Remotely Collect Data from Linux
While Windows dominates desktop and server OS market share, Linux is not to be overlooked, especially when it comes to servers. And typically, the type of data that resides on Linux servers is highly sensitive or confidential information—intellectual property, personally identifiable information, customer information, credentials, and more—all of which are the targets of cyberattacks.
And consider workforces are now spread out all over the world. Employees are working from home, “devices” are virtual and they’re in the cloud, offices and networks are geographically dispersed. The need to remotely collect data from target endpoints has never been greater.
Linux Remote Acquisition
Magnet AXIOM Cyber supports the remote collection of data from Windows, macOS, and Linux operating systems. For Linux remote acquisition specifically, AXIOM Cyber supports remote collection of target endpoints (desktop devices and servers) running Linux. Supported Linux distributions include:
- RedHat Linux 8
- CentOS 8
- Amazon Linux 2
Linux Targeted Locations
To speed up remote acquisitions, only collect the data that you need by choosing preconfigured, targeted locations that leverages Linux artifacts supported by AXIOM Cyber. Or if you’d rather build your own custom targeted locations, you can do that too!
Looking for a handy reference on Linux artifacts and where to find them? We’ve got you covered: download the Linux Targeted Locations Quick Reference Guide today.
If you haven’t tried AXIOM Cyber and would like to try it for yourself, request a trial today.