Data Collection Functions

Use the data collection functions to collect forensic information from a remote Microsoft Windows or Linux machine and use it for your incident response processes. When you execute these collection functions, AlienApp for AT&T Cybersecurity Forensics and Response retrieves and ingests data for analysis in USM Anywhere. It produces an event Any traffic or data exchange detected by AT&T Cybersecurity products through a sensor or external devices such as a firewall. for each completed function and you can review the information on the Events page. See Viewing Forensics and Response Events and Alarms for more information about accessing these events.

Some of the most common functions are available as a singular query action. See the following table for details. For other functions, you can use the Launch Query action to specify the parameters and execute the function for an asset.

Important: These functions require that the target assets have assigned credentials that are suitable for system-level access to the host. See Configuring the AlienApp for AT&T Cybersecurity Forensics and Response for more information.

System function Collected data Actions

Get System Info

Windows

Information about the target system, including the operating system version, network interfaces, and hotfixes.

To execute this function using the Launch Query action, specify getSystemInfo as the Query parameter.

Basic Forensic Info

Moderate Forensic Info

Full Forensic Info

Get Users

Windows and Linux

A list of the local accounts in the target system, including privileges and the last login time.

To execute this function using the Launch Query action, specify getUsers as the Query parameter.

Basic Forensic Info

Moderate Forensic Info

Full Forensic Info

Get Users

Get Running Services

Windows and Linux (non-RHEL)

A list of all currently running services on the target system.

To execute this function using the Launch Query action, specify getRunningServices as the Query parameter.

Basic Forensic Info

Moderate Forensic Info

Full Forensic Info

Get Running Services

Get Running Services RedHat

Linux (RHEL only)

A list of all currently running services on the target system.

To execute this function using the Launch Query action, specify getRunningServices.rhel as the Query parameter.

Get Services

Windows

A list of all services on the target system.

To execute this function using the Launch Query action, specify getServices as the Query parameter.

Moderate Forensic Info

Full Forensic Info

Get SMB Sessions

Windows

Information about the Server Message Block (SMB Application-layer network protocol mostly used on Windows computers to provide shared access to files, printers, and serial ports, and also facilitate miscellaneous communications between nodes on a network.) sessions that are currently established on the target system.

To execute this function using the Launch Query action, specify getSMBSessions as the Query parameter.

Basic Forensic Info

Moderate Forensic Info

Full Forensic Info

Get TCP Listening Ports

Windows and Linux

A list of the listening TCP ports on the target system.

To execute this function using the Launch Query action, specify getTCPListeningPorts as the Query parameter.

Basic Forensic Info

Moderate Forensic Info

Full Forensic Info

Get UDP Listening Ports

Windows and Linux

A list of the listening UDP ports on the target system.

To execute this function using the Launch Query action, specify getUDPListeningPorts as the Query parameter.

Basic Forensic Info

Moderate Forensic Info

Full Forensic Info

Get Established Connections

Windows and Linux

A list of the opened connections on the target system, including information about the port and the address.

To execute this function using the Launch Query action, specify getEstablishedConnections as the Query parameter.

Basic Forensic Info

Moderate Forensic Info

Full Forensic Info

Get Established Connections

Get Installed Applications

Windows

A list of the applications installed on the target system.

To execute this function using the Launch Query action, specify getInstalledApplications as the Query parameter.

Basic Forensic Info

Moderate Forensic Info

Full Forensic Info

Get Logged On Users

Windows

A list of the user accounts that are currently logged in to the target system.

To execute this function using the Launch Query action, specify getLoggedOnUsers as the Query parameter.

Basic Forensic Info

Moderate Forensic Info

Full Forensic Info

Get Logged On Users

Get Network Configuration

Windows

A list of the active network interfaces on the target system and their properties, including IP addresses and DHCP Dynamic Host Configuration Protocol (DHCP) is a network protocol used to dynamically distribute network configuration parameters, such as IP addresses, for interfaces and services. information.

To execute this function using the Launch Query action, specify getNetConfig as the Query parameter.

Moderate Forensic Info

Full Forensic Info

Get Antivirus

Windows

Information about antivirus tools installed on the target system, including the status.

To execute this function using the Launch Query action, specify getAntivirus as the Query parameter.

Moderate Forensic Info

Full Forensic Info

Get Start Up Items

Windows

An enumerated list of autorun artifacts on the target system that may be used by legitimate programs or malware to achieve persistence.

To execute this function using the Launch Query action, specify getStartUpItems as the Query parameter.

Moderate Forensic Info

Get All Start Up Items

Windows

A complete, enumerated list of autorun artifacts on the target system that may be used by legitimate programs or malware to achieve persistence.

To execute this function using the Launch Query action, specify getStartUpItemsAll as the Query parameter.

Full Forensic Info

Get Processes

Windows and Linux

A list of processes running on the target system.

To execute this function using the Launch Query action, specify getProcesses as the Query parameter.

Basic Forensic Info

Get Processes With Hashes

Windows

A list of processes running on the target system, along with the associated hash.

To execute this function using the Launch Query action, specify getProcessesWithHashes as the Query parameter.

Moderate Forensic Info

Full Forensic Info

Get Processes With Hashes

Get Shares

Windows

A list of the shared folders on the target system.

To execute this function using the Launch Query action, specify getShares as the Query parameter.

Moderate Forensic Info

Full Forensic Info

Get Mapped Drives

Windows

A list of the mapped drives on the target system.

To execute this function using the Launch Query action, specify getMappedDrives as the Query parameter.

Moderate Forensic Info

Full Forensic Info

Get Scheduled Tasks

Windows and Linux

A list of the scheduled tasks on the target system (malware often creates scheduled tasks to maintain persistence).

To execute this function using the Launch Query action, specify getScheduledTasks as the Query parameter.

Moderate Forensic Info

Full Forensic Info

Get Scheduled Jobs

Windows

A list of the scheduled jobs on the target system (malware often creates scheduled jobs to maintain persistence).

To execute this function using the Launch Query action, specify getScheduledJobs as the Query parameter.

Moderate Forensic Info

Full Forensic Info

Get Installed Hotfixes

Windows

A list of the hotfixes installed on the target system.

To execute this function using the Launch Query action, specify getInstalledHotfixes as the Query parameter.

Moderate Forensic Info

Full Forensic Info

Get Recent USB Drives

Windows

A list of the USB devices recently used on the target system.

To execute this function using the Launch Query action, specify getRecentUSBDrives as the Query parameter.

Moderate Forensic Info

Full Forensic Info

Get Shadow Copies

Windows

A list of shadow copies on the target system.

Shadow copies are used to perform manual or automatic backup copies or snapshots of computer files or volumes.

To execute this function using the Launch Query action, specify getShadowCopies as the Query parameter.

Moderate Forensic Info

Full Forensic Info

Get Restore Points

Windows

A list of the restore points available on the target system.

To execute this function using the Launch Query action, specify getRestorePoints as the Query parameter.

Moderate Forensic Info

Full Forensic Info

Get Prefetch Files

Windows

A list of the prefetch files on the target system.

Windows creates a prefetch file when an application runs from a particular location for the very first time.

To execute this function using the Launch Query action, specify getPrefetchFiles as the Query parameter.

Moderate Forensic Info

Full Forensic Info

Get DNS Cache

Windows

A list of the contents of the DNS client cache on the target system.

To execute this function using the Launch Query action, specify getDNSCache as the Query parameter.

Moderate Forensic Info

Full Forensic Info

Get Failed DNS

Windows

A list of the 50 most recent DNS resolutions that failed on the target system.

To execute this function using the Launch Query action, specify getFailedDNS as the Query parameter.

Moderate Forensic Info

Full Forensic Info

Get EventLog Info

Windows

A list of all the event log sources on the target system, including the size and last modification time.

To execute this function using the Launch Query action, specify getEventLogInfo as the Query parameter.

Moderate Forensic Info

Full Forensic Info

Get Firewall Config

Windows

The firewall configuration on the target system.

To execute this function using the Launch Query action, specify getFirewallConfig as the Query parameter.

Moderate Forensic Info

Full Forensic Info

Get Audit Policy

Windows

The local audit policy information on the target system.

To execute this function using the Launch Query action, specify getAuditPolicy as the Query parameter.

Moderate Forensic Info

Full Forensic Info

Get IE History

Windows

The history from Internet Explorer on the target system, including a list of recently visited web sites.

To execute this function using the Launch Query action, specify getIEHistory as the Query parameter.

Moderate Forensic Info

Full Forensic Info

Get Typed URLs

Windows

A list of the most recent URLs typed by the user in Internet Explorer on the target system.

To execute this function using the Launch Query action, specify getTypedURLs as the Query parameter.

Moderate Forensic Info

Full Forensic Info

Get Event Tracing for Windows (ETW) Sessions

Windows

A list of the running Microsoft Event Tracing for Windows (ETW) sessions on the target system.

To execute this function using the Launch Query action, specify getETWSessions as the Query parameter.

Moderate Forensic Info

Full Forensic Info

Get Windows Defender Information

Windows

Information about Windows Defender on the target system.

To execute this function using the Launch Query action, specify getWindowsDefenderStatus as the Query parameter.

Moderate Forensic Info

Full Forensic Info

Get Drivers

Windows

A list of drivers on the target system, including the location, hash, and digital signature.

To execute this function using the Launch Query action, specify getDrivers as the Query parameter.

Full Forensic Info

Get Recently Created Files

Windows

A list of files created on the target system within the last 24 hours.

To execute this function using the Launch Query action, specify getRecentlyCreatedFiles as the Query parameter.

Full Forensic Info

Get Recent DLLs

Windows

A list of DLLs created on the target system within the last 24 hours.

To execute this function using the Launch Query action, specify getRecentDLLs as the Query parameter.

Full Forensic Info

Get Recent Links

Windows

A list of the link files created on the target system within the last seven days.

To execute this function using the Launch Query action, specify getRecentLinks as the Query parameter.

Full Forensic Info

Get Recent Executables

Windows

A list of executable files created on the target system within the last 24 hours.

To execute this function using the Launch Query action, specify getRecentExecutables as the Query parameter.

Full Forensic Info

Get Compressed Files

Windows

A list of the compressed files created on the target system within the last seven days.

To execute this function using the Launch Query action, specify getCompressedFiles as the Query parameter.

Full Forensic Info

Get Encrypted Files

Windows

A list of the encrypted files created on the target system within the last seven days.

To execute this function using the Launch Query action, specify getEncryptedFiles as the Query parameter.

Full Forensic Info

Get Downloads

Windows

A list of the downloaded files created on the target system.

To execute this function using the Launch Query action, specify getDownloads as the Query parameter.

Full Forensic Info

Get Windows Defender Detections

Windows

Information about malware Generic term for a number of different types of malicious code including viruses, worms, and Trojans. threats on the target system detected by Windows Defender.

To execute this function using the Launch Query action, specify getWindowsDefenderDetections as the Query parameter.

Full Forensic Info