Product Features

How to Remotely Acquire from Mac Endpoints Using AXIOM Cyber’s Signed Agent and Jamf Pro

The use of Mac computers for business applications continues to grow steadily. In US-based enterprise companies (1,000+ employees), IDC reported the usage of macOS devices is around 23%, up 6% from 2 years prior. But when Apple made a recent update to their security controls, it prevented data collection from a Mac endpoint without triggering a Transparency Consent and Control (TCC) prompt on the endpoint — which limits acquisition abilities for investigations requiring a more subtle approach.

To ensure you can easily and consistently collect from remote Mac endpoints, we have updated AXIOM Cyber’s Mac agent and had the new agent signed by Apple. Because the agent has been signed, the endpoint automatically identifies the author and application, mitigating Apple’s Transparency, Consent, and Control (TCC) warnings.

To facilitate deploying the newly signed agent to devices running macOS, we have also partnered with Jamf. In speaking with our customers that frequently investigate Mac endpoints, Jamf emerged as the primary deployment tool for Mac and the industry standard in managing Apple endpoints.

In this blog post, we’ll show you how to deploy an AXIOM Cyber Mac signed agent using Jamf Pro in three steps.

Step 1: Create Agent

A standard workflow to follow to utilize Jamf Pro for deploying a remote acquisition agent created with AXIOM Cyber includes creating the agent, uploading it to the Jamf Pro dashboard or an accessible cloud storage location, and then pushing it to your target endpoints. 

As with other remote acquisition agents, start by selecting the REMOTE COMPUTER workflow from the SELECT EVIDENCE SOURCE screen in AXIOM Process.

A screenshot from Magnet AXIOM Cyber showing how to select a Remote Computer evidence source.

From the MANAGE AGENTS AND ENDPOINTS screen, choose the option to CREATE NEW AGENT and then walk through the agent configuration options, providing the desired agent name and choosing Mac from the Operating system drop-down menu.

A screenshot from Magnet AXIOM Cyber showing how to choose Mac from the Operating system drop-down menu.

One thing to note, AXIOM Cyber creates remote acquisition agents for macOS as signed applications.  This prevents using the typical agent masking options that are sometimes incorporated to prevent the endpoint user from recognizing that a remote acquisition agent is running on their device. Ensure the appropriate connectivity details are configured so that once deployed, the remote acquisition agent can communicate with your installation of AXIOM Cyber. Finally, choose the CREATE AGENT button in the lower right corner of the screen.

From the REVIEW AGENT DETAILS screen, make note of the saved location for the signed macOS agent just created for upload to your Jamf dashboard.

A screenshot from Magnet AXIOM Cyber showing where to find the Saved Location for the signed macOS agent for upload to Jamf.

Step 2: Deploy the Remote Acquisition Agent

The next step is to log in to your Jamf Pro dashboard and create a policy to facilitate the deployment of the remote acquisition agent. In this example, a policy to automatically deploy and execute the signed macOS agent on endpoints has been created.

A screenshot from the Jamf Pro policy dashboard showing a policy that will automatically deploy and execute a signed macOS agent on endpoints.

Selecting that policy will allow Jamf Pro administrators a variety of configuration options. By selecting the Scripts tab, we can specify the appropriate URL to download the remote acquisition agent, a URL for the agent configuration file, and a folder location to store these files on the target endpoint.

A screenshot of the Scripts tab in Jamf Pro.

The Files and Processes tab within the Jamf Pro dashboard will allow you to review the command executed on the remote computer. In this example, the Agent.app (signed application created in AXIOM Cyber) will run from the location specified in the Scripts tab. The accompanying command arguments will use the configuration file Agent.cfg and output information regarding the remote acquisition to the AgentLog.txt file specified in the command.

A screenshot of the Files and Processes menu in Jamf Pro.

Once you are satisfied with the configuration options, you can return to the Jamf Pro dashboard.  According to the frequency specified in your Jamf Pro deployment, the signed macOS remote acquisition agent will be deployed to the endpoint and run at the next endpoint check-in.

cd /usr/local/jamf/temp; open -gj 'Agent.app' --args '--config-file /usr/local/jamf/temp/Agent.cfg'

Once the Jamf Pro dashboard indicates the policy as complete, the agent has been downloaded to the target endpoint and is running.

A screenshot from Jamf Pro showing the policy is 100% completed.

Step 3: Connecting to the Remote Acquisition Agent

Once the action is marked complete in Jamf Pro, return to AXIOM Process, and the ENDPOINTS window of the MANAGE AGENTS AND ENDPOINTS screen will show the signed macOS remote acquisition agent as online – once it has connected to your installation of AXIOM Cyber.

A screenshot of the Endpoints window in AXIOM Process showing the agent status as Online.

Examiners can then select the CONNECT TO ENDPOINT link and choose the items of interest to download from the remote endpoint. This includes the typical macOS remote acquisition artifacts, options for using targeted locations (and target location profiles), and the files and drives option.

A screenshot of the typical collection process of an endpoint in Magnet AXIOM Cyber.

Additionally, examiners can leverage targeted location profiles that have been created in their installation of AXIOM Cyber.

A screenshot of Magnet AXIOM Cyber showing the Evidence Sources window, with "Manage Profiles" highlighted.

Once the chosen items have been downloaded, they will be hashed and then added to the case for processing.

A screenshot of evidence sources added to a case in Magnet AXIOM Cyber.

After case processing is complete, you can review the artifacts in AXIOM Examine just as with any other data source. For this example, the remote collection option to obtain the volatile artifacts for active connections and active users was enabled, with a sample of the active connections results shown in the Artifact Explorer of AXIOM Examine here:

A screenshot showing a sample of artifacts collected from a signed Mac agent.

This integration will allow customers to seamlessly deploy the new signed Mac agent from Magnet AXIOM Cyber—Magnet Forensics’ robust digital forensics and incident response solution for organizations—onto their macOS endpoints using Jamf Pro Mobile Device Management. If you are an existing AXIOM Cyber user, this functionality is available starting with version 7.4, which you can download from the Customer Portal.  If you haven’t tried AXIOM Cyber, request a free trial here to check it out yourself.

Subscribe today to hear directly from Magnet Forensics on the latest product updates, industry trends, and company news.

Start modernizing your digital investigations today.

Top