Product Features

Remotely Collect Data from Linux

While Windows dominates desktop and server OS market share, Linux is not to be overlooked, especially when it comes to servers. And typically, the type of data that resides on Linux servers is highly sensitive or confidential information—intellectual property, personally identifiable information, customer information, credentials, and more—all of which are the targets of cyberattacks.

And consider workforces are now spread out all over the world. Employees are working from home, “devices” are virtual and they’re in the cloud, offices and networks are geographically dispersed. The need to remotely collect data from target endpoints has never been greater.

Linux Remote Acquisition

Magnet AXIOM Cyber supports the remote collection of data from Windows, macOS, and Linux operating systems. For Linux remote acquisition specifically, AXIOM Cyber supports remote collection of target endpoints (desktop devices and servers) running Linux. Supported Linux distributions include:

  • RedHat Linux 8
  • CentOS 8
  • Amazon Linux 2
  • Ubuntu

Linux Targeted Locations

To speed up remote acquisitions, only collect the data that you need by choosing preconfigured, targeted locations that leverages Linux artifacts supported by AXIOM Cyber. Or if you’d rather build your own custom targeted locations, you can do that too!

Looking for a handy reference on Linux artifacts and where to find them? We’ve got you covered: download the Linux Targeted Locations Quick Reference Guide today.

If you haven’t tried AXIOM Cyber and would like to try it for yourself, request a trial today.

Subscribe today to hear directly from Magnet Forensics on the latest product updates, industry trends, and company news.

Start modernizing your digital investigations today.

Top