Collect evidence to support threat investigation and incident response.

This task is supported by the following services:
  • Trend Vision One
    • Windows agent
After creating a workspace and adding endpoints to the workspace in the Forensics app, you can collect detailed evidence from potentially compromised endpoints for internal investigations into critical incidents that occurred on your network and may require further attention.
  • Evidence collection requires that you enable XDR endpoint sensor on target endpoints.
  • Evidence archives use the same folder structures as the SANS Institutes and CyLR tool.


  1. In the Trend Vision One console, go to XDR Threat InvestigationForensics.
  2. Click the name of the workspace that contains the endpoints from which you want to collect evidence.
    This task automatically adds all collected evidence to the workspace.
  3. Collect evidence from the desired endpoints.
    1. Select one or more endpoints.
    2. Click Collect Evidence.
    3. Specify the evidence types you want to collect.
    4. (Optional) Specify a Description for the response or event.
    5. Click Create.
      Trend Vision One creates the task and displays the current task status in Response Management.
  4. Monitor the task status.
    1. Open Response Management.
    2. (Optional) Locate the task using the Search field or by selecting Collect Evidence from the Action dropdown list.
    3. View the task status.
      • In progress (in-progress.jpg): Trend Vision One sent the command and is waiting for a response.
      • Queued (queued.jpg): The managing server queued the command because the agent was offline.
      • Successful (successful.jpg): The command was successfully executed.
      • Unsuccessful (error.jpg): An error or time-out occurred when attempting to send the command to the managing server, the agent is offline for more than 24 hours, or the command execution timed out.