- Print
- DarkLight
The artifact collection command allows you to retrieve files directly from an EDR Sensor. This command is useful for collecting a single or multiple files from a Sensor in response to a detection or for incident triage purposes.
Artifacts can be collected via the automated Artifact Collection in the web UI, initiated via API calls, or pulled via the artifact_get
command. Each approach provides value, depending on your use case. Utilizing the Artifact Collection capability can automate artifact collection across a fleet, whereas sensor commands can help collect files from a single Sensor under investigation.
artifact_get
Retrieve an artifact from a sensor.
Platforms:
Response Event:
N/A
Usage:
usage: artifact_get [-h] [--file FILE] [--source SOURCE] [--type TYPE]
[--payload-id PAYLOADID] [--days-retention RETENTION]
[--is-ignore-cert]
optional arguments:
--file FILE file path to get
--source SOURCE optional os specific artifact source (not currently supported)
--type TYPE optional artifact type
--payload-id PAYLOADID
optional specifies an idempotent payload ID to use
--days-retention RETENTION
number of days the data should be retained, default 30
--is-ignore-cert if specified, the sensor will ignore SSL cert mismatch
while upload the artifact
Note on usage scenarios for the --is-ignore-cert
flag: If the sensor is deployed on a host where built-in root CAs are not up to date or present at all, it may be necessary to use the --is-ignore-cert
flag to allow the logs to be pushed to the cloud.
Unlike the main sensor transport (which uses a pinned certificate), the Artifact Collection feature uses Google infrastructure and their public SSL certificates. This may sometimes come up in unexpected ways. For example fresh Windows Server installations do not have the root CAs for google.com
enabled by default.