Collect evidence from Windows endpoints manually using the Trend Micro Incident Response Toolkit or by executing a playbook to support threat investigation and incident response.
Important
|
Procedure
- In the Trend Vision One console, go to .
- Click Collect Evidence.
- Configure the following settings for manual collection.SettingDescriptionEvidence typesThe types of evidence to collect.
Note
-
For Windows endpoints, basic information is required.
Archive location on endpointLocation of the evidence package on the local endpoint.Important
-
The local archive does not have encryption, and remains on the endpoint until deleted. This might allow access to sensitive information to anyone with access to the file system or reveal the presence of an ongoing investigation.
-
Evidence archives take up hard drive space and may impact endpoint performance.
-
- Click Download TMIRT () to download the Trend Micro Incident Response Toolkit.
- Deploy the toolkit to the endpoints on which you want to collect evidence.
- Execute the toolkit.
- Extract the contents of the zip archive.
- Execute
TMIRT.ps1
as an administrator.Important
If you cannot execute theTMIRT.ps1
command, the following command directly downloads and executes the toolkit based on your OS version and architecture:.\TMIRT.exe evidence --config_file .\config.json
- Upload the evidence packages the toolkit generates to the
Forensics app.
Tip
You can upload multiple files at once. Each file must not exceed 4 GB.
The Forensics app
begins processing the uploaded evidence packages.
Important
|