner of the command.
export AIR_DEPLOYMENT_TOKEN=dce4e59125c545a2
sudo -E dpkg -i ./binalyze-air-relay-server_2.22.0_*.debAfter copying the commands, open a terminal and navigate to the directory where you have downloaded the package. If the directory is "Downloads" in your home folder, you can go to that folder by executing the following commands in the terminal:
As part of the Relay Server installation process, it performs a check to verify the availability of the responder. Additionally, it configures the responder to manage the newly installed Relay Server.
Upon successful installation, you will be able to view your newly deployed Relay Server on the "Organization Detail" page.
When deploying a new responder to an asset, you will encounter a configuration option that allows you to choose a connection route. This allows you to deploy a responder that either directly connects to the AIR Console or utilizes a connection route via a Relay Server.
By selecting the "Relay Server Connection" radio button, you will be presented with a list of registered Relay Servers associated with this organization. From this list, select one option and proceed with the configuration.
The subsequent steps remain the same as when deploying a new responder, regardless of the connection route chosen (Relay Server). Once you have successfully installed a new asset using the Relay Server connection, you will observe the newly deployed asset associated with the Relay Server on the "Organization Detail" page.
After selecting the installed Relay Server from the list on the "Organization Detail" page, you can access your associated assets by clicking on the "Assets" tab. Additionally, you can view comprehensive details of your Relay Server on this page by clicking on the "Information" tab.
Furthermore, you can view and manage assets that are connected through this Relay Server. To modify the connection routing of your assets, navigate to the "Assets" tab. Simply select the asset that you would like to view or edit.
Within the "Connection Route" setting, you have the option to choose between a direct connection to the AIR Console or selecting another Relay Server for your asset to connect to. This action will bring up the same settings page for connection routing that you encountered when deploying a new asset.
To update the connection route addresses for multiple assets in the same organization, follow these steps:
Go to the organization's page (the organization where you want to update the assets) or the Assets page.
Selected the desired assets within the same organization.
Edit the connection route by selecting the icon at the end of the connection route row.
Modify the connection route addresses or choose a Direct connection.
By following these steps, you can easily update the connection route addresses for multiple assets in the same organization.
To manually update the connection route of your responder, you can run the responder with the "configure" flag. Follow these steps:
Open a Terminal.
Navigate to the directory where the responder is located.
Run the configure command as shown below:
Upon running the configuration command, the responder service will automatically restart with the updated configuration, including the new connection route that has been set. This ensures that the responder incorporates the changes and operates according to the new configuration.
Relay Server is designed to facilitate communication between the AIR Console and the responder. As a result, Relay Server carefully examines all connection attempts to ensure they are directed towards AIR Console and blocks any connection requests to other destinations. This strict enforcement guarantees that only connections to AIR Console are permitted, thereby providing a secure environment and ensuring that no undesired connections to other addresses occur.
To enable connections to addresses other than the AIR Console, a configuration called "Whitelist" is utilized. By specifying addresses or IP/FQDN patterns in the whitelist, the Relay Server allows communication between clients and the whitelisted addresses. In such cases, the Relay Server acts as a proxy between the client and the whitelisted address, ensuring seamless communication while still maintaining the necessary security measures.
To add or modify the whitelist in the configuration file, you can follow these steps:
Locate the config.yml file: /opt/binalyze/air/relay/config.yml
If the Whitelist field is not present in the file, add it as a YAML array in the following format:
In the Whitelist array, you can include various elements such as IP addresses, fully qualified domain names (FQDNs), FQDNs with wildcards, CIDR notations, IP ranges, or use an asterisk (*) to allow all connections.
The Whitelist elements support the following formats:
IP address: Enter the specific IP address.
FQDN: Provide the fully qualified domain name.
FQDN with wildcard: Use an asterisk (*) as a wildcard character in the domain name.
CIDR: Specify the IP range using CIDR notation.
FQDN addresses that have been added to the whitelist are not resolved to IP addresses. Therefore, destinations using IP addresses without FQDN will be denied. Relay Server only resolves IP addresses of Console Address in the configuration file.
By configuring the whitelist, you can specify the allowed addresses or domains that Relay Server will permit connections to.
After modifying the config file for Relay Server, it is essential to reload the configuration if Relay Server is already running. To accomplish this, you can use the following systemctl command:
Enable secure connections between AIR Console and users/assets by using SSL encryption.
Certificate: This displays the SSL certificate details used by AIR for secure HTTPS communication. In this case, the certificate is issued by Let's Encrypt (Issuer: Let's Encrypt, Common Name: R3) and is valid for a specific period (e.g., from 2022.09.18 to 2022.12.17).
Subject: The Common Name (CN) field shows the domain (e.g., air-demo.ACME.com) to which the certificate applies.
Having an SSL certificate ensures that all communications between users and the AIR Console are encrypted, preventing unauthorized access to sensitive information.
Acts as the root certificate authority (CA) for issuing certificates if a custom SSL certificate is not provided.
AIR generates an SSL Root CA for each instance when a custom certificate isn’t supplied. This certificate is used to create secure communication channels within the system.
Issuer and Subject: Both are BINALYZE R1, ensuring that the root certificate is tied to the Binalyze platform.
Validity: The root CA certificate is valid from 2017.10.14 until 2100.10.14, ensuring long-term use and security.
Define the port over which the AIR Console is accessible.
The AIR Console is configured to be accessed on port 8443, which is a secure port typically used for HTTPS traffic.
Meanwhile, responders will continue to communicate with the console over the default secure port 443. This setup ensures that assets and users can access the platform via separate but secure ports, enhancing security and flexibility.
Restrict access to the AIR Console based on IP addresses.
This feature allows administrators to restrict access to the AIR Console to a specific range of IP addresses, limiting who can interact with the console.
Important: This restriction does not affect communication between the AIR Console and the assets themselves. It only controls who can access the console’s user interface.
The current IP address of the user accessing the system (e.g., 172.71.122.69) is displayed for reference.
Configure user authentication security settings.
You can enforce Two-Factor Authentication (2FA) for all users, adding an extra layer of security by requiring a second form of verification (e.g., a mobile app code) when logging in. (SSO will override this option)
This setting enhances overall security by ensuring that only authenticated and verified users can access the system.
Enable and configure Single Sign-On (SSO) for AIR.
SSO allows users to log in to AIR using their organization’s existing identity provider (e.g., Azure AD, Okta) without needing separate credentials. This simplifies the login process and enhances security by centralizing authentication management.
Tenant ID and Client ID: These are provided by the SSO identity provider (e.g., Azure, Okta) and uniquely identify the organization’s SSO configuration.
Client Secret: A secure key used for authenticating the connection between AIR and the SSO provider (shown as encrypted in the system).
SSO improves user management and security by centralizing login credentials with your existing identity provider, simplifying the user experience while ensuring strong authentication practices.
AIR Responder Operation in Windows Safe Mode
AIR Responder is now capable of functioning in Safe Mode, allowing forensic acquisition and remote tasking on machines operating in a restricted state. However, to maintain full functionality and allow task execution via the AIR Console, specific registry modifications must be applied before entering Safe Mode.
Before booting into Safe Mode, execute the following Registry modifications to register the AIR Agent Service:
REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\Binalyze.AIR.Agent.Service" /VE /T REG_SZ /D "Service" /F
REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Binalyze.AIR.Agent.Service" /VE /T REG_SZ /D "Service" /F
These registry changes can also be enforced via the Windows UI by running msconfig to get to the System Configuration window where in the Boot tab, the user can select Safe Boot with the Network button active:
These registry entries ensure the AIR Agent Service is recognized and loaded in Safe Mode.
Safe Mode with Networking
If a machine enters Safe Mode with Networking, the AIR Agent will continue operating as expected, maintaining communication with the AIR Console.
Safe Mode (Without Networking)
The AIR Agent cannot communicate with the console if networking is unavailable unless an off-network package is used for forensic acquisitions.
Remote Task Execution
Without the registry modifications, the AIR Console cannot issue remote tasks to the endpoint in Safe Mode.
Adding the registry keys before booting into Safe Mode ensures that Responder and interACT remain functional.
If the registry modifications are not applied and the AIR Agent does not load, users can manually execute AIR.exe after entering Safe Mode to establish a temporary connection.
However, this approach is not recommended due to potential inconsistencies and administrative overhead.
By proactively applying the recommended registry changes, organizations can ensure seamless forensic investigations even when endpoints are booted in Safe Mode.
Allow-listing is required for AIR responders to run acquisition tools, write temporary artifacts, and access protected areas of the file system. Without explicit exclusions in your Endpoint Protection Platform (EPP), Endpoint Detection and Response (EDR), or antivirus solution, these routine activities can trigger false positives and interrupt evidence collection.
Use the tables below to add the recommended folder and binary exclusions for each supported operating system. Choose the entries that match your deployment to keep responders running without false positives.
C:\Program Files (x86)\Binalyze\AIR\agent\
C:\ProgramData\.binalyze-air
C:\Program Files (x86)\Binalyze\AIR\agent\AIR.exe
C:\Program Files (x86)\Binalyze\AIR\agent\DRONE.exe
C:\Program Files (x86)\Binalyze\AIR\agent\TACTICAL.exe
/opt/binalyze/air/agent/
/usr/share/.binalyze-air/
/opt/binalyze/air/agent/air
/opt/binalyze/air/agent/drone
/opt/binalyze/air/agent/tactical
/opt/binalyze/air/agent/
/usr/local/share/.binalyze-air/
/opt/binalyze/air/agent/air
/opt/binalyze/air/agent/drone
/opt/binalyze/air/agent/tactical
AIR allows you to set up various Evidence Repositories for storing and managing collected data securely. The supported repository types are:
SMB: Ideal for sharing files across network devices.
SFTP: Utilizes SSH for encrypted data transfer.
FTPS: Combines FTP with SSL/TLS for secure transfers.
Amazon S3: Provides scalable cloud-based storage, perfect for large-scale investigations.
Global or Organization-Level Setup: Repositories can be defined at both global and organizational levels, providing flexibility in evidence management across multiple AIR instances or within a single organization.
Secure Data Management: Protocols like SFTP and FTPS ensure that data transfers are encrypted, safeguarding sensitive information during uploads and downloads.
Automatic and Manual Uploads: Evidence can be automatically uploaded to repositories based on configured tasks, or users can manually upload files as needed.
This setup ensures secure, scalable, and efficient management of evidence within AIR, accommodating various infrastructure needs.
Explore our comprehensive resource at docs.binalyze.com.
The AIR API facilitates seamless communication with the AIR console, enabling users to collect information or execute tasks with precision and efficiency.
We provide sample requests in various programming languages, including Go, Python, and Java, as well as sample cURL requests to equip users with comprehensive integration resources. These samples serve as practical guides, showcasing the seamless implementation of our API functionalities across different development environments.
To access detailed documentation and unlock the full potential of our API, we invite developers to explore our comprehensive resource at docs.binalyze.com. Here, you can find in-depth explanations, tutorials, and reference materials that guide you through the integration process seamlessly.
Our API documentation, which includes detailed endpoint descriptions, authentication guidelines, and practical code examples, offers invaluable insights for developers at every stage. Leverage the power of our API at docs.binalyze.com to empower your development journey and unlock new possibilities.
API Token Management supports role-based access control (RBAC), which enhances security and flexibility while reducing the need for excessive permissions.
Global Admins can only create and modify API tokens.
Granular Permissions: Tokens inherit only the privileges of their assigned role (e.g., read-only or custom roles), preventing over-permissioning.
Post-Creation Role Updates: Token permissions can be modified after creation, allowing for dynamic access control.
Governance & Security:
API token management in AIR has role-based limitations, allowing API usage to be tailored according to the selected role. This capability refines automation workflows and strengthens access control policies.
Evidence: ARP Table Description: Collect ARP Table Category: Network Platform: windows Short Name: arpt Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No
The ARP (Address Resolution Protocol) table maps IP addresses to physical MAC addresses on the local network. Windows maintains this cache for performance, storing recent IP-to-MAC mappings from network communication.
ARP cache can reveal devices the system has recently communicated with on the local network, including routers, file servers, and other workstations.
This collector gathers structured data about arp table.
This collector uses Windows API to enumerate ARP cache:
GetIpNetTable to retrieve all ARP entries
Parses MAC addresses into readable format
Records adapter associations
ARP entry types: Other (1), Invalid (2), Dynamic (3), Static (4).
ARP cache reveals local network communication patterns. Investigators use this data to identify devices on the local network, detect ARP spoofing attacks, track lateral movement targets, identify network infrastructure devices, correlate with network connections, and detect man-in-the-middle attacks.
Evidence: Brave Thumbnails Description: Collect Brave Thumbnails Category: Applications Platform: windows Short Name: bthmb Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No
Browser thumbnails are cached preview images of visited websites. This visual data supplements browsing history by providing screenshots of accessed pages, useful for recovering deleted history and identifying visited content.
This collector gathers structured data about brave thumbnails.
This collector extracts cached thumbnail images from browser storage.
Thumbnail analysis provides visual evidence of visited websites, can recover evidence after history deletion, and helps identify phishing pages, malicious sites, or sensitive internal resources accessed by users through visual inspection.
All console settings can be accessed via the gear icon in the top-right corner of the header bar. This page provides a complete guide to configuring and managing settings across AIR, including:
General Settings: Platform-wide configurations.
Assets: Managing asset inventories.
Security: Setting up security features.
Features: Customizing AIR’s core functionalities.
Evidence Repositories: Configuring storage for collected evidence.
Policies: Defining evidence collection rules.
User Management:
Users
Groups
UserRoles
Backup and Backup History: Managing backups and retention schedules.
Investigation Hub Disk Usage: Empowers users to manage Investigation Hub data storage effectively.
Danger Zone.
Each section ensures optimal setup for your AIR environment.
Evidence: $Secure:$SDS Description: Dump Contents of $Secure:$SDS Category: DiskFilesystem Platform: windows Short Name: securesds Is Parsed: No Sent to Investigation Hub: Yes Collect File(s): Yes
The $Secure file contains security descriptors for all files and directories on the NTFS volume. These descriptors include access control lists (ACLs), ownership information, and audit settings. The $SDS alternate data stream stores the actual security descriptor data, which is referenced by file entries to avoid duplication.
This collector gathers structured data about $secure:$sds.
This collector uses kernel driver NTFS raw access to read $Secure:$SDS from each fixed NTFS drive.
Security descriptors provide critical information about file permissions, ownership, and access control. This data can reveal unauthorized access, privilege escalation attempts, and security policy violations. Essential for investigating insider threats and understanding who had access to sensitive files.
Evidence: WMI Active Script Description: Dump WMI Active Script Event Consumers Category: System Platform: windows Short Name: wmiasc Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No
WMI ActiveScript Event Consumers execute VBScript or JScript code when specific WMI events occur. This is a powerful persistence mechanism that allows attackers to run arbitrary scripts with SYSTEM privileges in response to system events.
ActiveScript consumers are particularly dangerous because they don't require a file on disk (fileless persistence) and run with high privileges.
This collector gathers structured data about wmi active script.
This collector queries WMI for ActiveScriptEventConsumer instances in multiple namespaces:
ROOT\Subscription
ROOT\DEFAULT
ROOT\CIMV2
ActiveScript consumers are a common advanced persistence technique. Investigators use this data to detect WMI script-based persistence, identify malicious VBScript/JScript payloads, and track fileless malware techniques.
The AIR Backup feature allows users to back up system data securely and flexibly through the UI or Command Line Interface (CLI). Backups can be stored locally, on SFTP, or in Amazon S3, and encrypted using AES256 with a password.
Backups can be performed immediately or scheduled at intervals of every 4 hours, daily, weekly, or monthly. Users can set the number of backups to retain and the scheduled start time. CLI backup options are available, with detailed instructions in the Knowledge Base.
This page displays the Backup History available to the AIR console.
AIR backup files use a structured naming format that embeds timestamp and version information directly into the .abf filename. This makes it easy to identify when a backup was created and which internal backup schema and AIR console version were used.
Date Component: 25-11-17
25 = Year (2025)
11 = Month
17 = Day
Time Component: 6-6-0-026
Represents the exact creation time of the backup:
6 = Hour
6 = Minute
0 = Second
026 = Millisecond
Backup File Format Version: v4
Indicates the internal backup schema/version used by AIR. This ensures compatibility between console versions and the expected backup structure.
AIR Console Version: AIRv5.5.1
Shows which AIR version generated the backup.
File Extension: .abf
AIR Backup File.
~25-11-17_6-6-0-026_v4_AIRv5.5.1.abf means the backup was created on 17 November 2025 at 06:06:00.026, using the v4 backup format, from an AIR 5.5.1 console.
How do assets communicate with the console?
Relay Server Pro is a fundamental architectural evolution in secure relay operations for Binalyze AIR. It replaces the legacy SOCKS5-based relay server with a fully authenticated HTTPS proxy that implements JWT-based two-step verification for Responders connecting through constrained or segmented networks.
This section enables administrators to view existing users and their attributes. It also allows for the addition of new users to the AIR platform, where key details such as name, organization, role, and login credentials are specified during setup.
For organizations needing to onboard multiple users simultaneously, the Import Users button provides bulk user import capability via CSV file upload or email list. Optional metadata such as organization, role, or group can be included for automatic assignment. A preview step allows validation before changes are applied, expediting onboarding for large enterprise security operations teams while reducing human error and maintaining consistent access structures.
Mandatory fields are marked with an asterisk (*).
In AIR (Settings > Security > Authentication), two-factor authentication (2FA) is a security feature designed to enhance user account protection by requiring two forms of verification when logging in. This adds an additional layer of security beyond the traditional username and password combination, significantly reducing the risk of unauthorized access.
Some key points about 2FA in AIR:
LDAP User Compatibility with 2FA: AIR supports two-factor authentication (2FA) for LDAP users. You can easily configure 2FA directly from the account settings within AIR, making the setup process straightforward and efficient for centralized user management systems.
Administrators can enforce two-factor authentication (2FA) for all users. This uniform security policy enhances overall security by requiring all users to authenticate with an additional method, such as a one-time password (OTP) sent to a mobile device or generated by an authenticator app.
APIs and webhooks both serve as methods for integrating systems and enabling communication between applications, but they are suited for different use cases. In many scenarios, using APIs is recommended over webhooks due to the control, flexibility, and broader operational capabilities they offer.
These pages categorize the supported evidence and artifacts by OS, indicating whether each item is parsed and presented in the Investigation Hub and/or if the associated file is collected.
The table below provides a count of the currently supported evidence and artefact items
1- Click evidence collection for Chrome
The AIR responder standalone collector currently provides support for execution on Chrome v90+ operating systems.
AIR For Chrome is the evidence collector extension for Chrome and ChromeOS. AIR For Chrome extension allows investigators and analysts to capture forensically sound data with a single click at machine speed. All data is collected into a well-organized HTML report that is accompanied by individual CSV files. Investigators and analysts can use AIR For Chrome Extension to collect forensically sound data from Google Chrome and ChromeOS.
AIR For Chrome is the fastest and easiest way of capturing forensically sound data from Google Chrome browsers. The forensically sound data collected by AIR For Chrome are listed below.
Browser History
In AIR a Golden Image is for customers who want to use the same Operating System image files to generate new machines with a responder already installed. As AIR use the computer name/hostname of the machine/asset as a unique identifier for the machine/asset, customers cannot use the exact same image in which AIR Responder is already installed without newly introduced golden image support.
It basically cleans some configuration options set during registration and then disables and stops the Responder service before the image of the operating system is taken. To do this, we use `--prepare-golden-image' flag that is explained below. This must be called before the imaging process takes place.
After the image is prepared, the user must use --init-golden-image flag, which is explained below before the image is used to create a new instance.
The user must use this flag before creating a golden image.
https://air-demo.ACME.com/api/auth/sso/azure/callback) . It ensures that users are logged into the AIR platform after authenticating through the identity provider.Entry Point and Issuer: These fields are also part of the SSO configuration, ensuring that AIR communicates correctly with the identity provider.
Certificate: Uploading a certificate from the identity provider is necessary for secure communication between AIR and the SSO service.
C:\ProgramData\.binalyze-air\WATCHDOG.exeC:\Program Files (x86)\Binalyze\AIR\agent\utils\curl.exe
C:\Program Files (x86)\Binalyze\AIR\agent\utils\osqueryi.exe
/opt/binalyze/air/agent/utils/osqueryi/opt/binalyze/air/agent/utils/curl
/usr/share/.binalyze-air/watchdog
/opt/binalyze/air/agent/utils/osqueryi/opt/binalyze/air/agent/utils/curl
/usr/share/.binalyze-air/watchdog
Connection Settings: When configuring repositories, users must provide essential connection details such as credentials, encryption options, and repository paths. For cloud-based storage like Amazon S3, you also need to configure bucket settings.
The role assigned to a token and its creator cannot be deleted unless the token is reassigned or removed.
This enhances audibility and compliance with the principle of least privilege.
Unlike the previous relay server, Relay Server Pro is deployed independently of the Responder, reducing the overall attack surface and aligning with modern zero-trust and least-privilege design principles. Configuration and registration are managed centrally through the AIR Console, ensuring that only validated relays are permitted to handle Responder communications.
Each connection between a Responder and Relay Server Pro is authenticated, logged, and validated, providing end-to-end integrity and accountability for all command and evidence transfers. For DFIR teams, Relay Server Pro ensures traceable, secure intermediary communications across segmented environments and enhances AIR deployments in organizations that enforce strict network isolation or operate within zero-trust architectures.
The legacy relay server was originally designed for use in local networks and did not include an authentication mechanism to securely verify or authorize connecting Responders. This design, while effective in controlled environments, created several limitations:
No built-in authentication to verify connecting Responders
Tight coupling with Responder created dependencies on the Responder's release cycle for updates
Limited flexibility for enterprise network configurations
Reduced security in zero-trust or heavily segmented environments
Relay Server Pro addresses these limitations by introducing secure, credential-based authentication and architectural independence.
Built-in authentication tied directly to the Responder's Console registration credentials
JWT-based two-step verification ensures only trusted Responders can connect
Authenticated connections with full logging and validation for every communication
Reduced attack surface through deployment separation from endpoint agents
HTTPS Proxy Connect support out of the box for reliable communication through enterprise firewalls
Custom port configuration to meet enterprise security requirements
Proxy all TCP connections for comprehensive relay capabilities
URL-based addressing format for more precise configuration
Independence from Responder - no longer dependent on Responder installation, updates, or release cycle
Standalone operation allows faster updates and greater scalability
Modernized JSON logging accessible only from local administration, eliminating remote exposure risks
Caching support for large downloads to improve performance
Relay Server Pro has been engineered with extensibility in mind, enabling Binalyze to incorporate additional customer requirements and enhancements without significant architectural rework.
Relay Server Pro delivers:
Secure authentication using credentials already registered to the Console
Protocol modernization via HTTPS Proxy Connect for enterprise environments
Operational flexibility with custom ports and independent updates
Enhanced accountability with comprehensive JSON audit logging
Zero-trust readiness for organizations with strict network segmentation
The legacy relay server will be deprecated in a future release. Both versions will run in parallel during the transition period.
During AIR 5.4 and subsequent versions:
Both Relay Server Pro and the legacy relay server are supported in parallel
Users are encouraged to begin migrating configurations to Relay Server Pro
The deprecation timeline for the old relay server will be communicated in a future release
Organizations should plan to transition to Relay Server Pro to take advantage of:
Enhanced security features and authentication
Independent update cycles
Modern logging and accountability
Better support for zero-trust architectures
Relay Server Pro is ideal for:
Segmented networks requiring authenticated relay communications
Zero-trust environments enforcing strict network isolation policies
Enterprise deployments with complex firewall and proxy configurations
DFIR operations requiring traceable and auditable network intermediary communications
Organizations needing independent relay update cycles
Relay Server Pro strengthens the security posture of AIR deployments by authenticating every Responder connection, modernizing relay communication, and decoupling relay operations from Responder releases — setting a new standard for secure, scalable relay communication in DFIR environments.
Windows Security Center tracks registered antivirus and antispyware products. Security software registers itself with Security Center to report its status to Windows.
This information helps investigators understand the security posture of the system and whether adequate protection was present during an incident.
This collector gathers structured data about antivirus information.
AntiVirus
Comma-separated list of AV products
Windows Defender,McAfee Endpoint Security
This evidence is collected as part of the System collector by querying WMI:
ROOT\SecurityCenter - For Windows XP (AntiVirusProduct, AntiSpywareProduct)
ROOT\SecurityCenter2 - For Windows Vista+ (AntiVirusProduct, AntiSpywareProduct)
Queries both AntiVirusProduct and AntiSpywareProduct classes and extracts DisplayName.
Antivirus information helps assess security posture and detection capabilities. Investigators use this data to verify security software presence, identify detection gaps, correlate with malware infections, assess why threats weren't detected, and validate security controls.
With webhooks in AIR, you can only trigger acquisitions. However, APIs allow you to access and perform far more operations, making them the preferred method for extensive system interactions and automation.
API (Application Programming Interface): APIs enable clients to request data from the server as needed actively. This provides greater control over when and how data is retrieved. If your application requires data on demand or in real-time (e.g., when a user requests information), APIs are more suitable, as they enable the retrieval of data as needed.
Webhook: Webhooks rely on the server to push data to the client based on predefined events. The client passively waits for updates, which may result in missed data if the client is not ready or the webhook fails.
API: APIs are generally more reliable because they operate within a request-response cycle. If a request fails, the client can handle errors, retry the request, or log the issue. This gives greater control over failure management.
Webhook: Webhooks can be unreliable in environments with unstable real-time connectivity. If a webhook fails (e.g., the client is offline or the endpoint is inaccessible), it relies on the server’s retry mechanisms, which may not always be reliable.
API: APIs typically have strong security measures, such as API keys or OAuth for authentication. They enable fine-grained access control, allowing for the definition of specific scopes and permissions.
Webhook: Webhooks can also be secured, but they often provide less granular control over who can receive the data. Webhooks rely on callbacks, making them more vulnerable to attacks such as man-in-the-middle or endpoint spoofing.
APIs offer more flexibility, allowing clients to request exactly the data they need. Clients can filter, sort, or customize responses according to their specific requirements. This level of optimization is key to efficient data handling.
Webhooks push predefined data with limited flexibility. If only part of the data is required, webhooks may send unnecessary information, resulting in inefficiencies.
While APIs can lead to over-polling, modern APIs include optimizations such as caching or using long-polling methods (like GraphQL) to retrieve only the necessary data. This makes APIs scalable for large applications.
Webhooks eliminate polling by pushing real-time updates. However, frequent triggers across many users can become resource-intensive and difficult to manage.
Webhooks are ideal for real-time updates when the client doesn’t want to poll the server frequently. They work well in event-driven systems that require instant notifications, such as payment alerts or status updates.
API: For use cases where real-time updates are not critical, or when the client needs precise control over when to retrieve data, APIs offer a better solution. For instance, querying data based on user actions or scheduling retrievals at specific intervals.
On-Demand Requests: APIs are better when the client needs to control when and how often data is requested.
Error Handling: APIs offer more effective mechanisms for managing errors, thereby ensuring reliable data integration.
Security: APIs typically offer more robust and customizable security features.
Custom Data Needs: APIs give more flexibility for retrieving specific or customized data.
Scalability: APIs can be more efficient for large-scale systems that require avoiding constant event-triggered updates.
Real-Time Notifications: Webhooks are well-suited for event-driven systems that require immediate updates, making polling an inefficient approach.
Low-Frequency, Event-Driven Integrations: For infrequent events, webhooks minimize unnecessary API calls.
In many cases, combining both webhooks and APIs provides the best solution. Webhooks can handle real-time notifications, while APIs can be used to fetch additional data or control access when necessary.
In AIR, for instance, while webhooks enable you to perform acquisitions, APIs allow for a wider range of operations, making them more versatile for comprehensive incident response and investigation workflows.
AMMYY Admin (AmmyAdmin) is a remote desktop application that has been used both legitimately and by threat actors. The software maintains logs of remote connections and sessions.
This collector gathers structured data about ammyadmin logs.
This collector gathers log files from the AMMYY ProgramData directory containing connection history and activity records.
AmmyAdmin logs are important for investigations as the software has been used by scammers and threat actors for unauthorized access. Logs reveal remote connection attempts, session times, and can identify malicious use of the tool.
Windows:
"C:\Program Files (x86)\Binalyze\AIR\agent\AIR.exe" configure --prepare-golden-image
Linux/macOS:
/opt/binalyze/air/agent/air configure --prepare-golden-image
This flag does the following:
Stops the service.
Disables the service.
Cleans the RegisteredTo, SecurityToken, and EndpointID fields in the config.yml.
Uninstalls the watchdog (if tamper detection was enabled)
This flag activates the Responder again after the golden image is up and after the hostname is changed.
Windows:
"C:\Program Files (x86)\Binalyze\AIR\agent\AIR.exe" configure --init-golden-image --deployment-token 769aca0ff45a433a --console-address air-qa.binalyze.com --organization-id 0
Linux/macOS:
/opt/binalyze/air/agent/air configure --init-golden-image --deployment-token 769aca0ff45a433a --console-address air-qa.binalyze.com --organization-id 0
Note: The use of --deployment-token is required. Because the deployment token is clean after the registration of the AIR Responder. The use of --console-address and --organization-id is optional. They are used to overwrite the console address and organization id which are already set in the configuration file at the first installation before the image was taken.
This flag does the following:
Updates the DeploymentToken, ConsoleAddress, and OrganizationID values entered as a command in the config.yml.
Starts the service.
Enables the service.
Watchdog is installed automatically after registration if it is enabled by AIR Console.
Exit code other than 0 (zero) means an error occurred while executing commands. The terminal will print the error messages, and also log file will contain the error messages.
If something goes wrong first option is to re-run the same command.
If a re-run of the command doesn’t succeed, the user should perform the same steps manually.
PhysicalAddress
MAC address
00:50:56:C0:00:08
IPAddress
IP address
192.168.1.1
Adapter
Network adapter index
12
Type
Entry type
4 (Static)
Title
Title
Example value
Profile
Profile
Example value
Path
Path
Example value
UserName
User Name
Example value
Browser
Browser
Example value
URL
URL
Example value
URLRank
URL Rank
123
FileSize
File size in bytes
10485760
Type
File type
SecureSDS
Name
File name
$Secure:$SDS
SourcePath
Original path
C:$Secure:$SDS
FilePath
Path in evidence
NTFSFiles/$Secure_$SDS
Name
Consumer name
MaliciousConsumer
PayloadScriptEngine
Scripting engine
VBScript
PayloadScriptText
Script code
Set objShell = CreateObject("WScript.Shell")...



Linux
170
IBM AIX
15
ESXi
35
Grand Total
741
Collection Platform:
Item Count
Windows
313
macOS
208






IP range: Indicate the range of IP addresses using a hyphen (-) between the start and end IP addresses.
Whitelist:
- testpage.com
- test.binalyze.com
- 10.5.2.1
- *.google.com
- 10.2.5.1/24
- 10.2.5.3-10.2.5.16$ cd ~/Downloads $ export AIR_DEPLOYMENT_TOKEN=dce4e59125c545a2 $ sudo -E dpkg -i ./binalyze-air-relay-server_2.22.0_arm64.deb
(Reading database ... 244560 files and directories currently installed.) Preparing to unpack binalyze-air-relay-server_2.22.0_arm64.deb ...
Trying to send SIGHUP to processes
Trying to lock for single instance
Locked for single instance remove service in progress
remove service OK
Unpacking binalyze-air-relay-server (2.22.0) over (2.22.0) ... Setting up binalyze-air-relay-server (2.22.0) ...
Failed to acquire lock. An instance of the AIR responder is running. Trying to stop the service...
Checking lock if it is still held...
Lock is held. AIR responder is not running
AIR responder service started
Completed
Relay service is configured successfully
AIR Relay successfully read and set environment variables.
Trying to lock for single instance
Locked for single instance
add service in progress
add service OK
AIR Relay is installed.$ cd /opt/binalyze/air/responder $ sudo ./air configure relay --address 192.168.1.XX
Failed to acquire lock. An instance of the AIR responder is running. Trying to stop the service...
Checking lock if it is still held...
Lock is held. AIR responder is not running
AIR responder service started
Completed $ cat config.yml | grep ConnectionRouteAddress
ConnectionRouteAddress: 192.168.1.XXsudo systemctl reload Binalyze.AIR.Relay.service~25-11-17_6-6-0-026_v4_AIRv5.5.1.abfFIS USAGE STATS
FEATURE FLAGS
USAGE ANALYTICS
This domain is used by AIR Server instances to
Collect case activity & Organization ID metrics for FIS License charges/billing.
Feature flag service to enable/disable features on AIR.
Analytics to analyse usage statistics.
UPDATE
This domain is a container registry for AIR Server instances to update server components like the application server images, database images, caching server images etc.
FIS USAGE STATS:
OrganizationID’s, Case Id, License Key, CaseEventType, CaseEventTime, endpoint Id, Task Id
i.e.: "logId": 764149386100000, "type": "endpointTaskAddedToCaseEvent", "publishedDate": "2022-06-03T10:22:18.610Z", "data": { "caseId": "C-2022-0028", "endpointId": "2b2ea7b0-be61-445c-b735-ac1a9a39e448", "taskAssignmentId": "2b1d5b2c-72ac-4828-9a82-b3510ce9fd5a" }, "license": "LICENSE-KEY"
FEATURE FLAGS: License Key
USAGE ANALYTICS: Amplitude event structure
FEATURE FLAGS: Feature flag states
USAGE ANALYTICS: N/A
N/A
Binary Packages
UPDATE
This domain is used by AIR Server instances to check if there is any new version to update.
LICENSE
This domain is used by AIR Server instances to check the licence information
TIMESTAMP
This domain is used by AIR Server for RFC 3161 features which requires integration with a timestamp server.
UPDATE
N/A
Version Information
License Key
License Status Details
Hash of PPC
Ref: [AIR] Timestamp PPC Files RFC-3161
RFC-3161 Timestamp Token
N/A
This domain is used by AIR Server instances to update artefacts like MITRE Attack Rules , docker compose files, update scripts, offline installer packages.
Packages
HTTPS (TCP 443) – The main communication channel from assets to the console (e.g., yourcompany.binalyze.io).
WebSocket over HTTPS (TCP 443) – Used for interACT features.
NATS (TCP 4222) (Optional) – Supports real-time task pushes to assets. If this port is unavailable, AIR defaults to HTTP(S) polling for task retrieval.
DNS (UDP/TCP 53) – Required for name resolution services.
HTTPS to responder.cdn.binalyze.com – Used for responder updates and installation packages. If the CDN is unavailable, the AIR console acts as a fallback source.
Cloud Storage: HTTPS communication to services like Amazon S3 and Azure.
Traditional Storage: Supported via SFTP, FTPS, or SMB.
If a proxy is configured in your environment, assets can communicate using:
HTTP
HTTPS
SOCKS5
The console installer automatically adds inbound allow rules for the required ports in the Windows Firewall.
The responder installer does not modify firewall settings. You must ensure that enterprise firewall policies allow assets to communicate with the console over the required ports.
The AIR user interface (UI) requires access to the following domains:
Domain
Categories
Description
UPDATE
This domain is used by AIR Server instances to check if there is any new version to update.
LICENSE
This domain is used by AIR Server instances to check the licence information
TIMESTAMP
This domain is used by AIR Server for RFC 3161 features which requires integration with a timestamp server.
UPDATE
This domain is used by AIR Server instances to update artefacts like MITRE Attack Rules , docker compose files, update scripts, offline installer packages.
Domain
Data Sent To Domain
Data Received From Domain
N/A
Version Information
License Key
License Status Details
RFC-3161 Timestamp Token
N/A
Installation Packages
Full Name:
Name: The first name of the user being added (e.g., "John").
Surname: The last name of the user (e.g., "Doe"). These fields are crucial for identifying and managing users within the system, particularly in larger organizations.
Username*:
The username is a mandatory field (indicated by the asterisk). This is the unique identifier that the user will use to log in to the AIR platform (e.g., [email protected]).
The username is often based on the user's email address to ensure uniqueness and facilitate easy recognition.
Email*:
The email is also a mandatory field. It is used for account-related communications, such as password resets, system alerts, or notifications.
This email should be valid and associated with the user being created to ensure they receive important platform-related information.
User Groups:
Select the User Groups to which the new user needs to be added.
Organization*:
This field allows you to assign the new user to a specific organization within the AIR system.
If multiple organizations are managed within the AIR platform (e.g., in a multi-tenant setup), you can select the organization to which the user belongs.
The system can restrict users from viewing or managing other organizations, depending on their access privileges.
Role*:
The Role dropdown allows you to assign the user's role within the platform. Roles define the level of access and permissions the user will have. Common roles could include:
Administrator: Full access to manage the platform, users, and assets.
Password*:
This is where you set the password for the user’s account. The password should meet the organization's security requirements (e.g., complexity, length).
A secure password is crucial to prevent unauthorized access to the platform.
Confirm Password*:
This field is used to confirm the password entered above. Ensuring that the passwords match helps avoid login issues caused by incorrect entries.
Individual 2FA Setup and Reset: Users can enable two-factor authentication (2FA) independently in 'Account > Setup Two Factor Authentication'. Global Admin and users with the "user update" privilege can reset 2FA.
Enhanced Security Posture: By enabling 2FA, AIR significantly reduces the risk of unauthorized access, even in the event of compromised credentials. This is a critical step in safeguarding sensitive investigation data and maintaining the confidentiality and integrity of your forensic and cybersecurity operations.
User-Friendly Configuration: The integration of 2FA in AIR is designed to be user-friendly, making it easy for administrators to enable and enforce 2FA without complex configuration steps.
If you have activated the AIR SSO feature, this will override 2FA.
Troubleshooting 2FA Issues: Time Synchronization
If you are experiencing issues with Two-Factor Authentication (2FA) in AIR, it may often be due to time synchronization problems on your system. Ensuring your system's time is correctly synchronized with an NTP (Network Time Protocol) server is crucial for the proper functioning of 2FA.
Steps to Check Time Synchronization:
Run the timedatectl Command: Open a terminal and execute the following command:
Verify the Output: After running the command, check the output for the following two lines:
System clock synchronized: yes
NTP service: active
Here's an example of what the correct output should look like:
What to Do if the Time is Not Accurate: If your system clock is not synchronized or the NTP service is not active, this could be the root cause of your 2FA issues. To resolve this, you may need to synchronize your system's time using NTP.
How to Synchronize Your System Time:
Enable NTP Synchronization: You can synchronize your system's time by running:
Re-check the Time Status: After enabling NTP, re-run the timedatectl command to ensure that the system clock is now synchronized and the NTP service is active.
By ensuring your system's time is accurate and synchronized, you can help prevent potential issues with 2FA in AIR. If the issue persists even after correcting the time, please contact our support team for further assistance.
The $Boot file contains the boot sector and bootstrap code for the NTFS volume. It includes critical volume parameters such as cluster size, MFT location, volume size, and other fundamental file system metadata. This file is essential for mounting and accessing NTFS volumes.
This collector gathers structured data about $boot.
Type
File type
Boot
Name
File name
$Boot
SourcePath
Original path
C:$Boot
FilePath
Path in evidence
NTFSFiles/$Boot
This collector uses kernel driver NTFS raw access to read $Boot from each fixed NTFS drive.
The boot sector provides essential information about NTFS volume configuration and can reveal volume tampering or corruption. Forensic analysis of the boot sector can identify disk geometry, partition parameters, and potential bootkits or other boot sector malware.
Switch Organizations
Add new Organizations
When viewing an Organization, you’ll see key details like:
Name, ID, Owner
Created At timestamp
Asset count, and case stats (Open, Closed, Archived)
Each Organization has four main configuration areas:
Displays the Organization’s deployment token
Includes a Shareable Deployment Page for fast responder distribution
The link can be regenerated or disabled from this view
Manage Relay Servers used to support off-network response
Includes search and "New Relay" functions
View and manage users, roles, and groups
Use the Assign Users button to add new team members
Optional form fields for storing the Organization’s contact name, title, and phone number
Organizations help:
MSSPs manage multiple customers
Enterprises segment data by business unit, region, or compliance zone
Security teams isolate cloud, on-prem, and off-network assets
Policies can be global or overridden at the Organization level
Shareable deployment links and responder access are organization-scoped
User roles support granular privileges
Organization Settings are central to structuring your AIR environment securely and efficiently. They govern deployment, user access, case management, and responder scope—all from a single, intuitive interface.

Transactional NTFS (TxF) allows applications to perform file operations as atomic transactions. The $TxfLog directory contains transaction logs, and the $Tops:$T stream maintains transaction metadata. While TxF is deprecated in modern Windows versions, these files may still exist on systems and contain historical transaction data.
This collector gathers structured data about $txflog $tops:$t.
Type
File type
TxfLogTopsT
Name
File name
$Tops:$T
SourcePath
Original path
C:$Extend$RmMetadata$TxfLog$Tops:$T
FilePath
Path in evidence
NTFSFiles/$Tops_$T
This collector uses kernel driver NTFS raw access to read $TxfLog $Tops:$T from each fixed NTFS drive.
TxF logs can provide evidence of transactional file operations and application activity. Although TxF is deprecated, these files may contain valuable historical data about file system transactions and can reveal application behavior patterns.
The $LogFile is NTFS's transaction log that records all changes to the file system before they are committed. This logging mechanism ensures file system consistency and enables recovery from system crashes or power failures. The log file maintains both redo and undo information for file system operations.
This collector gathers structured data about $log file.
Type
File type
LogFile
Name
File name
$LogFile
SourcePath
Original path
C:$LogFile
FilePath
Path in evidence
NTFSFiles/$LogFile
This collector uses kernel driver NTFS raw access to read $LogFile from each fixed NTFS drive.
The $LogFile provides forensic evidence of recent file system activity including file creation, deletion, and modification operations. It can reveal transient files that may have been deleted and provide precise timing information about file system changes. Particularly valuable for detecting data manipulation and understanding recent system activity.
The Application Compatibility Cache (also known as Shimcache) tracks metadata about executable files to improve application compatibility. Windows records information about executables when they are run, and this data persists across reboots.
AppCompatCache can provide evidence of program execution and file presence, including programs that may have been deleted. The cache is stored in the registry and contains up to 1024 entries (varies by Windows version).
This collector gathers structured data about appcompactcache.
KeyPath
Registry key path
HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\AppCompatCache
EntryName
Control set name
CurrentControlSet
Position
Position in cache
0
CachedFileSize
File size recorded in cache
1048576
This collector:
Searches registry for AppCompatCache locations:
HKLM\SYSTEM\ControlSet00*\Control\Session Manager\AppCompatibility
HKLM\SYSTEM\ControlSet00*\Control\Session Manager\AppCompatCache
Reads the AppCompatCache binary registry value
Parses the cache data format (varies by Windows version)
Extracts file paths, timestamps, and execution flags
Normalizes file paths to full paths
AppCompatCache is critical for establishing program execution and file presence. Investigators use this data to identify executed programs (even if deleted), establish execution timelines, detect malware execution, identify reconnaissance tools, track lateral movement utilities, detect portable executable usage, and correlate with other execution artifacts.
The App Paths registry key allows applications to register custom search paths so they can be launched by name without specifying the full path. When a user types just the executable name (e.g., "chrome"), Windows searches the App Paths registry to find the full path.
Malware can abuse this mechanism to hijack application launches or establish persistence by registering malicious executables under legitimate application names.
This collector gathers structured data about apppaths.
KeyName
Application executable name
chrome.exe
KeyDefaultValue
Default value (full path to exe)
C:\Program Files\Google\Chrome\Application\chrome.exe
Path
Additional search path
C:\Program Files\Google\Chrome\Application
Username
User account (empty for HKLM)
user or empty
This collector searches both machine and user registry locations:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\*
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\*
For each application, it reads:
Default value (full executable path)
Path value (additional search path)
Registry key last write time
App Paths can reveal application installations and detect persistence mechanisms. Investigators use this data to identify registered applications, detect application hijacking, track custom executable paths, identify persistence mechanisms, verify application locations, and detect malware masquerading as legitimate applications.
Browser favicons are cached website icons that provide visual history of visited sites. This data supplements browsing history by revealing sites accessed even if history was deleted.
This collector gathers structured data about brave favicons.
ID
ID
123
UserName
User Name
Example value
BrowserName
Browser Name
Example value
Profile
Profile
Example value
This collector queries the browser's Favicons database to extract cached website icons and associated URLs.
Favicon analysis can recover evidence of deleted browsing history, identify visited sites through icon fingerprinting, and correlate with other browser artifacts to establish comprehensive activity timelines.
Cookies
Downloads
Extensions
Platform Keys
Privacy Settings
Proxy Settings
Sessions
Storage
Top Sites
Windows & Tabs

A brief overview of AIR terminology
A collection of evidence types, application artifacts, network captures, and custom content items grouped into reusable sets known as Acquisition Profiles. While several profiles are provided out-of-the-box, users can also create and customize their own, adding them to the Acquisition Profile Library, accessible via the Main Menu.
The AIR Console is a web-based management interface that enables users to efficiently manage assets, assign tasks, and oversee the entire investigation lifecycle. From evidence acquisition to in-depth analysis, report generation, and case management, all activities are streamlined through the Investigation Hub. Users can also personalize their experience by switching between light and dark modes via the main menu, enhancing usability and visual comfort.
In AIR, an asset is defined as any entity, whether a device or system, physical or virtual, that operates on a supported operating system such as Windows, macOS, Linux, Chrome, IBM AIX, and ESXi. Assets are the foundational elements on which AIR performs various actions, including evidence collection and task execution, crucial for responding to and hunting cyber threats. Examples of assets include computers, servers, hosts, cloud accounts, and disk images.
Managed: The asset's responder has been successfully deployed to the device and is ready to collect tasking assignments from the console.
Unmanaged: An asset is categorized as Unmanaged under two specific conditions:
Discovery without Deployment: The asset is identified through Active Directory or Cloud Account scans, but does not have the AIR responder installed.
The Assets Summary window on the home page can also report the asset as:
Unreachable: The asset's responder is currently unreachable. If an Asset's Responder fails to connect to the AIR console for over 30 days, its status changes to "unreachable." Until then, its status will be managed as online or offline.
Update Required: The responder on the asset requires an update to function correctly.
Update Advised: The responder is still functional, but for full functionality, an update is recommended.
Isolated:
Persistent Saved Filters enable users to create and store custom asset filters, making it easier to locate and manage assets without having to reapply filter conditions in each session.
In AIR, a Case — can often be thought of simply as an 'investigation' — as it is where all related activity and evidence are grouped together. By collecting acquisitions, DRONE findings, timelines, interACT sessions and hunt results within a single case, AIR automatically builds a unified view of all of that activity in the Investigation Hub. This case-based approach gives investigators a clear, consolidated picture of their entire investigation in one place — the single pane of glass.
In Binalyze AIR, evidence refers to any data collected from an asset during acquisition or triage that supports forensic investigation and incident response. This may include system metadata, logs, configuration information, user-activity traces, or other information useful in reconstructing events.
AIR organizes all collectible data into evidence items, each of which belongs to one of the defined evidence categories in the acquisition profile. An evidence item represents a specific data source with a clear description of what it contains and why it is relevant for investigation.
The current evidence categories are:
1. System - Core operating system information, including system configuration, environment details, and fundamental OS state.
2. Memory - Volatile memory sources such as RAM snapshots, memory sections, and other data that reflect live system state at the time of acquisition.
3. Network - Network-related evidence including connections, configurations, interface details, and network activity indicators.
4. Event Logs - Structured logs generated by the operating system that record authentication events, system changes, service activity, and other audit information.
5. Disk & File System - File system metadata, mount points, directory information, file activity indicators, and other disk-level sources that reflect how data is organized and accessed.
6. Applications - Evidence produced by installed or active applications, including logs, caches, configuration files, usage traces, and other application-specific data sources.
7. Custom Content - Items defined directly by the user based on file paths or directories of interest. This allows investigators to collect additional files or folders that fall outside the standard evidence set.
8. osquery - Items collected by executing osquery queries on the asset. These provide structured, table-driven insights into system and application state using the osquery framework.
A remote location for saving evidence collected as a result of an AIR tasking. These include:
SMB
SFTP
FTPS
Amazon S3
To create a New Repository, go to Settings in the Main Menu and select Evidence Repositories from the secondary Menu. From the window 'New Repository' complete the mandatory fields and select the type of repository you wish to add.
Read more details about
In AIR, an organization is a structural entity that allows for the separation of assets, users, and cases within a multi-tenant environment. The multi-tenancy capability of AIR enables a single console to manage multiple organizations, each with its own isolated environment. Here's how it works:
Asset Management: An asset (e.g., a device or endpoint) can belong to only one organization, ensuring clear boundaries between different organizational environments. However, within that organization, the same asset can be assigned to multiple cases.
Case Management: Cases could perhaps also be called 'investigations' or 'incidents', and they are also aligned to a specific organization. Access to cases can be restricted based on user privileges within that organization.
Global and Organization-Specific Settings: Certain settings, such as policies and evidence repositories, can be configured globally across all organizations or individually for each organization. This flexibility allows administrators to enforce global standards while still providing the ability to customize configurations at the organizational level when required.
This multi-tenant architecture in AIR enables organizations to operate independently within the same platform, benefiting from both shared resources and isolated environments, depending on their specific needs.
User real-time status is shown throughout the AIR via colored dots—green for online, gray for offline—helping teams coordinate more effectively across the platform.
This live collaboration capability extends to the Investigation Hub where investigators can see real-time user presence, track comment updates, and observe evidence flag changes as they happen. These live updates allow multiple investigators to work simultaneously on the same evidence without needing to refresh the view. Every action—whether adding notes, updating findings, or adjusting flags—appears instantly for all connected users, creating a fully synchronized collaborative workspace within the Investigation Hub.
In the Investigation Hub screenshot above, you can see that three users are currently active in this case. Their profile icons indicate not only who is present, but also where each person is working in real time. In this example, one user is viewing the Findings page, another is focused on the System Info evidence, and a third is examining the Amcache File evidence. This provides instant visibility into team activity and helps avoid duplication of effort during collaborative investigations.
The AIR responder is a compact, cross-platform, zero-dependency, and zero-configuration package that functions as a virtual incident responder, delivering Level 3–4 SOC expertise directly to your assets.
Unlike 'agents' that constantly monitor systems and consume significant resources, AIR responders only activate to perform precise, user-defined DFIR tasks on demand. This approach enables the deployment of thousands of virtual responders across your IT ecosystem, ready to execute proactive and reactive incident response activities, such as evidence collection, threat hunting, and forensic-level analysis, as needed.
Binalyze's approach prioritizes efficient security enhancement, marrying minimal asset impact with maximum readiness and incident response capability. Read more here:
Operations are assigned to the assets by the AIR console, either manually or automatically via a trigger. A task can be assigned to multiple assets, and this is managed through 'task assignments.' Each individual assignment, known as a 'task assignment,' creates a one-to-one correspondence between the task assigned by the console and the specific asset on which the task assignment is executed, ensuring precise management and tracking across all assigned tasks.
Tasks could be either:
Manual: Assigned manually by users,
Scheduled: Created by users to start at a future date. Scheduled tasks can be either one-time or recurring (daily, weekly, or monthly).
Triggered: Assigned to the assets as a response to a trigger request, which is sent by a SIEM/SOAR/EDR solution.
Triggers are the primary extensibility mechanism for AIR to receive alerts from other security suites, such as SIEM, SOAR, and EDRs.
A trigger is the combination of a parser, an acquisition profile, and a destination for saving the collected evidence (either local or remote).
AIR takes this to the next level by allowing the trigger to further automate the post-acquisition analysis by leveraging DRONE and MITRE&CK scanners. In effect, the alert from your security tools can launch AIR into the collection of relevant forensic data, facilitate the analysis of that data, and deliver any DFIR findings into the Intelligence Hub with no analyst intervention required.
Hunt/Triage in AIR refers to searching for indicators of compromise—such as file hashes, processes, or malicious domains—across assets at scale. AIR provides built-in YARA, Sigma, and osquery capabilities, enabling analysts to detect anomalies in live systems, memory, and logs. Users can write their own rules or import large rule sets for rapid deployment, all of which are centrally stored and managed in the AIR Libraries to ensure consistency and collaboration across investigations.
This section provides details on the versions of various components of the AIR platform, helping administrators ensure that all parts of the system are up to date.
AIR: The main application version (e.g., 4.41.1). This represents the core platform's release and includes the latest features and security updates.
DB (Database): The version of the database used by AIR (e.g., 6.0.7), which stores all data related to the platform’s tasks and configuration settings.
Responder: The version of the AIR responder (e.g., 2.50.5) installed on assets for data acquisition and remote interaction.
DRONE: The version of the DRONE analysis engine (e.g., 3.11.0), which processes collected evidence to deliver findings and insights on this and some live artifacts through automated analyzers.
TACTICAL: These versions indicate the status of various responders for different operating systems, including Linux, macOS, Windows, and the legacy version for older Windows systems. For example, the latest responders are at version 3.12.1, ensuring compatibility with the latest operating system environments.
MITRE ATT&CK Analyzer: This version (e.g., 7.0.0) refers to the built-in mapping against the MITRE ATT&CK framework, which helps identify adversary tactics, techniques, and procedures during investigations.
Disk Image Explorer: This component (e.g., version 1.0.0) provides functionality for exploring disk and volume images acquired during investigations.
Log Level: Determines the level of verbosity in logging within AIR. Adjusting the log level can help with debugging or tracking system activity.
Log Files: Provides access to the system's log files, which are helpful for auditing, troubleshooting, and reviewing system performance and security events.
This section provides details about the current licensing status of the AIR installation.
License Key: Displays the license key currently in use (e.g., TEST-LICENSE).
Valid Until: The expiration date of the license (e.g., 2025.09.29), indicating the duration for which the platform is licensed.
Max Client: The maximum number of assets (clients) that can be managed under this license (e.g., 1,000,000 assets).
In Use: The number of assets currently being monitored by AIR (e.g., 447,908 assets).
Console Address: This is the current address of the AIR Console (e.g., air-demo.ACME.com), where asset responders poll to check for any tasking assignments that require execution.
Important: Changing this address will trigger a migration process, which will cause all assets to connect to the new address while they are deregistered from the old one.
Console Proxy: Settings for configuring an internet proxy that AIR can use to connect to external services, such as updates or external evidence storage.
Displays information about the system where AIR is installed, helping monitor and optimize performance.
CPU:
Cores: The number of processor cores (e.g., 8), indicating the processing power available for handling AIR tasks.
CPU Type: Details of the CPU model (e.g., Intel Xeon Processor, Skylake architecture).
Flags: A list of supported CPU features (e.g., SSE, HT, etc.), indicating hardware capabilities relevant to performance.
AIR provides a controlled and predictable update process for SaaS tenants by using maintenance windows. These windows allow you to define exactly when updates may occur, helping you align upgrades with organisational change-control processes and minimise operational impact.
All update settings are available from:
Settings → Update
Auto Update allows AIR to automatically install new versions during a recurring update window that you configure.
When Auto Update is enabled, you can define:
Time Window
Select a 30-minute update window (e.g., 02:00–02:30 or 14:00–14:30 (Europe/Istanbul – UTC +03:00)).
Updates will only run within this defined window.
Days of the Week
Choose one or more days on which updates are permitted (e.g., Monday–Friday, Saturday only, or Wednesday).
At least one day must be selected.
How it works:
When a new version becomes available, AIR identifies the next selected day and applies the update during the time window you have configured.
Use a One-time Scheduled Update when you want to apply the next update at a specific upcoming window outside your normal recurring schedule.
When selected, AIR displays the next available maintenance windows.
Choose your preferred window and save the configuration.
The system will update once during that window and then revert to your existing Auto Update settings.
This option is ideal for:
Alignment with a formal change-control event
Situations where you want to temporarily override your regular update pattern
Urgent updates that cannot wait for the next recurring window
If you wish to temporarily halt updates:
Set Auto Update to off
Ensure One-time Scheduled Update is not selected
Your tenant will not update until a new maintenance window is configured.
The Update Settings page displays your current version, for example:
If an update has been scheduled, the page will show:
The update version
The scheduled maintenance window
Any relevant notifications
Automatic Backup Before SaaS Updates
AIR automatically creates a backup before every SaaS console update. If the update fails, the system can roll back to the previous working state. No manual backup action is required.
AIR's SaaS update management offers:
Controlled and predictable updates
Recurring and one-time maintenance window options
Full alignment with change-control practices
Built-in automatic backups for safety
These controls ensure uninterrupted operation while keeping your environment consistently up-to-date.
Evidence: Brave Local Storage Description: Collect Brave Local Storage Category: Applications Platform: windows Short Name: bls Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No
Browser local storage contains persistent key-value data stored by websites. This data includes user preferences, session state, cached data, and potentially authentication tokens or sensitive information.
This collector gathers structured data about brave local storage.
This collector extracts local storage data from browser storage databases and files.
Local storage analysis reveals stored credentials, session tokens, tracking identifiers, and application state that can indicate compromised accounts, persistent tracking, or malicious website activity. Analysts can identify credential theft, session hijacking, and data exfiltration attempts.
Manage updates for the AIR responders installed on assets.
This feature enables or disables automatic updates for responders. If enabled, the responders will automatically update to the latest version when a new release is available. This ensures that responders are always running the most current version, complete with all the latest features and security patches.
Deployment Tokens: These tokens are used to securely install and register responders on new assets, ensuring the responders communicate correctly with the AIR Console upon installation.
Enable alerts for tampering attempts on responders.
When Tamper Detection is enabled, the responder will actively monitor its own operation for any interference or attempts to disable it.
Functionality: If there is an attempt to modify or interfere with the responder (e.g., by disabling it or altering its files), the responder will notify the AIR Console, ensuring that any malicious attempts are flagged immediately.
This feature is critical for ensuring the integrity and continuous operation of responders in high-security environments.
Prevent unauthorized uninstallation of responders by requiring a password.
When this feature is enabled, users must enter a protection password to uninstall the responder from an asset. This prevents unauthorized personnel from removing the responder, which could otherwise leave the asset vulnerable or unmonitored.
Uninstallation Method: The uninstallation process will be restricted to shell commands, meaning it can't be removed via a simple GUI or file system manipulation, adding an extra layer of security.
Synchronize assets from Active Directory with AIR.
This feature allows AIR to integrate with your Active Directory (AD) environment. You can specify the AD server (e.g., 10.0.0.1) and the domain (e.g., company.local) to automatically synchronize information about computers and users from AD into AIR.
LDAP Synchronization: By manually starting the LDAP synchronization, you can query Active Directory for specific objects such as computers, ensuring that AIR can discover and manage assets from your organization's AD.
The Query For Computers field (e.g., (&(objectCategory=computer))) uses an LDAP filter to query and sync only computer objects from the directory.
Jamf is a software company that supplies one of the most well-known and popular Mobile Device Management (MDM) software solutions used to manage Apple devices. Using Jamf, and following the steps below, you can silently grant full disk access to AIR responder's remotely.
Full Disk Access (FDA) on macOS can be activated by importing a Privacy Preferences Policy Control (PPPC) config file instead of manually providing permission options via the Jamf UI.
AIR (and all other platforms) will only achieve complete macOS data acquisitions if FDA is enabled. Typically some of the artifacts that will give partial or no results if FDA is not active include:
App Usage
Bluetooth Connections
Document Revisions
Downloads
DS_Store
Notification Info
TCC
A PPPC config file in macOS manages permissions for apps to access sensitive data and system features like Full Disk Access, camera, and microphone. It's used by organizations to pre-configure these permissions, often through MDM, ensuring necessary apps run without user prompts. These files are in .mobileconfig (XML) format and help balance security with convenience by automating privacy settings for applications.
Steps to follow:
Download and open the Jamf PPPC Utility:
From a MacBook where AIR is already installed, go to the path /opt/binalyze/air/agent, drag the "air" binary to PPPC Utility, and you will be able to see identifier details
In properties - "Full Disk Access" -> Choose "Allow"
Bottom right, Click "Save", and provide a Payload Name, for example, "AIR"
Now you can Import the saved config file into Jamf - Configuration Profiles.
Identifier and Identifier Type for importing the config created using PPPC utility to achieve FDA:
An entry is created in /Library/Application Support/com.apple.TCC/TCC.db for all the applications that were assigned FDA (Manual Install)
For remote deployments, an entry is created in /Library/Application Support/com.apple.TCC/MDMOverrides.plist
For practical verification, users should try to collect KnowledgeC evidence. Successful collection confirms that the responder has Full Disk Access.
Reference:
Evidence: Brave Form History Description: Collect Brave Form History Category: Applications Platform: windows Short Name: bfh Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No
Browser form history stores previously entered form data including search queries, usernames, and other input fields. This data reveals user search patterns, account information, and potential data leakage through autofill.
This collector gathers structured data about brave form history.
This collector queries the browser's form history database to extract saved form field data, search queries, and associated timestamps.
Form history exposes reconnaissance activities, credential enumeration attempts, search queries revealing attacker intent, and potentially sensitive information entered into web forms. Analysts can identify data exfiltration, account compromise indicators, and targeted search patterns.
Evidence: Brave Sessions Description: Collect Brave Sessions Category: Applications Platform: windows Short Name: brvss Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No
Browser sessions maintain active tab state, cookies, and authentication context. This data reveals currently active user sessions, open websites, and authenticated connections at the time of collection.
This collector gathers structured data about brave sessions.
This collector captures browser session data including active tabs, session cookies, and authentication state.
Session analysis identifies active compromises, authenticated sessions to malicious sites, concurrent suspicious activities, and real-time indicators of ongoing attacks. Analysts can detect active C2 connections, authenticated malware communications, and live attacker sessions.
Isolating assets from all network access except the AIR Console
Asset Isolation enables you to completely isolate an asset from all network communication except its connection to the AIR Console. This allows your investigation to proceed with full AIR capabilities while preventing threat actors from accessing the asset or external parties from interfering with the investigation.
Key Point: An isolated asset can only communicate with the AIR Console. All other network connections—inbound and outbound—are blocked.
Preventing task creation for assets during maintenance or diagnostic sessions
Maintenance Mode prevents the AIR Console from generating or assigning tasks to an asset. When activated, the Console will not allow you to create tasks for that asset—this includes manual task creation, scheduled tasks, and bulk task assignments.
Key Point: Maintenance Mode is a console-side control. The Responder continues to operate normally, but the Console blocks all task creation for the maintained asset.
Note: If no organization is selected or assigned, the user may have limited or no permissions within the platform.
Viewer: Read-only access to view data and reports.
This field is crucial for setting user permissions and ensuring that they can only perform actions aligned with their responsibilities.
Remaining: The number of asset slots still available (e.g., 552,092 assets). This helps ensure scalability and license compliance.
Address: The IP address of the proxy (e.g., 10.0.0.1).
Port: The port used for proxy communication (e.g., 0).
Username and Password: Credentials for authenticating with the proxy.
Certificate Authority (CA): If your organization uses a custom CA for SSL communication, this setting allows you to upload the certificate in the appropriate format for secure connections between assets and the AIR Console.
Memory:
Total Memory: The total available system memory (e.g., 32.87 GB).
Used Memory: The amount of memory currently in use (e.g., 5.29 GB).
Free Memory: The remaining available memory (e.g., 27.58 GB), ensures that there are enough resources to handle future operations.
File System:
Total Storage: The total storage space available (e.g., 315.93 GB).
Used Storage: How much storage is currently used (e.g., 189.46 GB).
Partition: The partition where AIR data is stored (e.g., /dev/sdb1). Monitoring this ensures sufficient space for data storage and logging.
All AIR versions (4.29 and onward) will maintain backward compatibility with Responders that are also on version 4.29 or newer.
Responders running versions older than 4.29 (e.g., 2.54.3) are not compatible with certain key features such as:
Evidence acquisition
Hunt/Triage
interACT
Users with older Responder versions will see messages like:
"The asset’s AIR Responder must be updated to accept tasks."
To summarize: Backward compatibility was introduced with AIR version 4.29 and onwards. If your Responders are still on versions earlier than 4.29, they must be upgraded at least once to benefit from this compatibility model going forward.
Authentication: You will need to provide an AD username and password to authenticate and pull information from the directory.
FileSize
File size in bytes
8192
FileSize
File size in bytes
524288
FileSize
File size in bytes
67108864
CachedFileModified
Modification time in cache
2023-10-15T14:30:00
Executed
Whether file was executed (varies by OS version)
TRUE
KeyPath
Registry key path
SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\chrome.exe
LastWriteTime
Registry key last write time
2023-10-15T14:30:00
RegPath
Path to registry hive
Registry/SOFTWARE or Registry/ntuser.dat
URL
URL
Example value
IconType
Icon Type
123
Path
Path
Example value
Value
Value
Example value
Path
Path
Example value
UserName
User Name
Example value
ProfileName
Profile Name
Example value
BrowserName
Browser Name
Example value
Key
Key
Example value
ValueLower
Value Lower
Example value
Count
Count
123
Profile
Profile
Example value
Path
Path
Example value
DateCreated
Date Created
2023-10-15 14:30:25+03:00
DateLastUsed
Date Last Used
2023-10-15 14:30:25+03:00
UserName
User Name
Example value
BrowserName
Browser Name
Example value
Name
Name
Example value
Value
Value
Example value
Title
Title
Example value
Deleted
Deleted
true
Group
Group
Example value
History
History
[]
BrowserName
Browser Name
Example value
ID
ID
123
WindowID
Window ID
123
Active
Active
true
Url
Url
Example value
FIS USAGE STATS
FEATURE FLAGS
USAGE ANALYTICS
This domain is used by AIR Server instances to
Collect case activity & Organization ID metrics for FIS License charges/billing.
Feature flag service to enable/disable features on AIR.
Analytics to analyse usage statistics.
UPDATE
This domain is a container registry for AIR Server instances to update server components like the application server images, database images, caching server images, etc.
FIS USAGE STATS:
OrganizationID’s, Case Id, License Key, CaseEventType, CaseEventTime, endpoint Id, Task Id
i.e.: "logId": 764149386100000, "type": "endpointTaskAddedToCaseEvent", "publishedDate": "2022-06-03T10:22:18.610Z", "data": { "caseId": "C-2022-0028", "endpointId": "2b2ea7b0-be61-445c-b735-ac1a9a39e448", "taskAssignmentId": "2b1d5b2c-72ac-4828-9a82-b3510ce9fd5a" }, "license": "LICENSE-KEY"
FEATURE FLAGS: License Key
USAGE ANALYTICS: Amplitude event structure
FEATURE FLAGS: Feature flag states
USAGE ANALYTICS: N/A
N/A
Binary Packages
Off-Network: An asset is classified as Off-Network under two specific scenarios:
Data Supplied: The asset has previously provided data through methods such as an Off-Network Acquisition or a Hunt/Triage task.
Unreachable with Stored Data: The asset holds forensic data within the console but is currently inaccessible for further data collection or task assignments.
For both scenarios, investigation of the existing data is possible, and additional data can be manually imported as required.
Network Shares
Policies and Evidence Repositories: Policies can be applied either globally or on an organization-by-organization basis. For example, evidence repositories, which store collected data, can be aligned to all organizations (global) or set up uniquely for each organization, allowing for localized data control.



User Groups are a powerful feature in AIR designed to streamline user access management across organizations, especially in large environments or those using Single Sign-On (SSO).
User Groups allow you to manage users collectively instead of individually. This simplifies role assignments and organization-level access across AIR. Whether you're handling internal teams or integrating with Azure AD or Okta, User Groups provide scalable, centralized control.
Managing user access across multiple organizations can be time-consuming. With User Groups, you can:
Group users by function, department, or region
Assign them to organizations and roles in bulk
Sync groups directly from SSO providers like Azure AD or Okta
This reduces manual overhead and ensures consistency in access management.
To access this feature:
Navigate to Settings → User Groups
Note: Only Global Admins can access and manage User Groups.
Click Create Group
Enter a Group Name (e.g., "HR Team")
Optionally, provide a description for context
After creating a group:
Select users from your existing AIR user list
Users in the group automatically inherit all organization and role assignments associated with the group
You can always view and manage group membership from the main User Groups table.
If you're using Azure AD or Okta:
Toggle "Sync with SSO" when creating or editing a group
Once enabled, group membership is pulled from your identity provider
Manual editing of group members in AIR will be disabled
A tooltip will indicate that synced groups are read-only within AIR.
Go to Settings → Organizations
Create or edit an organization
In Step 2 of the wizard, assign the desired User Group(s)
All users in the selected group will be granted access to the organization with their predefined roles.
In the User Groups table, click the user count to view members
For SSO-synced groups, membership cannot be modified in AIR.
Users added via a group cannot be removed individually from an organization. To revoke access:
Remove the user from the User Group
A tooltip will appear if removal is attempted at the individual level.
The Users list now includes a Groups column to show which user groups a person belongs to. This offers helpful context when reviewing or auditing user access.
Only Global Admins can create and edit User Groups
Group duplication is not yet available, but it is planned
When a user is assigned to an organization both individually and via a group, the group assignment takes precedence
To fully remove access, remove the user from the group
User Groups simplify access control and scale with your environment. Benefits include:
Centralized user and role management
SSO directory sync support
Consistent access inheritance across organizations
Whether you're managing 10 users or 10,000, User Groups provide a more efficient and secure way to manage access in AIR.


timedatectlsudo timedatectl set-ntp trueYour system is up-to-date – v5.7.0.xxxxxSave AIR.mobileconfig.
When you suspect an asset has been compromised, you face a dilemma:
Leave it connected → Risk the threat actor maintaining access, exfiltrating data, or destroying evidence
Disconnect it completely → Lose the ability to perform remote forensic collection
Asset Isolation solves this by cutting off the threat actor while preserving your investigative access. The asset remains fully manageable through AIR, enabling you to collect evidence, run queries, and interact with the system—all while the asset is protected from external interference.
When you isolate an asset:
All existing network connections are terminated — Any active connections to other systems are immediately dropped
New network connections are blocked — The asset cannot establish connections to any external system
AIR Console communication is preserved — The Responder maintains its connection to the Console
Full AIR capabilities remain available — Acquisition, Hunt/Triage, interACT, and Time-lining all continue to function
This feature uses a Kernel Mode Driver for performing the isolation. It operates independently of Windows Firewall, ensuring reliable isolation regardless of firewall configuration or state.
Persistence: Asset Isolation survives reboots. If you restart an isolated asset from the AIR Console, it will remain isolated after the reboot until you explicitly un-isolate it from the Asset Details page.
During isolation, all AIR capabilities continue to function:
Acquisition
✅ Available
Collect forensic evidence
Hunt/Triage
✅ Available
Search for indicators of compromise
interACT
✅ Available
Live interaction with the asset
Time-lining
✅ Available
Build activity timelines
When you identify a potentially compromised asset, immediately isolate it to prevent:
Threat actors from maintaining command and control access
Data exfiltration to external servers
Lateral movement to other assets on the network
Remote destruction of evidence
Isolation allows you to investigate a live system without interference. The threat actor cannot detect your investigation activities or take countermeasures while the asset is isolated.
By isolating the asset, you ensure that evidence remains intact during collection. No external process can modify, encrypt, or delete files while you're acquiring them.
Best Practice: When responding to a suspected compromise, isolate the asset first, then begin your forensic acquisition. This ensures you capture evidence in its current state without risk of tampering.
Navigate to the asset in the AIR Console
Open the More Actions menu
Select Isolate Asset
The asset will immediately be isolated from all network communication except the AIR Console.
Navigate to the isolated asset's Asset Details page
Select Un-isolate Asset
Network connectivity will be restored and the asset can resume normal operations.
Both features control asset behaviour, but serve different purposes:
Primary Purpose
Network containment
Prevent task creation
Network Access
❌ Blocked (except Console)
✅ Normal
Task Creation
✅ Allowed
❌ Blocked
Acquisition
✅ Available
When you place an asset into Maintenance Mode:
Task creation is blocked — You cannot generate new tasks for the asset from the Console
Scheduled tasks are skipped — Any scheduled tasks that would target this asset will not execute
Bulk tasks exclude the asset — The asset is automatically excluded from bulk task operations
In-progress tasks continue — Tasks that were already executing when Maintenance Mode was activated will run to completion
To support essential diagnostic and investigative activities, the following actions are still permitted:
interACT
✅ Available
Essential for live diagnostics
Log Gathering
✅ Available
Required for troubleshooting
New Task Creation
❌ Blocked
Primary function of Maintenance Mode
Scheduled Tasks
❌ Blocked
Prevented by Console
Maintenance Mode can be enabled from the More Actions menu on any asset.
When an asset is in Maintenance Mode, this status is clearly visible:
Asset Details Page: The Maintenance Mode status is displayed in the asset information panel
Asset Filters: Filter by Maintenance Mode status to identify maintained assets across large environments
During system updates, patches, or configuration changes, activate Maintenance Mode to ensure no tasks—manual or automated—can be created for the asset until maintenance is complete.
When troubleshooting an asset, Maintenance Mode prevents accidental task execution while you investigate. interACT and log gathering remain available for diagnostics.
When working with cloned or duplicated asset instances, Maintenance Mode prevents conflicting task assignments. This helps analysts maintain chain-of-custody and ensures collected information remains contextually accurate.
Best Practice: When working with cloned environments or forensic duplicates, place the original asset in Maintenance Mode to prevent task conflicts and preserve evidence integrity.
Both features control asset behaviour, but serve different purposes:
Primary Purpose
Prevent task creation
Network containment
Network Access
Normal
Terminated
Task Creation
❌ Blocked
✅ Allowed
Scheduled Tasks
❌ Blocked
Browser download history records files downloaded by users, including file paths, timestamps, URLs, referrer information, and download status. This data is essential for tracking file acquisition, identifying potentially malicious downloads, and reconstructing user activity timelines.
This collector gathers structured data about brave downloads.
UserName
User Name
Example value
Browser
Browser
Example value
ProfileName
Profile Name
Example value
URL
URL
Example value
This collector queries the browser's History database to extract download records, including file paths, download times, source URLs, and security flags.
Download history reveals malware delivery vectors, data exfiltration attempts, unauthorized software installation, and user interaction with suspicious websites. Analysts can identify downloaded malicious files, track attack chains, and correlate downloads with other security events.
This feature enables or disables the interACT functionality in AIR.
interACT allows users to remotely open a shell session to interact with assets. Users can execute commands and scripts based on their assigned privileges.
Security Requirement: To use interACT, users must have enhanced security in place—either Two-Factor Authentication (2FA) or Single Sign-On (SSO). This ensures secure access to sensitive systems, limiting unauthorized use.
Read more about interACT here:
Two-Factor Authentication (2FA) for isolated AIR installations
To enhance security, AIR interACT requires Two-Factor Authentication (2FA) using Time-Based One-Time Passwords (TOTP). You can set up offline 2FA solutions such as Google Authenticator or Microsoft Authenticator, making it suitable for use in isolated networks.
Why is 2FA Mandatory in interACT?
This feature allows AIR to capture and associate the public IP of an asset.
When enabled, the AIR Console parses HTTP request headers to extract the X-Forwarded-For header provided by proxies. This header reveals the public IP address of the responder (asset), even if it's behind a proxy or firewall.
Visibility: If the feature is enabled, AIR will display the X-Forwarded-For IP address instead of the communication IP (the one directly visible to AIR). This provides more accurate forensic visibility of an asset's location and origin.
Enforce mandatory case selection when starting tasks.
This feature requires users to associate every task they run in AIR with a specific case.
Benefit: It enforces structured workflows, ensuring that all investigations are organized and traceable to a particular case, which is critical for auditing and maintaining clarity in incident response efforts.
Provides cryptographic proof of when data was acquired and its integrity.
RFC3161 timestamping ensures that the data collected during acquisition has a digital signature, proving that the data existed at a specific time and has not been altered since.
When enabled, every new acquisition task will include a signature file with metadata, adding legal and forensic robustness to your investigation process.
Read more in this blog:
Protect evidence integrity by registering it on the blockchain via LOCARD, which is a blockchain-based system for secure evidence handling in digital forensics. It has seen some adoption in Europe but remains underutilized in the U.S. due to regulatory and infrastructure challenges, leading to slower adoption and less frequent use.
This feature integrates with LOCARD, a blockchain-based platform for evidence integrity. When enabled, the chain of custody for digital evidence is secured by submitting evidence metadata to the blockchain, ensuring it hasn't been tampered with.
LOCARD Credentials: To use this, you'll need to provide the Organization, Host, Username, and Password for your LOCARD account.
Set up email notifications, such as password-reset emails.
Specifying an SMTP server allows AIR to send out automated emails, particularly for password resets. This is useful for self-service password recovery.
You must configure the SMTP server address, port, sender email, username, and password. For example, using mail.smtp2go.com as the server.
Enable integration with Syslog servers or SIEM systems.
This feature allows AIR to send event logs to a centralized Syslog or SIEM (Security Information and Event Management) system for enhanced log monitoring and analysis.
You will need to configure the protocol (TCP/UDP), server address, and port to send logs from AIR to your preferred log management system.
Display a custom banner message across all AIR Console pages.
This feature allows you to set a banner message that will appear on all pages of the AIR Console. This is useful for displaying system notices, warnings, or other important information to all users.
Enforce task options and preferences across assets.
Policies allow administrators to define global task preferences and restrictions for assets in the organization.
Customizability: Policies can be tailored for different subsets of assets using filters, and a user must have the "Override Policy" privilege to modify the default organizational policies.
Automate tagging of assets when they are added to AIR.
When this feature is enabled, AIR automatically applies asset tags based on predefined rules as soon as a responder is installed on an asset.
Flexibility: Even if this feature is disabled, users can still run the Auto Asset Tagging task manually on assets.
Activate AI-powered assistance for investigations.
Fleet.AI is an AI-driven assistant integrated into AIR. Fleet AI is designed to integrate seamlessly into users’ workflows and rather than having a single chatbot, it leverages a Multi-Agent System (MAS) architecture to assist analysts with specific investigation tasks such as rule creation, threat hunts, and investigation planning—all within the AIR console. At the center is Blacklight, an orchestrator that routes analyst prompts to the best-fit agent and manages execution.
Evidence: Brave Cookies Description: Collect Brave Cookies Category: Applications Platform: windows Short Name: bcookies Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No
Browser cookies store session tokens, authentication credentials, user preferences, and tracking data. This data is essential for understanding authenticated sessions, tracking user activity across websites, and identifying session hijacking or credential theft.
This collector gathers structured data about brave cookies.
This collector extracts cookies from the browser's Cookies database, including domain, name, value, path, expiration, and security flags.
Cookie analysis reveals active sessions, authentication tokens, persistent tracking identifiers, and potential session hijacking. Investigators can identify stolen credentials, unauthorized access, and cross-site tracking used for reconnaissance or targeting.
Evidence: Brave Browsing History Description: Collect Visited URLs from Brave Category: Applications Platform: windows Short Name: bhst Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No
Browser history records all websites visited by users, including URLs, page titles, visit timestamps, visit counts, and transition types. This data is essential for reconstructing user activity, identifying malicious websites, and tracking lateral movement or reconnaissance activities.
This collector gathers structured data about brave browsing history.
This collector queries the browser's History database to extract visited URLs, timestamps, referrer information, and user interaction patterns.
Browsing history reveals phishing sites, malicious domains, command-and-control servers, data exfiltration targets, and reconnaissance activities. Analysts can identify compromised credentials, track attacker infrastructure, and correlate web activity with other security events to establish attack timelines.
Evidence: Brave Bookmarks Description: Collect Brave Bookmarks Category: Applications Platform: windows Short Name: bbkmrks Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No
Browser bookmarks represent user-saved favorite websites and organizational folders. This data reveals frequently accessed sites, user interests, and potential indicators of reconnaissance, phishing targets, or suspicious infrastructure.
This collector gathers structured data about brave bookmarks.
This collector parses the browser's Bookmarks file to extract saved URLs, folder structures, timestamps, and metadata.
Bookmark analysis identifies targeted websites, phishing pages, command-and-control servers, internal resources, and organizational reconnaissance patterns. Investigators can detect social engineering campaigns, credential harvesting attempts, and lateral movement preparation.
Evidence: Brave Login Data Description: Collect Brave Login Data Category: Applications Platform: windows Short Name: blgd Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No
Browser login data stores saved passwords and credential information. This data is critical for identifying stored credentials, password reuse patterns, and potential credential theft targets.
This collector gathers structured data about brave login data.
This collector extracts saved credentials from the browser's Login Data database, including URLs, usernames, and encrypted passwords.
Login data analysis reveals stored credentials, password reuse across services, targeted accounts, and potential credential harvesting. Investigators can identify compromised accounts, credential theft attempts, and unauthorized access to saved credentials by malware or attackers.
Acquisition profiles in AIR define the specific types of data to be collected during an acquisition task. These profiles enable you to customize and streamline data collection to meet the unique requirements of your investigation. Saved within the AIR Libraries, acquisition profiles can be easily shared, reused, or edited for further refinement, ensuring efficiency and consistency across investigations.
As shown above, AIR comes with several predefined acquisition profiles that you can use immediately, for example:
Scheduled Tasks
✅ Available
Automated task execution continues
External Network Access
❌ Blocked
Threat actor access denied
❌ Blocked
Hunt/Triage
✅ Available
❌ Blocked
interACT
✅ Available
✅ Available
TargetPath
Target Path
Example value
CurrentPath
Current Path
Example value
Referrer
Referrer
Example value
LastModified
Last Modified
2023-10-15 14:30:25+03:00
DangerType
Danger Type
123
Opened
Opened
123
TabURL
Tab URL
Example value
TabReferrerURL
Tab Referrer URL
Example value
StartTime
Start Time
2023-10-15 14:30:25+03:00
EndTime
End Time
2023-10-15 14:30:25+03:00
HistoryFilePath
History File Path
Example value
Name
Name
Example value
Path
Path
Example value
Value
Value
Example value
IsSecure
Is Secure
123
IsHTTPOnly
Is HTTP Only
123
HasExpires
Has Expires
123
IsPersistent
Is Persistent
123
Priority
Priority
123
SameSite
Same Site
123
SourcePort
Source Port
123
SourceScheme
Source Scheme
123
CreationTime
Creation Time
2023-10-15 14:30:25+03:00
ExpiresTime
Expires Time
2023-10-15 14:30:25+03:00
LastAccessTime
Last Access Time
2023-10-15 14:30:25+03:00
UserName
User Name
Example value
BrowserName
Browser Name
Example value
ProfileName
Profile Name
Example value
Domain
Domain
Example value
Title
Title
Example value
VisitDuration
Visit Duration
Example value
Referrer
Referrer
Example value
TypedCount
Typed Count
123
IsHidden
Is Hidden
true
TransitionType
Transition Type
Example value
VisitID
Visit ID
123
TransitionQualifiers
Transition Qualifiers
Example value
User
User
Example value
Profile
Profile
Example value
HistoryFilePath
History File Path
Example value
AccessTime
Access Time
2023-10-15 14:30:25+03:00
AccessCount
Access Count
123
URL
URL
Example value
Browser
Browser
Example value
BookmarkID
Bookmark ID
Example value
Name
Name
Example value
Type
Type
Example value
URL
URL
Example value
ParentFolder
Parent Folder
Example value
DateAdded
Date Added
2023-10-15 14:30:25+03:00
DateLastUsed
Date Last Used
2023-10-15 14:30:25+03:00
DateModified
Date Modified
2023-10-15 14:30:25+03:00
UserName
User Name
Example value
ProfileName
Profile Name
Example value
BrowserName
Browser Name
Example value
GUID
GUID
Example value
SignonRealm
Signon Realm
Example value
BlacklistedByUser
Blacklisted By User
123
Scheme
Scheme
Example value
PasswordType
Password Type
Example value
TimesUsed
Times Used
123
Profile
Profile
Example value
Path
Path
Example value
DateCreated
Date Created
2023-10-15 14:30:25+03:00
DateLastUsed
Date Last Used
2023-10-15 14:30:25+03:00
ID
ID
123
UserName
User Name
Example value
BrowserName
Browser Name
Example value
OriginURL
Origin URL
Example value
Preventing Unauthorized Access interACT provides direct access to systems, making security a top priority. Relying solely on a password increases the risk of unauthorized individuals gaining control. 2FA significantly reduces this risk by adding an extra layer of authentication.
Securing Critical Command Execution interACT allows users to execute commands directly on a system. Without a strong authentication mechanism, a malicious actor could exploit access to perform harmful operations. 2FA ensures that only authorized users can issue commands, maintaining system integrity and security.
By enforcing 2FA, interACT safeguards against unauthorized access and potential misuse, ensuring a secure and controlled environment for forensic investigations.
Bulk Tasks
❌ Blocked
Asset is excluded
✅ Execute normally
interACT
✅ Available
✅ Available
Acquisition
❌ Blocked
✅ Available
Hunt/Triage
❌ Blocked
✅ Available


Quick: Designed for fast data acquisition with essential evidence types.
Full: Collects a comprehensive and rich set of data from the assets.
Compromise Assessment: Focuses on locations commonly abused by malicious actors, defined by the Binalyze threat hunting team.
These out-of-the-box profiles are ideal for common scenarios and provide an ideal quick start for your investigations.
To create your own custom acquisition profile, follow these steps:
Go to the "Libraries > Acquisition Profiles" section from the main dashboard.
Click on the "+ New Profile" Action Button.
Provide your new profile with a name that will help you identify its purpose later.
Windows
Linux
macOS
IBM AIX
Or a cross-platform eDiscovery collection
AIR supports the most comprehensive, and ever-growing number of evidence types for collection and presentation in the Investigation Hub. To build your profile, choose the data you want to collect from the extensive options grouped under the following eight tabs:
System
System artifacts (e.g., registry, jump lists, UAL, Cron Jobs)
Memory
Memory files (e.g., RAM image, Page File, Memory Map)
Network
Network artifacts (e.g., IP Tables, TCP Tables, DNS Servers)
Event Log Records
AIR allows users to collect and present event logs or define specific channels for log collection.
Disk & File System
Collect disk & file System items (e.g., $mft, $Boot File, Mounts, fseventsd)
Applications
Data for specific applications (e.g., browsers, AV logs, RDM tools, Microsoft application data)
Custom Content Profiles
Select bespoke file locations for collection.
osquery
Use bespoke osquery commands to collect live system artifacts, including processes, network activity, and configuration files.
Custom Content Profile Path Tips
You can omit the drive letter — start from the folder name (e.g., Program Files\Common Files).
Use ** for recursive matching:
C:\Users\**\*.txt collects all .txt files under that path.
**\malware.exe (or **/malware.exe on Unix) finds all malware.exe files system-wide.
Windows paths can use / or \ — both are supported.
Network Capture
Network Flow captures TCP/UDP connections and stores them as a CSV.
PCAP will capture IP packets and save them as a PCAP file.
The duration of the Network Capture is determined by the user.
osquery
Use your own bespoke osquery commands to collect live system artifacts, including processes, network activity, and configuration files.
View in Knowledge Base
Note that in the screenshot above, you can click the Info button at the end of each item in the collection list to open the Knowledge Base for a detailed explanation of the item and what we collect.
Once you have configured all the necessary settings, click "Save" to create your custom acquisition profile.
Edit Profiles: You can edit existing profiles by selecting the profile and making necessary changes.
Delete Profiles: Remove profiles that are no longer needed to keep your list organized.
Duplicate Profiles: Create a copy of an existing profile to use as a template for a new one.
User Privileges for acquisition profiles can be managed via ‘Settings > Roles’
Check Profiles: Ensure your acquisition profiles are up-to-date with the latest evidence types and investigation requirements.
Test Profiles: Test new profiles in a controlled environment to ensure they collect the intended data.
Average Time Taken: In the Acquisition Profiles table, you can see the ‘Average Time’ taken by each profile. This can be useful when considering the performance and efficiency of individual profiles.
The Profile Types column provides a quick visual reference to indicate which operating systems—Windows, Linux, or macOS—are supported by each acquisition profile.
By using acquisition profiles in AIR, you can efficiently gather relevant data for your investigations, saving time and ensuring comprehensive evidence collection.

The AIR Responder is a compact, cross-platform, zero-dependency, and zero-configuration package that functions as a virtual incident responder, delivering Level 3–4 SOC expertise directly to your assets. It interfaces with the AIR Console to execute precise, user-defined tasks with minimal resource consumption. This design offers comprehensive investigative coverage without the overhead of continuous monitoring, thereby enhancing both cyber resilience and operational efficiency.
The AIR responder maintains regular communication with the AIR Console via what, in its simplest form, is known as HTTP polling, and what we like to call ‘a visit’. The visit interval is typically around 30 seconds for environments with fewer than 1,000 assets. For larger environments, the interval is calculated using the following formula:
intervalSeconds = MANAGED_ENDPOINT_COUNT / 100



The responder sends these visit requests to inform the AIR console that it is online and ready to receive any task assignments awaiting action.
If the responder does not make a visit at the required interval, it will be shown as offline in the AIR console.
If the responder does not make a visit for 30 days, it will be marked as unreachable. This status will be resolved immediately once the asset is back online.
If the responder does not collect a task assignment within 30 days of its creation, it will expire and will not be actioned even when the asset reconnects and the responder visits next.
Simply put, when the AIR responder collects a task assignment from the AIR console, it carries out the task and provides a report back to the AIR console upon completion. On the other hand, when the AIR responder is in an idle state, it periodically (as discussed above) sends visit requests to the AIR console to check if any new tasks have been assigned to it. During these visit requests, the AIR responder only checks for task assignments and does not perform any other operations.
The AIR responder is capable of executing various tasks when assigned by the AIR Console. These tasks include:
Acquisition
Hunt/Triage scanning (YARA, Sigma, osquery, MITRE ATT&CK)
Isolation
interACT sessions
Auto Tagging
Disk/Volume Imaging
Investigation (Timeline)
Baseline
Log Retrieval
Certificate Authority Update
Migration
Reboot
Shutdown
Update
Uninstall
Both the Acquisition and Disk Image tasks support uploading collected evidence to external repositories, including Amazon S3, Azure Blob Storage, FTPS, SFTP, and SMB. These tasks enable the AIR responder to securely transfer the acquired evidence or disk images to the designated repositories for storage and further analysis.
By utilizing the supported protocols and repositories, the AIR responder ensures that the collected evidence or disk images are transmitted and stored securely in the designated locations. This enables efficient storage, accessibility, and collaboration, facilitating the management and analysis of acquired data in a secure and scalable manner.
AIR has an option for Windows, macOS, and Linux AIR responders to transmit evidential collections directly to external evidence repositories, thereby efficiently minimizing the utilization of local disk space:
The AIR responder maintains robust security by implementing a range of measures, including:
Encrypted Traffic: The traffic between the AIR responder and the AIR Console, as well as between the AIR responder and any evidence repositories, is encrypted using TLS 1.2 and, if available on the server, TLS 1.3. If neither of these two TLS protocols is available, the connection will not be established. This ensures that data in transit is protected against interception and unauthorized access.
Communication: The AIR Console does not initiate the sending of task assignments to the AIR responder; rather, it is the AIR responder that initiates the interaction by asking the AIR Console if it has any tasking assignments ready for it to run. This approach significantly reduces the risk of various security attacks, as it controls the communication flow and reduces the AIR responder's exposure to external threats.
Privileged Account Usage: On macOS and Linux, the AIR responder uses the root account, while on Windows, it uses the system account. This level of access control makes it difficult for other users to tamper with the application, thereby enhancing its security.
Regular Internal Penetration Testing: Before every release, our internal penetration testing team conducts thorough penetration testing. This proactive approach helps identify and mitigate potential vulnerabilities.
Secure Libraries and Third-Party Applications: We consistently use updated and vulnerability-free libraries and third-party applications. This precaution in maintaining up-to-date software components protects against known security vulnerabilities.
Supply Chain Attack Prevention: Measures are in place to protect against supply chain attacks, and our DevOps team continuously improves these. This is crucial to prevent threats that could compromise the software development and deployment process.
Continuous Source Code Scanning: The source code is regularly scanned by security tools to identify potential vulnerabilities. This constant monitoring enables the quick identification and resolution of any security issues that arise in the codebase.
Digital Signing: The use of digital signatures adds a layer of security, ensuring the authenticity and integrity of our software. This helps prevent tampering and verifies that the software has not been altered after it was signed.
Blackbox Analysis: The binary undergoes Blackbox analysis, a method of testing the software’s external functioning without delving into its internal structure. This type of analysis has been performed on the AIR responder. It helps in identifying security vulnerabilities from an outsider’s perspective, providing a critical view of the system's external defenses.
Graybox Analysis: For the AIR responder project, Graybox analysis has been conducted. This testing method combines both the internal and external examination of the software, providing a more comprehensive security overview.
Functioning like a server application, the AIR responder does not use databases. Instead, it operates by saving reports as individual files using SQLite. These reports are subsequently forwarded to the AIR Console. This approach simplifies the data handling process, enabling the efficient and secure storage and transfer of information.
We continuously advance our development process by implementing the SCRUM methodology, complemented by unit and integration testing. The use of both unit and integration testing is crucial for maintaining high-quality standards and ensuring that each component of our product functions seamlessly individually and as part of the whole system.
After the initial installation, it is normal to observe a small amount of memory being allocated, typically around 30MB to 40MB, with no significant CPU or disk usage during idle states. This behavior is expected and can be attributed to the necessary resources required for the AIR responder to function correctly.
During idle states, the AIR responder remains in standby mode, pending its next call to the Console to collect any new tasking assignments. The allocated memory is utilized to maintain the AIR responder's core functionality and to ensure prompt responsiveness when new tasks are assigned.
When the AIR responder receives an acquisition task, the evidence collection process is carried out by a subprocess called Tactical (or Incident Response Evidence Collector on Windows). During the acquisition process, it is normal to observe increased CPU and memory usage as the Tactical sub-process actively collects and processes the evidence.
The increase in CPU and memory usage is a result of the intensive data gathering and analysis performed by the Tactical sub-process. It utilizes system resources to capture and process the required evidence efficiently, ensuring the integrity and completeness of the collected data.
The extent of CPU and memory usage during the acquisition task may vary depending on factors such as the size and complexity of the evidence being collected. Once the acquisition is completed, the CPU and memory usage will typically return to normal levels, reflecting the completion of the resource-intensive task.
A Hunt/Triage task does not involve running the Tactical sub-process for evidence collection. Instead, the Hunt/Triage task is executed within the AIR responder, utilizing its internal capabilities to analyze and evaluate the collected data.
Although the CPU usage for a Hunt/Triage task is typically low, it is still possible to set a CPU policy for the task.
The log file of the running AIR responder provides valuable information about CPU usage, memory usage, and other system resources. Here is an example of the log entries about system and service resources:
INFO 2024-01-04 18:45:25+03:00 2.31.2 triage: resmon: SysStats{GoHeapAlloc: 2.3 MB, GoHeapSys: 12 MB, NumGoroutines: 27, NumCPU: 16} file:pkg/resmon/handlers.go:16 func:resmon.(*LoggingStatsHandler).HandleSysStats
INFO 2024-01-04 18:45:26+03:00 2.31.2 triage: resmon: PidStats{PID: 9460, Name: AIR.exe, CPU: 14.7%, AvgCPU: 25.9%, Mem: 56 MB, NumFDs: 341, NumCPU: 16} file:pkg/resmon/handlers.go:21 func:resmon.(*LoggingStatsHandler).HandlePidStats
The log file for the AIR responder can be found at the following location:
C:\Program Files (x86)\Binalyze\AIR\agent\AIR.log.txt
You can navigate this path on your system to access the log file and view the relevant information about CPU usage, memory usage, and other resources as logged by the AIR responder during its operation.
Similar scenarios can be observed on macOS with the built-in Activity Monitor application. To access detailed process information, simply click on the (i) button within the Activity Monitor.
On Linux, an alternative option for resource monitoring is to use htop instead of the built-in app top. The htop option offers enhanced capabilities and can be installed by following these steps:
Open the terminal.
Run the command: sudo apt-get install htop (for Ubuntu/Debian-based distributions) or sudo yum install htop (for CentOS/Fedora-based distributions).
Once installed, type htop in the terminal and press Enter to launch the application.
Using htop provides a more comprehensive and user-friendly interface for monitoring system resources on Linux.
There is also a CLI tool named resmon specifically developed for internal usage. It can be used to gather resource usage data related to the AIR responder and its subprocesses, storing them in a local database.
By default, resmon will monitor the AIR responder if no flags are given. However, you can monitor other processes by providing a PID flag or a process name flag. For more detailed information on its usage, a usage document for resmon can be provided upon request.
The information collected by resmon is stored in a local database, which includes numerous entries for the monitored process and its subprocesses. Due to the abundance of entries with comprehensive details, reading and interpreting the data can be a challenging task.
To address this, a script has been developed alongside resmon to visualize these outputs. It displays the CPU and memory usage of the processes (including subprocesses) monitored by resmon in a graphical format.
In the following section, we will share the resmon results as it monitored various task assignments being executed by the AIR responder. Throughout the tasks, resmon will continuously monitor the AIR responder and its subprocesses, generating a comprehensive local database that captures the output of resource monitoring.
For easy visualization, we will utilize a feature of a resmon designed to focus on visualizing its output by presenting the CPU and memory usage in intuitive graphical representations. These visualizations offer valuable insights into the resource utilization of the AIR responder and its subprocesses throughout each tasking assignment, from start to finish.
Analysis of an Acquisition Task
Below, you will find two graphs illustrating the CPU and Memory usage of the AIR responder. These graphs represent the resource utilization from the moment an acquisition task is started through to its completion.
Duration
Report Size (Zipped)
Database Size
Event Record Count
Drone
Total Disk Space
Used Disk Space
06m29s
199KB
38KB
10091
Enabled
512 GB
176 GB
Analysis of an Acquisition Task (with CPU limit of 50%)
In this scenario, we will examine the CPU and Memory usage of the AIR responder while running tasks received from the AIR Console, with a specific condition: the CPU usage of the AIR responder is limited to 50%.
The visualized graphs provided below depict the resource utilization, explicitly focusing on the CPU and Memory usage of the AIR responder. These graphs illustrate the performance of the AIR responder, highlighting its ability to effectively manage CPU allocation while executing tasks received from the AIR Console.
The script can occasionally display temporary CPU usage spikes that surpass the process's CPU limit as a result of aggregating subprocesses.
Duration
Report Size (Zipped)
Database Size
Event Record Count
Drone
Total Disk Space
Used Disk Space
06m48s
200KB
39KB
10102
Enabled
512 GB
176 GB
Analysis of a Hunt/Triage Task
Let's examine the resource usage of the AIR responder when a Hunt/Triage task is received from the AIR Console.
Duration
Hunt/Triage Rule Type
Total Disk Space
Used Disk Space
CPU Limit
19m33s
YARA
512 GB
176 GB
100%
Analysis of a Hunt/Triage Task (with CPU limit of 50%)
Similar to an acquisition task, a Hunt/Triage task can also be configured with a CPU limit for executing the AIR responder. The following graphs illustrate the resource usage of a Hunt/Triage task running with a CPU limit of 50%.
Duration
Hunt/Triage Rule Type
Total Disk Space
Used Disk Space
CPU Limit
27m09s
YARA
512 GB
176 GB
50%
Installation of the AIR Responder on your assets is managed via the Assets button in the Main Menu:
The AIR Responder installer is a zero-configuration package that contains the console address already embedded in it.
You can deploy the AIR Responder in multiple ways:
Downloading an installation package (Windows, macOS, Linux, Chrome, and ESXi)
Copying a PowerShell Command (Windows)

Copying a CURL Command (macOS and Linux)
Copying a WGET Command (macOS and Linux)
Downloading a PowerShell Script (Windows)
Downloading the Asset installer (macOS and Linux)
Manual installation via Active Directory/SCCM.
Generation of a shareable Deployment Link (Windows, macOS, Linux, Chrome, and ESXi)
In the sections that follow, we will look at the deployment of AIR Responders to Windows, Linux, and Mac operating systems.
The AIR Responder is a 'zero-config' deployment, as the file name has all the information you need for quickly deploying a Responder.
This level of detail in the filename provides all the information needed as a digitally signed binary - this prevents issues with security solutions, and to date, not one issue has arisen.
The file name example shown here has 4 main components:
2.38.7 - is the Responder version number.
air-demo.ACME.com - is the address of the console with which the Responder will be communicating
176 - is the console's internal organization number ID.
And the apparently random mixture of letters and numbers, 9df51c56a73341f4, is the - Deployment Token.
386 - describes the processor architecture of the machine on which the Responder will run.
There are multiple ways of deploying the responder, all of which are designed to be quick and scalable. Let's take a look at the different ways in which you can deploy the AIR Responder to your assets:
From the Main Menu, select 'Assets' and then 'All Assets' from the Secondary Menu. Now you will see the page name 'Assets' and next to that is the Action Button, which for the Assets page is labeled '+ Add New.'
When this '+ Add New' button is selected, three deployment options are offered in a drop-down menu:
Each one of the options will present the user with a wizard that will walk through the options needed for the chosen deployment method:
Deploy New - For assets that are attached to a network that is visible to the AIR console
Cloud Account - For assets that reside in AWS EC2, and Virtual Machines in Microsoft Azure.
Off-Network - To generate triage and collection packages for assets that are not connected to a visible network.
When you choose 'Deploy New', you'll be prompted via a wizard to determine if the Responder should establish a direct connection to the AIR console or if utilizing a Relay Server connection would be more suitable for your environment. Relay Server is explained here.
The second step of the deployment wizard offers distinct deployment options for all currently supported network-attached operating systems: Windows, Linux, and macOS.
The command varies based on the Organization affiliation. An example PowerShell command to copy is provided below:
This command is specific to your console address and Organization.
This script can be downloaded from your AIR Console. Ensure you select or are working in the appropriate Organization before downloading.
If you prefer, the Windows responder can be deployed using SCCM with the following command:
For a silent installation you can use the following command:
These commands are specific to your console address and Organization.
The MSI for the Windows Responder can be downloaded directly from the page, as depicted in the screenshot below:
All three operating systems support the Shareable deployment link available in the console. This method is often the most straightforward—simply share the link with your client, allowing them to download and install the Responder. An example link is shown below:
Unlike Windows, macOS and Linux do not utilize PowerShell commands or scripts. Instead, they can employ CURL or WGET commands. Alternatively, you can use the Shareable deployment page link mentioned above.
Example of CURL deployment command:
Example of WGET deployment command:
These commands are specific to your console address and Organization.
For macOS, the user/administrator must allow Full Disk Access (FDA) to the AIR Responder for it to have full access to the disk for collections.
Open "System Settings -> Privacy & Security -> Full Disk Access"
Toggle the switch 'on' to enable Full Disk Access for the AIR Responder.
After installing a responder on macOS, users will need to grant Full Disk Access permission. To guide users through this process, a pop-up will appear after installation stating: "Allow AIR to access files on your disk. Open System Settings > Security & Privacy > Full Disk Access to grant permission to "AIR".
If Full Disk Access permission is not granted when starting any Acquisition, this will be shown in the Acquisition logs:
After toggling on the FDA on this page, select the /opt/binalyze/air/agent/air file in the file manager that opens. Once this is done, our responder will appear in the list under the name 'air', ready for the user to toggle 'on'.
The AIR responder operates as an executable binary running as a service rather than a traditional macOS application. This approach ensures consistency across platforms like Linux and macOS.
Since AIR is not packaged as a macOS app, it does not include a .plist file, which typically contains the application icon metadata. Consequently, it cannot display a logo on the Full Disk Access page.
This design choice does not affect the functionality or performance of AIR.
While the pop-up effectively guides users in manually installed scenarios, it presents challenges for enterprise environments where macOS devices are managed via Mobile Device Management (MDM). MDM allows remote application installation and security policy enforcement, including granting Full Disk Access.
Customers prefer silent installations for MDM-deployed responders, as permissions are already set through security policies, eliminating the need for pop-ups. However, our current setup cannot distinguish between user-initiated and MDM-initiated installations, resulting in the pop-up appearing in all cases.
We are actively working on a solution to address this issue for seamless enterprise deployments.

Responder establishes connections to remote servers over HTTP, HTTPS, NATS, SFTP, FTPS, SMB, and Websocket over HTTPS. Please note that the supported protocols are subject to change in the future.
Responder primarily communicates with the AIR Console via HTTP/S, as HTTP/S is the most essential protocol.
There is a requirement to tunnel the responder’s connections over a different server, not to directly communicate with AIR Console or other servers. As a result, we implemented the proxy feature for all types of communication methods, which is entirely optional. Although it is optional, we enable the Proxy feature of the responder by default during the initial installation. However, previous installations without the proxy feature are unaffected, and the feature remains disabled. This means upgrading an existing responder to a version <= v2.15.x will not be affected by this new feature as long as it is not enabled explicitly. Enabling and disabling the proxy feature manually is documented below. Please note that, as of now, the only way to enable or disable the proxy feature is to run the related commands on the machine. That is to say, it cannot be changed remotely via the AIR Console.
In this document, we are only interested in Forward proxy servers. Other types of proxy servers, such as reverse proxy servers and transparent proxy servers, are out of scope.
We only support forward proxy servers that support HTTP Tunneling with the HTTP Connect method and SOCKS5 proxy servers.
Note that we also support HTTP proxy servers using SSL/TLS encryption via HTTPS protocol; however, the SSL certificate of the server must be a valid certificate, or the CA certificate of the server certificate must be loaded to the machine to determine whether the encrypted connection is secure or not.
The responder uses the system’s SSL/TLS certificate validation methods and AIR Console’s CA certificate to validate the certificates of the remote server.
We will also describe how we handle Authenticated Proxy Servers below.
We anticipate encountering more issues with HTTPS proxy servers, authenticated proxy servers, and SSL interception/bumping in the future. Because of this, the proxy configuration of these types of servers and the Agent must be performed carefully.
There are different ways to configure the proxy settings for all supported platforms, including the machine and the Agent. Due to historical reasons, responders can detect proxy settings on different platforms from various sources. As a result, our detection of the proxy settings logic is described below.
If ProxyEnabled: false or missing ProxyEnabled option in the agent’s config.yml file, we skip reading proxy settings. Missing ProxyEnabled option means ProxyEnabled: false, implicitly.
Try to find proxy settings using AIR_HTTP_PROXY and AIR_HTTPS_PROXY environment variables. If they are set, they will be used as the source of proxy settings.
Note that setting one of the HTTP_PROXY, HTTPS_PROXY, AIR_HTTP_PROXY, or AIR_HTTPS_PROXY environment variables is sufficient to use a single proxy address.
You must restart the responder’s service if there is a change in the environment variables or config.yml file changes to let the Agent take the new values into account.
AIR_HTTP_PROXY, AIR_HTTPS_PROXY, HTTP_PROXY, HTTPS_PROXY, http_proxy, and https_proxy proxy server environment variables are used if they are set. We use them to configure the Agent's proxy behavior. In addition to these environment variables AIR_NO_PROXY, NO_PROXY, and no_proxy environment variables are also used if they are set as long as a proxy server is set in the proxy environment variables.
We use an additional AIR_ prefix for responder-specific proxy environment variables to let users set a proxy server for only the Agent or use a different proxy server for the responder.
Since the Agent runs as a service or daemon, users need to configure the proxy settings using the following method.
If /etc/environment.d/binalyze-air-agent.conf does not exist, create it.
Open /etc/environment.d/binalyze-air-agent.conf and add the following example lines to it:
AIR_HTTP_PROXY=proxy.example.com:3128 AIR_HTTPS_PROXY=proxy.example.com:4128 AIR_NO_PROXY=localhost,127.0.0.0/8,::1
The responder's systemd service file will read the changes made to the edited file. Therefore, it is necessary to reload the changes and restart the service for the changes to take effect. You can do this by running the following commands:
sudo systemctl daemon-reload sudo systemctl restart Binalyze.AIR.Agent.service
You should keep in mind that using systemd’s approach to override service settings to set proxy settings can create an issue after uninstalling the responder from the machine. Because the overridden service settings are retained after uninstallation, installing a responder to that machine after uninstallation will utilize the overridden service configuration.
Setting proxy environment variables, as in Linux, is a way to configure a proxy for the responder.
As the agent works as a daemon in the macOS system with root privileges under the launchd service manager, we can set the environment variables like this
Open the launchd.conf file to add environment variables (Note that the file may not exist, you can create it)
sudo nano /etc/launchd.conf
Append the proxy environment variables like this. Alternatively, you can skip AIR_ prefix but it will affect other programs in the system.
# ... setenv AIR_HTTP_PROXY proxy.example.com:3128 setenv AIR_HTTPS_PROXY proxy.example.com:4128 setenv AIR_NO_PROXY *.local,169.254/16
The method above will require a reboot to be effective. Alternatively, you can use the other methods mentioned below without needing to reboot.
The second method for setting environment variables on macOS is to use the following commands.
sudo launchctl setenv AIR_HTTP_PROXY proxy.example.com:3128 # You should use the same command for other environment variables
The method above requires restarting the responder’s service like this:
sudo launchctl unload /Library/LaunchDaemons/com.binalyze.air-agent.plist sudo launchctl load -w /Library/LaunchDaemons/com.binalyze.air-agent.plist
Apple explains the third way to set a proxy for macOS systems with this link
You should bear in mind that only HTTP and HTTPS proxies are supported via System Settings > Network > ... > Proxies not SOCKS or other types.
macOS saves the credentials of the proxies set by System Sessions to the Key Chain. The responder doesn’t support Key Chain access to get the credentials, so we don’t recommend using authenticated proxies using this method. You can set the username and password of the proxy server using environment variables, which are explained in this document.
Question:
How do I set environment variables that persist across reboots for a specific daemon/service on a macOS system?
Answer:
To set environment variables that are persisted across reboots for a specific daemon or service on a macOS system, you can use the launchctl setenv command as follows:
Identify the name of the daemon or service that you want to set the environment variables for. This name is typically specified in the Label key in the daemon's property list file, which is stored in /Library/LaunchDaemons or /System/Library/LaunchDaemons for system-level daemons, or in ~/Library/LaunchAgents for user-level daemons and services.
Use the launchctl setenv command to set the environment variables for the daemon or service, using the -n option to specify the name of the daemon or service. For example, to set the FOO
sudo launchctl setenv -n com.example.myservice FOO bar
To verify that the environment variable has been set, you can use the launchctl getenv command, using the -n option to specify the name of the daemon or service. For example:
sudo launchctl getenv -n com.example.myservice FOO
This should print bar.
Keep in mind that the launchctl setenv command only sets environment variables for processes launched by launchd, and it does not modify the environment of processes that are already running. If you want to set environment variables for a running process, you will need to use a different method, such as setting the variables in the process's shell configuration file or using the export command in the process's shell.
Also, note that the launchctl setenv command only sets environment variables for daemons and services managed by launchd. If you want to set environment variables for other processes, you will need to use a different method.
The responder’s service/daemon name is com.binalyze.air-agent on macOS systems.
As explained for Linux and macOS, the responder can also use the specified proxy environment variables for Windows.
The responder runs as a service using SYSTEM account on Windows systems. Because of this, a user’s proxy settings cannot be accessed by the SYSTEM account without using unnecessarily complex methods.
The responder can only access the system’s environment variables, not the user’s environment variables.
The first method is to use the proxy environment variables to set a proxy for the responder. There are different ways to set environment variables for Windows.
Question:
Please instruct me on how to set system environment variables for Windows systems.
Answer:
To set system environment variables on a Windows system, you will need to follow these steps:
Press the Windows key + R to open the Run dialog.
Type "sysdm.cpl" and press Enter to open the System Properties window.
Switch to the "Advanced" tab.
Click the "Environment Variables" button.
To set a new system environment variable, click the "New" button under the "System variables" section.
To edit an existing system environment variable, select it from the list and click the "Edit" button.
In the Edit Environment Variable window, enter the name and value for the environment variable.
Click "OK" to save the changes.
Close the Environment Variables and System Properties windows.
Note: You will need to have administrator privileges to make these changes.
The second method is to use the netsh command to set winhttp proxy.
Question:
Please instruct me on how to set a proxy using the netsh command on a Windows system with an administrator account.
Answer:
Press the Windows key + X and select "Command Prompt (Admin)" to open an elevated Command Prompt window.
Type the following command and press Enter to set the proxy server:
netsh winhttp set proxy [proxy_server_name]:[port]
Replace [proxy_server_name] and [port] with the actual values for your proxy server and port.
If your proxy requires authentication, you can use the following command to set the username and password:
netsh winhttp set proxy [proxy_server_name]:[port] "user=[username]&password=[password]"
Replace [proxy_server_name], [port], [username], and [password] with the actual values for your proxy server, port, username, and password.
To verify that the proxy has been set, you can use the following command:
netsh winhttp show proxy
This will display the current proxy settings.
Note: You will need to have administrator privileges to run these commands.
The third way of setting a proxy is to use the netsh winhttp set advproxy command. This is introduced after Windows 11.
Create a settings.json file like this:
{"Proxy": "10.211.55.3:3128", "ProxyBypass": "", "AutoconfigUrl": "", "AutoDetect": false}
Run the command like this:
netsh winhttp set advproxy setting-scope=machine settings-file=settings.json
To clear advproxy settings, you need to run the same command but settings.json should have empty fields like this
{"Proxy": "", "ProxyBypass": "", "AutoconfigUrl": "", "AutoDetect": false}
The fourth way of setting a proxy using the Windows registry is as follows:
Open the registry editor and go to the Internet Settings key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
Set the values using proxy settings like this
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings] "ProxyEnable"=dword:00000001 "ProxyOverride"="*.noproxy.example.com" "ProxyServer"="example.com:3128" "AutoConfigURL"="http://example.com/wpad.dat"
You need to restart the responder’s service if proxy settings are changed.
Automatic proxy means that we use the URL of the PAC file to get the proxy URL from the Operating System. Automatic proxy support is only applicable to macOS and Windows platforms. Other proxy settings are considered static proxy settings, and they require restarting the responder service if any changes are made.
There may be some issues if Automatic Proxy is used with our Isolation feature on Windows.
Because, for automatic proxies, wpad.dat or PAC files are fetched from the AutoConfigURL address by the Windows platform’s own services. Therefore, these services may not have access to the target URL during DNS resolution or HTTP request processing. This may grant the responder direct access to the remote servers, bypassing the proxy. If a direct connection is not allowed from that machine, the responder will not be able to communicate with the AIR Console. It is recommended that users exercise such scenarios for Windows platforms.
The responder obtains the proxy server’s authentication information using the proxy server's URL. For example, if a proxy is set using an environment variable AIR_HTTP_PROXY=http://username:[email protected]:3128 then the responder parses the URL and uses the username and password of the proxy server to send to the proxy server with an HTTP header, e.g. Proxy-Authorization: Basic encoded-credentials`
For authenticated SOCKS5 proxy servers, the URL structure is the same for authorization, and it uses the SOCKS5 protocol's authentication method, e.g. socks5://username:[email protected]:1080
The responder uses a NATS client to connect to a NATS server over port 4222. NATS is used to get notifications from the AIR Console about the tasks in the queue. This helps the responder complete tasks promptly when assigned.
As our proxy requirement for the responder is to connect over a proxy server always, if it is set, the responder tries to connect to AIR Console’s NATS server using HTTP or SOCKS5 proxies, like regular HTTP connections. It uses the same HTTP Connect method to create a tunnel to the server for the NATS protocol.
If the proxy server does not support tunneling on port 4222, the responder attempts to connect to the NATS server directly, thereby bypassing the proxy server. Note that this is the default behavior for all non-HTTP protocols, SMB, FTPS, and SFTP.
SMB uses port 445.
SFTP uses port 22.
FTPS uses port 21 and high ports for data transfer.
If the proxy server is configured to open a tunnel for our supported protocols, there shouldn’t be any problem. Because of the fallback mechanism we use to bypass the proxy server when creating a tunnel fails, the responder should be able to send data to the remote server.
If the proxy server is configured to intercept SSL traffic between the responder and the AIR Console, several essential points must be considered.
CA certificate of the AIR Console should be considered valid by the proxy server. Otherwise, the proxy server cannot open a tunnel to the AIR Console.
The responder uses Websocket for interACT communication over the HTTPS protocol. However, some proxy servers, e.g., Squid, may not support WebSocket communication well when SSL Bumping is enabled. So, the proxy server must be configured to handle Websocket over HTTPS with SSL bumping if interACT is used. This can be verified by opening an interACT terminal on the AIR Console and seeing the established connection.
By default, the proxy support is enabled after fresh new installations of version >=2.16.x.
When the proxy support is enabled, the config.yml file contains theProxyEnabled: true entry. When this configuration is set to false or missing, it means it is disabled.
You can enable or disable proxy support by running the following commands after the installation or upgrade is successful. Note that you must be an administrator or root to run these commands.
Windows Enable:
"C:\Program Files (x86)\Binalyze\AIR\agent\AIR.exe" configure --enable-proxy
Windows Disable:
"C:\Program Files (x86)\Binalyze\AIR\agent\AIR.exe" configure --disable-proxy
Linux/macOS Enable:
/opt/binalyze/air/agent/air configure --enable-proxy
Linux/macOS Disable:
/opt/binalyze/air/agent/air configure --enable-proxy
These commands enable or disable proxy support to perform the following actions.
Check if the configuration change can be applied; otherwise, exit
Stop the responder’s service
Change the responder’s configuration
Start the responder’s service
Note that exit code 0 (zero) means success. Other exit codes indicate that an error occurred.
AIR.Responder_2.38.7_air-demo.ACME.com_176_9df51c56a73341f4_386_.msi[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true}
(New-Object System.Net.WebClient).DownloadFile("https://air-demo.ACME.com/api/endpoints/download/0/deploy/windows?deployment-token=d297145XXXXXXXX", "$PWD\deploy-responder.ps1")
.\deploy-responder.ps1<#
2022-2024 (c) AIR
AIR Responder Powershell Script for Windows
PLEASE DO NOT EDIT! This file is automatically generated at 2024-05-02T13:49:58
VERSION 2.39.9
#>
<#
.SYNOPSIS
This script installs the AIR Responder using given parameters or default values are used.
This script requires administrator privileges!
MSI file is temporarily stored in %LOCALAPPDATA%\binalyze\air\agent
.DESCRIPTION
Powershell script to deploy the AIR Responder.
.PARAMETER Version
The version of the AIR Responder to be deployed.
.PARAMETER ConsoleAddress
The address of the AIR Console without https:// prefix, only domain address.
.PARAMETER OrganizationId
The organization id to register the AIR Responder.
.PARAMETER DeploymentToken
A Valid deployment token to deploy the AIR Responder.
.PARAMETER ConnectionRouteID
Set Connection Route Id for the AIR Responder.
.PARAMETER ConnectionRouteAddress
Set Connection Route Address for the AIR Responder.
.PARAMETER AllowInsecureTlsVersion
Allow insecure TLS version for the AIR Responder.
#>
Param ([string]$Version="2.39.9",
[string]$ConsoleAddress="air-demo.ACME.com",
[string]$OrganizationId="0",
[string]$DeploymentToken="d297145dXXXXXXXX",
[string]$ConnectionRouteID="{{.AIR_CONNECTION_ROUTE_ID}}",
[string]$ConnectionRouteAddress="{{.AIR_CONNECTION_ROUTE_ADDRESS}}",
[switch]$AllowInsecureTlsVersion)
$downloadDir = "$env:LOCALAPPDATA\binalyze\air\agent"
Remove-Item $downloadDir -Force -Recurse -ErrorAction Ignore
New-Item -Path $downloadDir -ItemType Directory
Push-Location
Set-Location -Path $downloadDir
$arch = "386"
if ([Environment]::Is64BitProcess) {
$arch = "amd64"
}
if ($ConnectionRouteID -like '{*') {
$ConnectionRouteID = ""
}
if ($ConnectionRouteAddress -like '{*') {
$ConnectionRouteAddress = ""
}
$fileSuffix = ""
if ($ConnectionRouteID) {
$fileSuffix = "{0}_{1}_" -f $arch,$ConnectionRouteID
if ($ConnectionRouteAddress) {
$fileSuffix = "{0}{1}_" -f $fileSuffix,$ConnectionRouteAddress
}
}
$file = "{0}\AIR.Responder_{1}_{2}_{3}_{4}_{5}.msi" -f $downloadDir,$Version,$ConsoleAddress,$OrganizationId,$DeploymentToken,$fileSuffix
$url = "https://{0}/api/endpoints/download/{1}/windows/msi/{2}?deployment-token={3}" -f $ConsoleAddress,$OrganizationId,$arch,$DeploymentToken
Write-Debug "file: $file"
Write-Debug "url: $url"
if ($AllowInsecureTlsVersion) {
Write-Host "Allowed insecure TLS versions for the AIR Responder. If this flag is set, the AIR Responder will connect to the AIR Console with system default TLS version"
} else {
try {
[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12 -bor [System.Net.SecurityProtocolType]::Tls13
} catch {
Write-Host "TLS1.3 and TLS1.2 is not supported on this operating system, please try to use AllowInsecureTlsVersion flag."
}
}
[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true}
(New-Object system.net.webclient).DownloadFile($url,$file)
$process = Start-Process C:\Windows\System32\msiexec.exe -ArgumentList "/i $file /quiet /norestart" -PassThru -Wait
$process.WaitForExit()
if ($process.ExitCode -eq 0) {
Write-Debug "AIR Responder is installed successfully."
Remove-Item -Path $file -ErrorAction Ignore
} else {
Write-Debug "MSI failed. ExitCode: $($process.ExitCode)"
Pop-Location
exit $process.ExitCode
}
Pop-Location
msiexec /i AIR.responder_2.24.2_air-demo.ACME.com_0_d297145XXXXXXXX_.msi /qn /norestartmsiexec /i AIR.responder_2.26.4_air-demo.ACME.com_176_9df51c56XXXXXXXX_.msi /qn /norestarthttps://air-demo.ACME.com/#/shareable-deploy?token=d297145dXXXXXXXXsudo curl -kfsSL "https://air-demo.ACME.com/api/endpoints/download/176/deploy/darwin?deployment-token=9df51c56XXXXXXXX" | sudo shsudo wget --no-check-certificate -O- "https://air-demo.ACME.com/api/endpoints/download/176/deploy/darwin?deployment-token=9df51c56XXXXXXXX" | sudo shWindows
C:\Program Files (x86)\Binalyze\AIR\agent
macOS
/opt/binalyze/air/agent
Linux
/opt/binalyze/air/agent







Try to find proxy settings using HTTP_PROXY, HTTPS_PROXY, http_proxy, and https_proxy environment variables. If they are set, they will be used as the source of proxy settings. Note that this is the default approach for UNIX-like systems.
If the proxy environment variable is not set, we use the operating system's API to retrieve the proxy settings.
barcom.example.myserviceThe AIR standalone collector currently provides support for execution on ESXi 6.5+ systems.
VMware ESXi is a type of hypervisor, which is software that creates and runs virtual machines (VMs). It is a part of VMware's vSphere product suite and is used for enterprise-level virtualization. ESXi is popular due to its stability, performance, and extensive feature set for managing and running virtual machines.
AIR offers a robust approach for evidence collection from ESXi platforms. DRONE is not currently supported for ESXi systems. This is achieved through a standalone ESXi collector, available for download on the Assets page of your AIR console:
Assets>Add New>Deploy New>Direct connection to AIR Console >ESXi
After running Responder using your chosen method, the collected evidence should be converted into a PPC file. This PPC file can then be imported into the AIR Console. Once imported, the asset will be displayed alongside all other assets in AIR, ensuring seamless integration and visibility within the platform.
After ingestion into AIR the ESXi evidence is parsed and pesented in the Investigation Hub in the normal way:
However, you can if required decompress the tar.gz file to independently access and examine the evidence. Typically, the evidence will include the following: :
System Info: Basic system information about the ESXi machine.
Bash History: Command history executed on the Bash shell.
Collect Bash Files: Gathering files associated with the Bash shell.
Environment Variables: Variables defined in the system environment.
Having run the binary the progress will be displayed in the user's terminal/shell:
Extract the Package:
Extract the contents of the downloaded Off-Network Responder zip file.
Prepare Your Evidence:
Copy your ESXi evidence file into the same extracted folder.
Run the Command:
Execute the following command, replacing your_ESXi_evidence_name with the actual name of your ESXi evidence file:
Following these steps will create a new folder containing a Case.ppc file. Please import this Case.ppc file into the AIR Console.
This process will ensure that your ESXi evidence is accurately processed and seamlessly integrated into the AIR platform.
Collect /etc Files: Gather files under the /etc directory.
Log Files: Collecting various log files.
SSH Config: Retrieves the configuration settings related to the SSH (Secure Shell) protocol.
SSH Authorized Keys: Collects information about authorized SSH keys, which are used for secure authentication.
SSH Known Hosts: Gathers details about known hosts in the context of SSH.
File System Enumeration: Involves enumerating and collecting information about the file system on the ESXi machine.
/etc Collector
All files under /etc is collected
6
Log Files
All files under /var/log and /scratch/log is collected
7
Spool Files
All files under /var/spool is collected
Disk Usage Human Readable
8
System Hostname
9
VMware Version
10
System Info
11
Shell Aliases
12
Environment Variables
13
ESX Advanced Configuration
14
ESX FCoE Configuration
15
ESX FCoE Networking
16
ESX IPSec Configuration
17
ESX IPsec Policy
18
ESX Module List
19
ESX Module Query
20
ESX Multipathing Info
21
ESX NAS Configuration
22
ESX Network Interface Cards
23
ESX Routing Table
24
ESX Network Routes
25
ESX IPv6 Routing Table
26
ESX IPv6 Network Routes
27
ESX SCSI Devices List
28
ESX VMKnic List
29
ESX Volume List
30
ESX VSwitch List
31
ESX Configuration Info
32
List all of the CPUs on this host.
33
List usb devices and their passthrough status.
34
List the boot device order, if available, for this host.
35
Display the current hardware clock time.
36
Get information about memory.
37
List all of the PCI devices on this host.
38
Get information about the platform.
39
Information about the status of trusted boot. (TPM, DRTM status).
40
List active TCP/IP connections.
41
List configured IPv4 routes.
42
List configured IPv6 routes.
43
List ARP table entries.
44
List the VMkernel network interfaces currently known to the system.
45
List configured Security Associations.
46
List configured Security Policys.
47
Print a list of the DNS server currently configured on the system in the order in which they will be used.
48
List the rulesets in firewall.
49
List the Physical NICs currently installed and loaded on the system.
50
List the virtual switches current on the ESXi host.
51
Hostname
52
Get Open Network Files
53
Get Unix Socket Files
54
Get the network configuration.
55
Get the DNS configuration.
56
Get the IP forwarding table.
57
Gets information about virtual NICs.
58
Displays information about virtual switches.
59
Lists the installed VIB packages.
60
Gets the host acceptance level. This controls what VIBs will be allowed on a host.
61
Display the installed image profile.
62
List the VMkernel UserWorld processes currently on the host.
63
Collect the list open files.
64
Report a snapshot of the current processes including used time, verbose, session ID and process group, state and type.
65
List the NAS volumes currently known to the ESX host.
66
List the NFS v4.1 volumes currently known to the ESX host.
67
List the volumes available to the host. This includes VMFS, NAS, VFAT and UFS partitions.
68
Display the mapping of logical volumes with physical disks.
69
List the VMkernel modules that the system knows about.
70
List the enforcement level for each domain.
71
Get FIPS140 mode of ssh.
72
Get FIPS140 mode of rhttpproxy.
73
List the advanced options available from the VMkernel.
74
List VMkernel kernel settings.
75
Display the date and time when this system was first installed. Value will not change on subsequent updates.
76
Show the current global syslog configuration values.
77
Show the currently configured sub-loggers.
78
Display WBEM Agent configuration.
79
List local user accounts.
80
Display the current system clock parameters.
81
List permissions defined on the host.
82
Display the product name, version and build information.
83
List networking information for the VM's that have active ports.
84
List the virtual machines on this system. This command currently will only list running VMs on the system.
85
Get the list of virtual machines on the host.
86
List Summary status from the vm.
87
Configuration object for the vm.
88
Virtual devices for the vm.
89
Datastores for all virtual machines.
90
List of networks for all virtual machines.
91
List registered VMs.
ID
Collector Name
Collected Files
1
History Files
.ash_history, .bash_history, .sh_history, .tsch_history, .psql_history, .sqlite_history, .mysql_history, .vsql_history, .lesshst, .viminfo
2
Files of Interest
.bashrc, .bash_logout, .bash_login, .bash_profile .mkshrc, .pam_environment, .profile, .zshrc, authorized_keys, known_hosts, ssh_config
3
Cronjob Files
/etc/cron.hourly, /etc/cron.daily, /etc/cron.weekly, /etc/cron.monthly, /etc/cron.d
4
Cronjob Related Files
*If any executable file is found in crontabs, it is collected.
ID
Collector Name
1
Process Snapshot Detailed
2
Process Snapshot Verbose
3
Open Files
4
User Info
5
Disk Usage
6
Disk Usage By User
ID
Collector Name
Description
1
File Listing
All files in the system is enumerated with following infos; File Name,File Type,Size (bytes),Access Rights,User ID,User Name,Group ID,Group Name,Number of Hard Links,Mount Point,Inode Number,Birth Time,Last Access Time,Modification Time,Change Time
2
Executable Hashes
All files' MD5 hashes that has executable permission in the system is collected




5
7
offnetwork_windows_amd64 esxi --input 220240621113447-EsxiDATA.tar.gz
Evidence: AmCache Description: Collect Amcache and Parse Category: System Platform: windows Short Name: amc Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): Yes
Amcache.hve is a registry hive maintained by Windows Application Compatibility infrastructure. It tracks information about executed programs, installed applications, device drivers, and application shortcuts.
Amcache provides historical evidence of program execution and can contain information about programs that have been deleted. The format changed significantly between Windows 7/8 (old format with Root\File and Root\Programs keys) and Windows 10 (new format with Root\InventoryApplication* keys).
This collector gathers structured data about amcache.
This collector:
Collects Windows\appcompat\Programs\Amcache.hve and transaction logs
Parses the offline registry hive using OfflineRegistry library
Detects format version (old vs new)
Extracts data from appropriate registry keys based on version
New Format Keys:
Root\InventoryApplication
Root\InventoryApplicationFile
Root\InventoryApplicationShortcut
Old Format Keys:
Root\File
Root\Programs
Amcache is invaluable for program execution analysis and historical application tracking. Investigators use this data to prove program execution (even deleted programs), establish installation timelines, identify malware execution, track application versions and updates, correlate file hashes with known malware, detect portable executable usage, and reconstruct user application usage patterns.
RootDirPath
Installation directory
C:\Program Files\Google\Chrome
InstallDate
Installation date
2023-10-01T10:00:00
KeyLastWriteTime
Registry key modification time
2023-10-15T14:30:00
PackageFullName
UWP package name
InstallSourceType
Installation source
2
MSIProductCode
MSI product code GUID
{12345678-1234-1234-1234-123456789ABC}
MSIPackageCode
MSI package code GUID
{12345678-1234-1234-1234-123456789ABC}
UninstallKey
Uninstall registry key
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall...
UninstallString
Uninstall command
"C:\Program Files\App\uninstall.exe"
ProgramID
Associated program ID
00001234567890abcdef
FileID
File identifier (SHA1)
a1b2c3d4e5f6...
ProductName
Product name from file metadata
Google Chrome
ProductVersion
Product version
118.0.5993.89
Name
File name
chrome.exe
FilePath
Lowercase long path
c:\program files\google\chrome\application\chrome.exe
OriginalFileName
Original file name from PE header
chrome.exe
SHA1
SHA1 hash
a1b2c3d4e5f6...
Publisher
Publisher name
Google LLC
FileSize
File size in bytes
3145728
USN
Update Sequence Number
123456789
IsOsComponent
Whether file is OS component
FALSE
KeyLastWriteTime
Registry key modification time
2023-10-15T14:30:00
KeyName
Registry key name
chrome.lnk
LNKPath
Path to shortcut file
C:\Users\user\Desktop\Chrome.lnk
KeyLastWriteTime
Registry key modification time
2023-10-15T14:30:00
KeyName
Device identifier
USB\VID_1234&PID_5678
Class
Device class
USB
Description
Device description
USB Mass Storage Device
DriverName
Driver name
usbstor.inf
DriverPackageStrongName
Driver package identifier
oem12.inf:...
Model
Device model
SanDisk Ultra
FirstInstallDate
First installation date
2023-09-01T12:00:00
InstallDate
Last installation date
2023-10-01T14:00:00
KeyLastWriteTime
Registry key modification time
2023-10-15T14:30:00
Manufacturer
Device manufacturer
SanDisk
Provider
Driver provider
Microsoft
Service
Associated service
USBSTOR
DriverVerDate
Driver version date
2023-06-15T00:00:00
DriverVerVersion
Driver version
10.0.19041.1234
HWID
Hardware ID
USB\VID_1234&PID_5678&REV_0100
Inf
INF file name
usbstor.inf
ParentID
Parent device ID
USB\ROOT_HUB30
DriverID
Driver identifier
usbstor.inf:...
ContainerID
Container ID GUID
{12345678-1234-1234-1234-123456789ABC}
ClassGuid
Class GUID
{36FC9E60-C465-11CF-8056-444553540000}
COMPID
Compatible IDs
USB\Class_08
BusReportedDescription
Bus-reported description
USB Mass Storage Device
KeyName
Driver key name
ntfs.sys
Product
Product name
Microsoft Windows
ProductVersion
Product version
10.0.19041.1234
DriverName
Driver file name
ntfs.sys
DriverVersion
Driver version
10.0.19041.1234
DriverPackageStrongName
Driver package identifier
oem0.inf:...
DriverCompany
Driver company
Microsoft Corporation
DriverLastWriteTime
Driver last write time
2023-06-01T00:00:00
DriverTimeStamp
Driver timestamp
2023-06-01T00:00:00
KeyLastWriteTime
Registry key modification time
2023-10-15T14:30:00
DriverIsKernelMode
Whether driver is kernel-mode
TRUE
DriverSigned
Whether driver is signed
TRUE
Service
Associated service
NTFS
Inf
INF file name
ntfs.inf
DriverId
Driver identifier
ntfs.sys:...
DriverCheckSum
Driver checksum
0x12345678
ImageSize
Driver image size
524288
VolumeID
Volume GUID
{12345678-1234-1234-1234-123456789ABC}
FileID
File entry identifier
00001234abcd
ProgramID
Associated program ID
00005678efgh
ProductName
Product name
Google Chrome
CompanyName
Company name
Google LLC
FilePath
File path
C:\Program Files\Google\Chrome\Application\chrome.exe
FileDescription
File description
Google Chrome
FileVersion
File version
118.0.5993.89
FileSize
File size in bytes
3145728
SHA1
SHA1 hash
a1b2c3d4e5f6...
CompilationTime
PE compilation timestamp
2023-09-15T10:00:00
FileModificationTime
File modification time
2023-09-20T14:00:00
FileCreationTime
File creation time
2023-10-01T12:00:00
EntryCreationTime
Amcache entry creation
2023-10-01T12:05:00
KeyLastWriteTime
Registry key modification time
2023-10-15T14:30:00
MFTEntryNumber
MFT entry number
12345
MFTSequenceNumber
MFT sequence number
1
ProgramID
Program identifier
00005678efgh
VolumeIDFileID
Space-separated list of file IDs
00001234abcd 00005678ijkl
ProgramName
Program name
Google Chrome
ProgramVersion
Program version
118.0.5993.89
FilePaths
Space-separated file paths
C:\Program Files\Google\Chrome...
Publisher
Publisher name
Google LLC
InstallDate
Installation date
2023-10-01T10:00:00
KeyLastWriteTime
Registry key modification time
2023-10-15T14:30:00
InstallSourceType
Installation source type
2
UninstallKeys
Uninstall registry keys
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall...
ProductCode
Product code GUID
{12345678-1234-1234-1234-123456789ABC}
PackageCode
Package code GUID
{12345678-1234-1234-1234-123456789ABC}
MSIProductCodes
MSI product codes
{12345678-1234-1234-1234-123456789ABC}
MSIPackageCodes
MSI package codes
{12345678-1234-1234-1234-123456789ABC}
Root\InventoryDevicePnpRoot\InventoryDriverBinary
ProgramID
Program identifier
00001234567890abcdef
ProgramName
Application name
Google Chrome
Version
Application version
118.0.5993.89
Publisher
Software publisher
Google LLC
1
DiskFilesystem
No
Yes
Yes
2
DiskFilesystem
No
Yes
Yes
3
DiskFilesystem
No
Yes
Yes
4
DiskFilesystem
No
Yes
Yes
5
Network
Yes
Yes
No
6
Applications
No
No
Yes
7
Applications
No
No
Yes
8
Applications
No
No
Yes
9
System
Yes
Yes
Yes
10
Applications
No
No
Yes
11
System
Yes
Yes
No
12
Applications
No
No
Yes
13
Applications
No
No
Yes
14
System
Yes
Yes
No
15
System
Yes
Yes
No
16
Applications
No
No
Yes
17
Applications
No
No
Yes
18
Applications
No
No
Yes
19
Applications
Yes
Yes
No
20
Applications
Yes
Yes
No
21
Applications
Yes
Yes
No
22
Applications
Yes
Yes
No
23
Applications
Yes
Yes
No
24
Applications
Yes
Yes
No
25
Applications
Yes
Yes
No
26
Applications
Yes
Yes
No
27
Applications
Yes
Yes
No
28
Applications
Yes
Yes
No
29
Applications
Yes
Yes
No
30
Applications
Yes
Yes
No
31
Applications
Yes
Yes
No
32
System
Yes
Yes
No
33
System
No
Yes
Yes
34
Applications
No
No
Yes
35
Applications
Yes
Yes
No
36
Applications
Yes
Yes
No
37
Applications
Yes
Yes
No
38
Applications
Yes
Yes
No
39
Applications
Yes
Yes
No
40
Applications
Yes
Yes
No
41
Applications
Yes
Yes
No
42
Applications
Yes
Yes
No
43
Applications
Yes
Yes
No
44
Applications
Yes
Yes
No
45
Applications
Yes
Yes
No
46
Applications
Yes
Yes
No
47
Applications
Yes
Yes
No
48
Applications
No
No
Yes
49
System
Yes
Yes
Yes
50
System
No
No
Yes
51
Applications
No
No
Yes
52
Applications
No
No
Yes
53
System
Yes
Yes
No
54
Applications
No
No
Yes
55
Applications
No
No
Yes
56
Applications
No
No
Yes
57
Network
Yes
Yes
No
58
Applications
No
No
Yes
59
Network
Yes
Yes
No
60
Applications
No
No
Yes
61
Applications
Yes
Yes
No
62
Applications
No
No
Yes
63
Applications
Yes
Yes
No
64
Applications
Yes
Yes
No
65
Applications
Yes
Yes
No
66
Applications
Yes
Yes
No
67
Applications
Yes
Yes
No
68
Applications
Yes
Yes
No
69
Applications
Yes
Yes
No
70
Applications
Yes
Yes
No
71
Applications
Yes
Yes
No
72
System
Yes
Yes
No
73
System
Yes
Yes
No
74
System
Yes
Yes
No
75
Applications
No
No
Yes
76
Applications
No
No
Yes
77
Applications
No
No
Yes
78
Applications
Yes
Yes
No
79
Applications
Yes
Yes
No
80
Applications
Yes
Yes
No
81
Applications
Yes
Yes
No
82
Applications
Yes
Yes
No
83
Applications
Yes
Yes
No
84
System
No
Yes
Yes
85
Applications
Yes
Yes
No
86
Applications
Yes
Yes
No
87
Applications
Yes
Yes
No
88
Applications
Yes
Yes
No
89
Applications
Yes
Yes
No
90
Applications
Yes
Yes
No
91
Applications
Yes
Yes
No
92
Applications
Yes
Yes
No
93
Applications
Yes
Yes
No
94
Applications
Yes
Yes
No
95
Applications
Yes
Yes
No
96
Applications
Yes
Yes
No
97
Applications
No
No
Yes
98
System
Yes
Yes
No
99
Applications
No
No
Yes
100
EventLogs
Yes
Yes
No
101
EventLogs
Yes
Yes
Yes
102
EventLogs
Yes
Yes
No
103
System
Yes
Yes
Yes
104
Applications
No
No
Yes
105
Applications
No
No
Yes
106
Applications
No
No
Yes
107
Applications
No
No
Yes
108
Applications
No
No
Yes
109
Applications
No
No
Yes
110
Applications
No
No
Yes
111
System
Yes
Yes
No
112
Applications
No
No
Yes
113
Applications
No
No
Yes
114
Applications
Yes
Yes
No
115
Applications
Yes
Yes
No
116
Applications
Yes
Yes
No
117
Applications
Yes
Yes
No
118
Network
Yes
Yes
No
119
System
Yes
Yes
No
120
Applications
No
No
Yes
121
Applications
No
No
Yes
122
Applications
No
No
Yes
123
Applications
No
No
Yes
124
Applications
No
No
Yes
125
Memory
No
Yes
Yes
126
Applications
No
No
Yes
127
Network
Yes
Yes
Yes
128
Applications
Yes
Yes
Yes
129
Applications
Yes
Yes
Yes
130
Applications
No
No
Yes
131
System
No
Yes
Yes
132
Network
Yes
Yes
No
133
System
No
Yes
Yes
134
System
Yes
Yes
No
135
System
Yes
Yes
No
136
System
Yes
Yes
Yes
137
System
Yes
Yes
No
138
System
Yes
Yes
Yes
139
Applications
No
No
Yes
140
System
Yes
Yes
No
141
Applications
No
No
Yes
142
Applications
No
No
Yes
143
Applications
No
No
Yes
144
DiskFilesystem
No
Yes
Yes
145
DiskFilesystem
No
Yes
Yes
146
DiskFilesystem
No
Yes
Yes
147
DiskFilesystem
Yes
No
No
148
Applications
No
No
Yes
149
Applications
No
No
Yes
150
System
Yes
Yes
No
151
Applications
No
No
Yes
152
Applications
No
No
Yes
153
Applications
No
No
Yes
154
Applications
No
No
Yes
155
Applications
No
No
Yes
156
Applications
No
No
Yes
157
Applications
No
No
Yes
158
Applications
No
No
Yes
159
Applications
No
No
Yes
160
Applications
No
No
Yes
161
Applications
No
No
Yes
162
Applications
No
No
Yes
163
Applications
No
No
Yes
164
System
No
Yes
Yes
165
Network
Yes
Yes
No
166
Network
Yes
Yes
No
167
Applications
No
No
Yes
168
System
Yes
Yes
No
169
System
Yes
Yes
No
170
System
No
Yes
Yes
171
Applications
No
No
Yes
172
System
Yes
Yes
No
173
Applications
No
No
Yes
174
Applications
Yes
Yes
No
175
Applications
Yes
Yes
No
176
Applications
Yes
Yes
No
177
Applications
Yes
Yes
No
178
Applications
Yes
Yes
No
179
Applications
Yes
Yes
No
180
Applications
Yes
Yes
No
181
Applications
Yes
Yes
No
182
Applications
Yes
Yes
No
183
Applications
Yes
Yes
No
184
Applications
Yes
Yes
No
185
Applications
Yes
Yes
No
186
Applications
Yes
Yes
No
187
System
Yes
Yes
No
188
Memory
No
Yes
Yes
189
Applications
No
No
Yes
190
System
Yes
Yes
No
191
System
No
Yes
No
192
System
No
Yes
No
193
System
No
Yes
No
194
System
No
Yes
No
195
System
No
Yes
No
196
System
Yes
Yes
No
197
System
No
Yes
Yes
198
System
Yes
Yes
Yes
199
Network
Yes
Yes
No
200
Applications
Yes
Yes
No
201
Applications
Yes
Yes
No
202
Applications
Yes
Yes
No
203
Applications
Yes
Yes
No
204
Applications
Yes
Yes
No
205
Applications
Yes
Yes
No
206
Applications
Yes
Yes
No
207
Applications
Yes
Yes
No
208
Applications
Yes
Yes
No
209
Applications
Yes
Yes
No
210
Applications
Yes
Yes
No
211
Applications
Yes
Yes
No
212
Applications
Yes
Yes
No
213
System
Yes
Yes
No
214
Memory
No
Yes
Yes
215
System
No
Yes
Yes
216
Applications
No
No
Yes
217
System
No
Yes
Yes
218
System
Yes
Yes
No
219
System
Yes
Yes
No
220
System
No
Yes
Yes
221
System
Yes
Yes
Yes
222
Applications
No
No
Yes
223
Applications
No
No
Yes
224
Applications
No
No
Yes
225
System
Yes
Yes
No
226
System
Yes
Yes
No
227
System
Yes
Yes
No
228
System
No
Yes
Yes
229
System
Yes
Yes
Yes
230
Applications
No
No
Yes
231
System
Yes
Yes
Yes
232
Applications
No
No
Yes
233
Applications
No
No
Yes
234
Applications
No
No
Yes
235
System
Yes
Yes
Yes
236
DiskFilesystem
Yes
Yes
No
237
System
Yes
Yes
No
238
System
Yes
Yes
No
239
Applications
No
No
Yes
240
Applications
No
No
Yes
241
Applications
No
No
Yes
242
Applications
No
No
Yes
243
Applications
No
No
Yes
244
Applications
No
No
Yes
245
Applications
No
No
Yes
246
System
Yes
Yes
Yes
247
Applications
No
No
Yes
248
System
No
Yes
Yes
249
Applications
No
No
Yes
250
Memory
No
Yes
Yes
251
Applications
No
No
Yes
252
System
Yes
Yes
No
253
Network
Yes
Yes
No
254
Applications
No
No
Yes
255
Applications
No
No
Yes
256
Applications
No
No
Yes
257
Applications
No
No
Yes
258
System
No
Yes
Yes
259
Applications
No
No
Yes
260
Applications
No
No
Yes
261
Applications
No
No
Yes
262
Applications
No
No
Yes
263
Applications
No
No
Yes
264
Applications
No
No
Yes
265
System
Yes
Yes
No
266
System
Yes
Yes
No
267
Network
Yes
Yes
No
268
DiskFilesystem
Yes
Yes
No
269
DiskFilesystem
No
Yes
Yes
270
DiskFilesystem
No
Yes
Yes
271
DiskFilesystem
Yes
Yes
No
272
Applications
No
No
Yes
273
Applications
No
No
Yes
274
System
Yes
Yes
Yes
275
System
Yes
Yes
No
276
System
Yes
Yes
No
277
System
Yes
Yes
No
278
Applications
No
No
Yes
279
Applications
No
No
Yes
280
Applications
No
No
Yes
281
Applications
No
No
Yes
282
Applications
No
No
Yes
283
Applications
Yes
Yes
No
284
Applications
Yes
Yes
No
285
Applications
Yes
Yes
No
286
Applications
Yes
Yes
No
287
Applications
Yes
Yes
No
288
Applications
Yes
Yes
No
289
Applications
Yes
Yes
No
290
Applications
Yes
Yes
No
291
Applications
Yes
Yes
No
292
Applications
Yes
Yes
No
293
Applications
Yes
Yes
No
294
Applications
Yes
Yes
No
295
Applications
Yes
Yes
No
296
DiskFilesystem
Yes
Yes
No
297
System
No
Yes
Yes
298
System
Yes
Yes
No
299
System
Yes
Yes
No
300
Applications
No
No
Yes
301
Applications
No
No
Yes
302
Applications
No
No
Yes
303
Applications
No
No
Yes
304
Applications
Yes
Yes
No
305
Applications
No
No
Yes
306
System
No
No
Yes
307
System
No
Yes
Yes
308
Applications
No
No
Yes
309
Applications
No
No
Yes
310
System
Yes
Yes
Yes
311
Network
Yes
Yes
No
312
System
Yes
Yes
No
313
Applications
No
No
Yes
314
Applications
No
No
Yes
315
Applications
No
No
Yes
316
Applications
No
No
Yes
317
Applications
No
No
Yes