Skip to content
This repository has been archived by the owner on Jan 17, 2024. It is now read-only.

Forensics

Evan Burns edited this page May 23, 2016 · 11 revisions

The forensics module is targeted at providing analysts the capability to taken responsive actions on an endpoint to facilitate further investigation, collect evidence or initiate remediation based activities.

PowerShell Remoting

The module leverages PowerShell's Remoting capabilities to execute commands on remote endpoints. This allows for minimal configuration required, no additional agent on the endpoint and the full capabilities of PowerShell to be used as part of the response functionalities. The FalconOrchestrator.Forensics library contains the logic to establish a PowerShell connection, execute the provided command and return data if applicable.

Configuration Requirements

In order to leverage this functionality you will need to perform the following configuration tasks:

  • Enable PowerShell Remoting on all endpoints you need to interact with, this can be done by executing the command Enable-PSRemoting. For larger environments it is suggested to use a systems management tool or Group Policy.

  • By enabling this the Window Remote Management (WinRM) protocol will be used and listening on TCP port 5985. As such you should ensure that port is accessible for inbound communication both on the local Windows firewall and any network filtering devices between the Falcon Orchestrator server and target endpoint.

  • Lastly, you will need to supply credentials of an account (typically a domain account) that has sufficient access to the target endpoint(s) in order to carry out the intended commands.

Clone this wiki locally