Skip to content

Features

This feature enables or disables the interACT functionality in XDR Forensics.

  • interACT allows users to remotely open a shell session to interact with assets. Users can execute commands and scripts based on their assigned privileges.
  • Security Requirement: To use interACT, users must have enhanced security in place—either Two-Factor Authentication (2FA) or Single Sign-On (SSO). This ensures secure access to sensitive systems, limiting unauthorized use.
  • Read more about interACT here: interACT

This toggle controls whether Two-Factor Authentication (2FA) is required to use interACT.

SettingBehavior
ONUsers must have 2FA enabled to use interACT
OFFAny signed-in user can use interACT without 2FA

This feature allows XDR Forensics to capture and associate the public IP of an asset.

  • When enabled, the XDR Forensics Console parses HTTP request headers to extract the X-Forwarded-For header provided by proxies. This header reveals the public IP address of the responder (asset), even if it’s behind a proxy or firewall.
  • Visibility: If the feature is enabled, XDR Forensics will display the X-Forwarded-For IP address instead of the communication IP (the one directly visible to XDR Forensics). This provides more accurate forensic visibility of an asset’s location and origin.

Change the location and file name of collected evidence in Assets (on local machines) and remote Evidence Repositories.

You can configure a custom naming template by combining text and variables:

VariableDescription
Timestamp (Mandatory)Date/time of acquisition
Organization NameName of the organization
Acquisition ProfileProfile used for collection
Task TypeType of task performed
Task NameName of the acquisition task
Asset NameName of the asset
Case ID (If Exists)Associated case identifier

Evidence Repositories: Custom Evidence Collection Naming

Enforce mandatory case selection when starting tasks.

  • This feature requires users to associate every task they run in XDR Forensics with a specific case.
  • Benefit: It enforces structured workflows, ensuring that all investigations are organized and traceable to a particular case, which is critical for auditing and maintaining clarity in incident response efforts.

Provides cryptographic proof of when data was acquired and its integrity.

  • RFC3161 timestamping ensures that the data collected during acquisition has a digital signature, proving that the data existed at a specific time and has not been altered since.
  • When enabled, every new acquisition task will include a signature file with metadata, adding legal and forensic robustness to your investigation process.

Protect evidence integrity by registering it on the blockchain via LOCARD, which is a blockchain-based system for secure evidence handling in digital forensics. It has seen some adoption in Europe but remains underutilized in the U.S. due to regulatory and infrastructure challenges, leading to slower adoption and less frequent use​​.

  • This feature integrates with LOCARD, a blockchain-based platform for evidence integrity. When enabled, the chain of custody for digital evidence is secured by submitting evidence metadata to the blockchain, ensuring it hasn’t been tampered with.
  • LOCARD Credentials: To use this, you’ll need to provide the Organization, Host, Username, and Password for your LOCARD account.

Set up email notifications, such as password-reset emails.

  • Specifying an SMTP server allows XDR Forensics to send out automated emails, particularly for password resets. This is useful for self-service password recovery.
  • You must configure the SMTP server address, port, sender email, username, and password. For example, using mail.smtp2go.com as the server.

Enable integration with Syslog servers or SIEM systems.

  • This feature allows XDR Forensics to send event logs to a centralized Syslog or SIEM (Security Information and Event Management) system for enhanced log monitoring and analysis.
  • You will need to configure the protocol (TCP/UDP), server address, and port to send logs from XDR Forensics to your preferred log management system.

Display a custom banner message across all XDR Forensics Console pages.

  • This feature allows you to set a banner message that will appear on all pages of the XDR Forensics Console. This is useful for displaying system notices, warnings, or other important information to all users.

Enforce task options and preferences across assets.

Policies allow administrators to define global task preferences and restrictions for assets in the organization.

  • Customizability: Policies can be tailored for different subsets of assets using filters, and a user must have the “Override Policy” privilege to modify the default organizational policies.

Automate tagging of assets when they are added to XDR Forensics.

  • When this feature is enabled, XDR Forensics automatically applies asset tags based on predefined rules as soon as a responder is installed on an asset.
  • Flexibility: Even if this feature is disabled, users can still run the Auto Asset Tagging task manually on assets.

Activate AI-powered assistance for investigations.

Fleet.AI is an AI-driven assistant integrated into XDR Forensics. Fleet AI is designed to integrate seamlessly into users’ workflows and rather than having a single chatbot, it leverages a Multi-Agent System (MAS) architecture to assist analysts with specific investigation tasks such as rule creation, threat hunts, and investigation planning—all within the AIR console. At the center is Blacklight, an orchestrator that routes analyst prompts to the best-fit agent and manages execution.