AXIOM Cyber Data Collection

1. Case Creation

Create a new case to organise and store all the evidence collected throughout the investigation.

Case Creation: Launch the AXIOM Process and select Create New Case

Add Case Information: Case Number: Assign a case number for tracking purposes, INC-1001 Case type: Select the appropriate case type, for example Intrusion/incident response

Select Location For Case Files Storage: Folder Name: Provide a meaningful name, such as <hostname> - Intrusion Investigation File path: A:\CASES

Select Location For Acquired Evidence Storage: Folder Name: Provide a meaningful name, such as <hostname> - Intrusion Investigation File path: A:\CASES

Add Scan Information: Scanned by: <investigator name>

NEXT: Go to Evident Sources

2. Evidence Sources

Remote Computer

Create New Agent

General Agent Settings: The agent will be saved to the default location: C:\AXIOM-Agents Agent ID: optional Operating System: Windows

Agent Masking Details: File name: AXIOM-Agent.exe SHOW MORE DETAILS (add as required or leave as is)

Survive Shutdown of Endpoint: Based on the investigation scenario, Leave or select: Keep the agent running on the endpoint after a shutdown

Connectivity Details: Examiner workstation hostname or IP address: <IP address of examiner's workstation> Port: <Portnumber> (8080) Reconnect delay: 10 seconds Disconnected Keep alive: 1 day (up to you)

Next, Create Agent

Create Agent

Review Agent Details <Review details>

Deploy Agent Select: Deploy Agent Endpoint IP address: Remote host IP address Username: Investigator AD username Password: AD password Agent location on endpoint: C:\Windows\Temp

Next: Deploy Agent Deployment in Progress Select: Connect to Agent Select: Connect to Endpoint

Select Items to Download Review and Select the Data From the Endpoint Targeted Locations: Select all available options Files and Drives: Files and Folders Select: Files and Folders as appropriate to investigations

Select Memory to Download Select: Individual processes OR Full memory acquisition

Important Note: Leave the tool to capture the data until finished; don't navigate away. Depending on the size and amount of files to be downloaded, it could take some time

When data capture is complete, select Next for the final section of EVIDENCE SOURCES: Preparing Selected Items Note: AXIOM will archive and do its final checks. When complete, click: Go to Evidence Sources and next click Go to Processing Details

3. Processing Details

PROCESSING DETAILS allow additional IOCs or search keywords to be added to the search.

Data Processing Options Quick Scan: A faster option focusing on key artefact types and providing quick insights into major evidence categories. Full Scan: Performs a comprehensive scan of all collected data, including a deeper search for deleted files, file system artefacts, and more granular evidence. Custom Scan: Customise the scan to focus on specific artefact types, such as system logs, user activity, or network traffic.

Add Keywords to Search Keyword Search Types:

Last updated