Views:

Collect evidence from Linux endpoints manually using the Trend Micro Incident Response Toolkit.

Important
Important
Evidence archives use the same folder structures as the SANS Institute and the CyLR tool.

Procedure

  1. In the Trend Vision One console, go to XDR Threat InvestigationForensicsPackages.
  2. Click Collect Evidence.
  3. Configure the following settings for manual collection.
    Setting
    Description
    Evidence types
    The types of evidence to collect.
    Note
    Note
    Archive location on endpoint
    Location of the evidence package on the local endpoint.
    Important
    Important
    • The local archive does not have encryption, and remains on the endpoint until deleted. This might allow access to sensitive information to anyone with access to the file system or reveal the presence of an ongoing investigation.
    • Evidence archives take up hard drive space and may impact endpoint performance.
  4. Click Download TMIRT (download-icon.png) to download the Trend Micro Incident Response Toolkit.
  5. Deploy the toolkit to the endpoints on which you want to collect evidence.
  6. Execute the toolkit.
    1. Extract the contents of the zip archive.
    2. Execute TMIRT.sh as the root user.
  7. (Optional) If you do not have enough privileges to execute scripts, execute the following commands.
    1. Discover the endpoint OS architecture by executing the uname -m command.
      Important
      Important
      • For AArch64 or ARM64 architecture, use the TMIRT-arm64.tgz toolkit.
      • For i386 or i686 architecture, use the TMIRT-x86.tgz toolkit.
      • For AMD64 or x86_64 architecture, use the TMIRT-x64.tgz toolkit.
    2. To extract the toolkit from the TGZ file, execute the ./tar -xf command with the correct TMIRT version based on your OS architecture.
    3. To begin collecting evidence, execute ./TMIRT evidence --config_file ./config.json.
  8. Upload the evidence packages the toolkit generates to the Forensics app.
    Tip
    Tip
    You can upload multiple files at once. Each file must not exceed 4 GB.
The Forensics app begins processing the uploaded evidence packages.
Important
Important
  • Processing one evidence package can take several minutes.
  • Do not close the browser tab or refresh the screen until the process finishes.