Skip to content

Evidence Repositories

By default, XDR Forensics supports saving collected evidence locally on the asset with paths set as CiscoForensics for Windows, /opt/cisco/forensics for Linux, and /opt/cisco/forensics for macOS. Alternatively, users can opt to send their collections to Evidence Repositories, such as network shares, SMB, FTPS, SFTP, or to cloud storage, including AWS S3 buckets, Azure Blob Storage, and Google Cloud Storage (GCS).

The term Evidence Repository describes a remote location, separate from the actual asset subject to the tasking assignment, whether it is one of the six currently supported storage options.

You can create Evidence Repositories in three different ways:

  • From the “Evidence Repositories” page
  • During Policy creation
  • During the Acquisition task creation

A common query from our customers concerns the configuration of the Evidence Repository and its interaction with the XDR Forensics Console, particularly regarding evidence uploads and the required network permissions. Here’s what you need to know:

When configuring the Evidence Repository, it’s essential to understand the pathway through which evidence files are uploaded. Specifically, there might be confusion about whether these uploads occur directly from the assets to the Evidence Repository or if they go through the XDR Forensics console.

To clarify: Evidence files are uploaded directly from the assets to the Evidence Repository. This process necessitates configuring your firewall to permit traffic from the asset to the Evidence Repository on the relevant ports. For example, if using SMB for evidence transfer, you must allow access through port 445.

For the File Explorer feature within the XDR Forensics console to function correctly, the XDR Forensics console requires access to the Evidence Repository. This setup ensures that users can seamlessly browse and interact with the stored evidence directly through the XDR Forensics console interface.

Given these operational details, it’s necessary to adjust your firewall settings accordingly:

  • Allow traffic from your assets to the Evidence Repository, particularly if you are using specific protocols, such as SMB on port 445.
  • Ensure the XDR Forensics Console has access to the Evidence Repository to enable full functionality of the File Explorer feature.

Creating an evidence repository from “Evidence Repositories”

Section titled “Creating an evidence repository from “Evidence Repositories””

1. Navigate to the Evidence Repositories section by clicking the Settings button in the Main Menu and then select “Evidence Repositories” from the Secondary Menu.

2. Click the “+Add New” button at the top of the page.

3. From the New Evidence Repository window, provide a name to the repository and then select the relevant repository.

4. Depending on the type of evidence repository you choose, the required fields are adjusted accordingly:

  • Path: The location that is polled for evidence. If the IP address of the repository is “172.16.1.1”, and the folder name is “Share”, the path will be “\\172.16. 1.1\Share” without quotes.
  • Username (if required)
  • Password (if required)
  • Host: Hostname or IP address of the SFTP server.
  • Port: The port on which the SFTP server is listening to. The default port for SFTP is 22.
  • Path: The location directory that is polled for evidence.
  • Username (if required)
  • Password (if required)
  • Host: Hostname or IP address of the FTPS server.
  • Port: The port on which the FTPS server is listening. The default port for FTPS is 21.
  • Path: The location directory that is polled for evidence.
  • Username (if required)
  • Password (if required)
  • Region: Region name for the bucket that was created in.
  • Bucket: Name of the bucket
  • Access Key ID
  • Secret Access Key

Note: IAM users must have proper rights and permissions to access the S3 bucket.

Google Cloud Storage (GCS) (XDR Forensics 5.11+)

Section titled “Google Cloud Storage (GCS) (XDR Forensics 5.11+)”

Prerequisites:

RequirementDescription
GCP AccountActive Google Cloud Platform project
GCS BucketBucket for evidence storage
Service AccountService account with JSON key credentials
IAM RoleStorage Object Creator: Sufficient for Evidence Repository when used for acquisition, interACT get, and image tasks (upload only). Storage Object Admin (Recommended): Required for both Evidence Repository and Repository Explorer operations.

Configuration Fields:

FieldDescriptionExample
Bucket NameTarget GCS bucketevidence-storage-prod
Project IDGCP project IDmy-project-123
Service Account EmailService account emailair@project.iam.gserviceaccount.com
Private KeyRSA private key (PEM format)Must include BEGIN/END markers

The Console validates the configuration by testing the GCS connection before saving.

Supported Tasks:

XDR Forensics Responders can perform the following actions with GCS:

  • Acquisition tasks (including direct collection)
  • Acquire image tasks
  • interACT get command
  • interACT image command

Creating an evidence repository during Policy creation

Section titled “Creating an evidence repository during Policy creation”

1. Select the Settings button in the Main Menu and then select “Policies” from the Secondary Menu.

Click the “+Add New” button at the top of the page

2. Provide a name to the repository and then select the relevant repository type:

3. Select the relevant repository type by clicking on it.

4. Click the “Save” button.

5. The newly created repository will appear in the drop-down list. Select the relevant repository and finalize the process.

Creating an evidence repository during the acquisition task creation

Section titled “Creating an evidence repository during the acquisition task creation”

1. From the “Acquire Evidence” pane, click on the Evidence Repository radio button under the “Save Collected Evidence To” section.

2. Click in the “Repository” box and then select “+ Add new repository”:

3. From the window ‘New Repository’, complete the mandatory fields and select the type of repository you wish to add. There are six options:

  • SMB
  • SFTP
  • FTPS
  • Amazon S3
  • Azure Blob
  • Google Cloud Storage (GCS) (XDR Forensics 5.11+)

Evidence Repositories: New Repository Wizard

4. The newly created repository will appear in the drop-down list. Select the repository you want for this particular acquisition and finalize your Acquisition Task via the wizard.