New Features

Three Ways to Use Remote Endpoint File Lists to Streamline Your Investigations

When you’re faced with a security incident or supporting an internal investigation, quickly obtaining Remote Endpoint File Lists (a full list of all the files and folders present on an endpoint or custodian’s machine) can help you answer key questions.

Specifically, “Was this file still present on the endpoint after the attack?” Or when a client or stakeholder wants to know, “How long will it take to collect and process this case?” These questions can be difficult to answer without a comprehensive list of all the files and folders currently on a machine.

Magnet AXIOM Cyber can automatically (or manually) generate a complete index of the files and folders currently on a remote endpoint – within a few minutes. Now, you can preserve that index and search it to help you during an investigation or for future reference.

In this post, we’ll explore how to use an endpoint file list in your investigation to search for potential evidence or help assess the overall scope of an investigation.

Remote Endpoint File Lists: How Are They Generated?

The file listing generates automatically if the “index remote endpoint” feature is enabled in AXIOM Cyber, but a remote file listing can also be generated manually on the targeted collection page.

It’s generated as a comma-separated .txt file, which is not processed post-collection but preserved in the case directory for your reference. For additional context, this index differs from parsing $MFT files in that the index AXIOM Cyber generates captures only the file names and directories currently found on the machine, the date modified, and the file size.

A screenshot from Magnet AXIOM Cyber showing the "Connect to Endpoints" options, with "Enable searching and filtering in the file browser" enabled.
Image 1: When this setting is enabled, AXIOM Cyber automatically saves the index of the endpoint.
A screenshot of the Files and Folders view of Magnet AXIOM Cyber, with the "Download file and folder listing from the endpoint" option selected.
Image 2: If, however, this option isn’t selected as shown in Image 1, you can still opt to select it when you’re in the Files & Folders view in AXIOM Cyber.

1. Estimate How Long Collection and Processing Will Take

You just received a large case involving several custodians from a stakeholder in your organization’s legal department, and they want to know how quickly you can return a report. How do you estimate how long it’ll take to perform the investigation?

In the context of eDiscovery, during Early Case Assessment (ECA), the file list can be used to quickly estimate collection and processing times by giving you a broad understanding of all files currently on a custodian’s machine and their respective file sizes.

2. Search for a File to Perform a Targeted Collection

For internal investigations or incident response, the presence of a file (or several files) can be quickly validated and preserved prior to a targeted collection. Searching the full file and folder list for the file(s) in question can help you pinpoint which end users or endpoints require a deep dive analysis and where to collect data from using Targeted Locations to save you even more time and effort. Queued collections combined with the file listing of 15 endpoints can be collected in under two hours under ideal network conditions.

3. Validate The Presence of a File

In scenarios where you’re being asked to “go back to the well,” a quick peek at the remote endpoint file list can indicate if a file was present on an endpoint, outside of the scope of the initial targeted collection. You can then go back to your stakeholder to advise that the file was present on the machine.

Additional Resources

To learn more about AXIOM Cyber and how it can help simplify your investigations, check out the following resources:

Try AXIOM Cyber today! Request a free trial here.

Subscribe today to hear directly from Magnet Forensics on the latest product updates, industry trends, and company news.

Start modernizing your digital investigations today.

Top