Remote Acquisition of Apple’s New M1-Based Endpoints with Magnet AXIOM Cyber
In this blog we’ll discuss AXIOM Cyber’s ability to acquire from M1-based Mac endpoints, a new chip unveiled by Apple this year.
In this blog we’ll discuss AXIOM Cyber’s ability to acquire from M1-based Mac endpoints, a new chip unveiled by Apple this year.
Let’s take a look back at 2020 for AXIOM Cyber and review some of the more notable feature additions.
Learn more about the introduction of logical forensic containers via AFF4-L in AXIOM Cyber 4.5 and how you can use AXIOM Cyber to make logical acquisitions of files and folders or process memory.
In this blog, we’ll review how to deploy an agent via command line from a Windows workstation to a Mac being investigated.
AXIOM 4.4 introduces support for results captured with the MAGNET Web Page Saver, the ability to choose the evidence summaries included in exports and more.
You have your legacy tools like EnCase, maybe a tool specifically for remote acquisitions like F-Response, but choosing the right tool is important so that you can do your job quickly and effectively.
In this blog, we’ll focus on how to export Teams data from the Security & Compliance Center for use in AXIOM Cyber.
AXIOM 4.3 introduces an all-new JSON viewer along with new & updated artifacts — including Microsoft Teams, Instagram, Chrome, and Uber. Within AXIOM Cyber 4.3, you can now also more reliably acquire data from Microsoft Azure.
Magnet AXIOM 4.2 and Magnet AXIOM Cyber 4.2 are now available for download! Get it now within AXIOM or over at Customer Portal. AXIOM 4.2 brings AFF4 support, the ability to ingest Skype Warrant Returns, and new WhatsApp data collection options, along with customized Targeted Locations and support for Office 365 Unified Audit Logs in … Continued
Since AXIOM Cyber’s inception we’ve made remote collection of artifacts that are frequently needed for investigations by including a list of preconfigured Targeted Locations. Evidence such as browser history, the $MFT, Pagefile.sys, registry files, and the macOS unified logs have quickly been accessible to users without examiners needing to remember the path locations, and manually … Continued