- 22 May 2025
- 21 Minutes to read
- Print
- Dark
Reference: Endpoint Agent Commands
- Updated on 22 May 2025
- 21 Minutes to read
- Print
- Dark
Supported Commands by OS
For commands which emit a report/reply event type from the agent, the corresponding event type is provided.
Command Descriptions
artifact_get
Retrieve an artifact from a Sensor.
The artifact collection command allows you to retrieve files directly from an EDR Sensor. This command is useful for collecting a single or multiple files from a Sensor in response to a detection or for incident triage purposes.
Artifacts can be collected via the automated Artifact Collection in the web UI, initiated via API calls, or pulled via the artifact_get
command. Each approach provides value, depending on your use case. Utilizing the Artifact Collection capability can automate artifact collection across a fleet, whereas sensor commands can help collect files from a single Sensor under investigation.
Platforms:
Report/Reply Event:
N/A
Usage:
Note on usage scenarios for the --is-ignore-cert
flag: If the sensor is deployed on a host where built-in root CAs are not up to date or present at all, it may be necessary to use the --is-ignore-cert
flag to allow the logs to be pushed to the cloud.
Unlike the main sensor transport (which uses a pinned certificate), the Artifact Collection feature uses Google infrastructure and their public SSL certificates. This may sometimes come up in unexpected ways. For example fresh Windows Server installations do not have the root CAs for google.com
enabled by default.
deny_tree
Tells the sensor that all activity starting at a specific process (and its children) should be denied and killed. This particular command is excellent for ransomware mitigation.
Platforms:
Usage:
dir_find_hash
Find files matching hashes starting at a root directory.
Platforms:
Reply/Report Event:
DIR_FINDHASH_REP
Usage:
dir_list
List the contents of a directory.
Windows Directories
When using dir_list on Windows systems, ensure the rootDir value is contained within double quotes AND backslashes are escaped. To list all files in a directory, a wildcard (e.g., *) must be used for the fileExp value.
For example, this will list all files in C:\
dir_list “c:\\” *
These examples will NOT work correctly and will not show any files, but will not give an error since they are properly formatted:
dir_list c:\\ * (Missing double quotes)
dir_list “c:\\” (Missing fileExp value)
Platforms:
Report/Reply Event:
DIR_LIST_REP
Usage:
dns_resolve
Cause the sensor to do a network resolution. Mainly used for internal purposes. An error code of 0 indicates a successful command.
Platforms:
Usage:
Sample Output:
You wll also see a corresponding DNS_REQUEST
event in the Sensor timeline.
Sample DNS_REQUEST
Event:
doc_cache_get
Retrieve a document / file that was cached on the sensor.
Platforms:
Report/Reply Event:
GET_DOCUMENT_REP
This command is currently listed to the following document types:
.bat
.js
.ps1
.sh
.py
.exe
.scr
.pdf
.doc
.docm
.docx
.ppt
.pptm
.pptx
.xlt
.xlsm
.xlsx
.vbs
.rtf
.hta
.lnk
Any files created in
system32
on Windows.
Usage:
exfil_add
Add an LC event to the list of events sent back to the backend by default.
Exfil Service
Rather than using the exfil_add
and exfil_del
commands exclusively, it is recommended to use the Exfil extension available through the web UI and REST interface.
Platforms:
Usage:
exfil_del
Remove an LC event from the list of events always sent back to the backend.
Exfil Service
Rather than using the exfil_add
and exfil_del
commands exclusively, it is recommended to use the Exfil extension available through the web UI and REST interface.
Platforms:
Usage:
exfil_get
List all LC events sent back to the backend by default.
Platforms:
Report/Reply Event:
GET_EXFIL_EVENT_REP
Usage:
file_del
Delete a file from the endpoint.
Platforms:
Report/Reply Event:
FILE_DEL_REP
**Usage: **
file_get
Retrieve a file from the endpoint.
Note: The file_get
command is limited to 10MB in size. For files larger than 10MB, please utilize the artifact_get
command.
Platforms:
Report/Reply Event:
FILE_GET_REP
Usage:
file_hash
Compute the hash of a file.
Platforms:
Report/Reply Event:
FILE_HASH_REP
Usage:
file_info
Get file information, timestamps, sizes, etc.
Platforms:
Report/Reply Event:
FILE_INFO_REP
Usage:
file_mov
Move / rename a file on the endpoint.
Platforms:
Report/Reply Event:
FILE_MOV_REP
Usage:
fim_add
Add a file or registry path pattern to monitor for modifications.
FIM rules are not persistent. This means that once an asset restarts, the rules will be gone. The recommended way of managing rule application is to use Detection & Response rules in a similar way to managing events sent to the cloud.
A sample rule is available here.
Note that instead of using the fim_add
and fim_del
commands directly it is recommended to use the Integrity extension available through the web UI and REST interface.
Platforms:
(see this for notes on Linux support)
Report/Reply Event:
FIM_ADD
Patterns include basic wildcards:
for one character:
?
for at least one character:
+
for any number of characters:
*
escape character:
\
Note that the pattern is not a string literal, therefore "" needs to be escaped by one more level than usual.
So for example, you could do:
?:\*\Programs\Startup\*
\REGISTRY\*\Microsoft\Windows\CurrentVersion\Run*
Which would result in: fim_add --pattern "?:\*\Programs\Startup\*" --pattern "\REGISTRY\*\Microsoft\Windows\CurrentVersion\Run*"
Usage:
fim_del
Remove a pattern from monitoring.
Platforms:
(see this for notes on Linux support)
Report/Reply Event:
FIM_DEL
fim_get
Get the list of the current monitored pattern(s).
Platforms:
(see this for notes on Linux support)
Report/Reply Event:
FIM_LIST_REP
get_debug_data
Retrieve debug data from the EDR sensor.
Platforms:
Report/Reply Event:
DEBUG_DATA_REP
hidden_module_scan
Look for hidden modules in a process's (or all) memory. Hidden modules are DLLs or dylibs loaded manually (not by the OS).
Platforms:
Report/Reply Event:
HIDDEN_MODULE_DETECTED
Usage:
history_dump
Send to the backend the entire contents of the sensor event cache, i.e. detailed events of everything that happened recently.
Platforms:
Report/Reply Event:
HISTORY_DUMP_REP
Usage:
log_get
log_get
is a legacy command that has been replaced with artifact_get
. You can still issue a log_get
command from the Sensor, however the parameters and output are the same as artifact_get
.
logoff
Execute a logoff for all the users
Platforms:
mem_find_handle
Find specific open handles in memory on Windows.
Platforms:
Report/Reply Event:
MEM_FIND_HANDLES_REP
Usage:
mem_find_string
Find specific strings in memory.
Platforms:
Report/Reply Event:
MEM_FIND_STRING_REP
Due to recent changes in MacOS, this may be less reliable on that platform.
Usage:
mem_handles
List all open handles from a process (or all) on Windows.
Platforms:
Report/Reply Event:
MEM_HANDLES_REP
Usage:
mem_map
Display the map of memory pages from a process including size, access rights, etc.
Platforms:
Report/Reply Event:
MEM_MAP_REP
Due to recent changes in MacOS, this may be less reliable on that platform.
Usage:
mem_read
Retrieve a chunk of memory from a process given a base address and size.
Platforms:
Report/Reply Event:
MEM_READ_REP
Due to recent changes in MacOS, this may be less reliable on that platform.
Usage:
mem_strings
List strings from a process's memory.
Platforms:
Report/Reply Event:
MEM_STRINGS_REP
Due to recent changes in MacOS, this may be less reliable on that platform.
Usage:
netstat
List network connections and sockets listening.
Platforms:
Usage:
Sample Output:
Netstat STATE
fields can be mapped via the Windows MIB_TCP_STATE
table, found here.
State | Value |
---|---|
1 | CLOSED |
2 | LISTEN |
3 | SYN-SENT |
4 | SYN-RECEIVED |
5 | ESTABLISHED |
6 | FIN-WAIT-1 |
7 | FIN-WAIT-2 |
8 | CLOSE-WAIT |
9 | CLOSING |
10 | LAST-ACK |
11 | TIME-WAIT |
12 | DELETE TCB |
os_autoruns
List pieces of code executing at startup, similar to SysInternals autoruns.
Platforms:
os_drivers
List all drivers on Windows.
Platforms:
os_kill_process
Kill a process running on the endpoint.
Platforms:
os_packages
List installed software packages.
Platforms:
os_processes
List all running processes on the endpoint.
For a faster response time, we recommend running os_processes --is-no-modules
.
Platforms:
os_resume
Resume execution of a process on the endpoint.
Platforms:
os_services
List all services (Windows, launchctl on MacOS and initd on Linux).
Platforms:
os_suspend
Suspend a process running on the endpoint.
Platforms:
os_users
List system users.
Platforms:
os_version
Get detailed OS information on the endpoint.
Platforms:
put
Upload a payload to an endpoint without executing it.
Platforms:
Report/Reply Event(s):RECEIPT
CLOUD_NOTIFICATION
Error Codes
A 200 ERROR
code implies a successful put
command, and will include the resulting file path. Any other error codes can be investigated here.
Command Notes:
Note on usage scenarios for the --is-ignore-cert
flag: If the sensor is deployed on a host where built-in root CAs are not up to date or present at all, it may be necessary to use the --is-ignore-cert
flag to allow the sensor to pull the payload to execute from the cloud.
Unlike the main sensor transport (which uses a pinned certificate), the Payloads feature uses Google infrastructure and their public SSL certificates.
This may sometimes come up in unexpected ways. For example fresh Windows Server installations do not have the root CAs for google.com
enabled by default.
Example:
Assume you have a payload named sample-script.sh
, and you wanted to upload it to the /tmp
folder on a remote system, keeping the same name:
If successful, this action will yield the following RECEIPT
event:
pcap_ifaces
List the network interfaces available for capture on a host.
Platforms:
Usage:
Sample Output:
reboot
Execute an immediate system reboot (no warnings and zero delay time)
Platforms:
reg_list
List the keys and values in a Windows registry key.
Platforms:
rejoin_network
Tells the sensor to allow network connectivity again (after it was segregated).
Platforms:
Report/Reply Event:
REJOIN_NETWORK
Usage:
restart
Forces the LimaCharlie agent to re-initialize. This is typically only useful when dealing with cloned sensor IDs in combination with the remote deletion of the identity file on disk.
Platforms:
run
Execute a payload or a shell command on the sensor.
Platforms:
Note on usage scenarios for the --is-ignore-cert
flag: If the sensor is deployed on a host where built-in root CAs are not up to date or present at all, it may be necessary to use the --is-ignore-cert
flag to allow the sensor to pull the payload to execute from the cloud.
Using Arguments
In some cases, using the --arguments
parameter may result in an error. If so, insert a leading space into the provided arguments.
For example --arguments ' -ano'
Unlike the main sensor transport (which uses a pinned certificate), the Payloads feature uses Google infrastructure and their public SSL certificates.
This may sometimes come up in unexpected ways. For example fresh Windows Server installations do not have the root CAs for google.com
enabled by default.
Some shell execution requires embedding quotes within the command, for example when executing powershell. Here’s an example:
The above starts powershell.exe
and passes it the -command
argument and the value of the -command
is "Get-MpComputerStatus | Select-Object AMRunningMode”
.
seal
Instruct the sensor to harden itself from tampering. This capability protects against use cases such as local admin users attempting to uninstall the LimaCharlie service. Please note that sealed status is currently only reflected in CONNECTED
and SYNC
events.
Seal Availability
Supported on sensor version 4.29.0 or newer and currently only supported on Windows.
Important note: the seal
direct sensor command is stateless, meaning it will not survive a reboot. For this reason, in almost all cases, you want to automate the change of status in D&R rules using the seal
and unseal
response actions instead of this task. Alternatively you can also use the REST API endpoint {sid}/seal
to change the status in a way that survives reboots.
The should_seal
Boolean parameter indicates whether a Sensor has yet to complete the seal
command.
Platforms:
Usage:
Sample Event:
On Sensors version 4.29.0 or newer, you will see the following metadata within SYNC
or CONNECTED
events:
segregate_network
Tells the sensor to stop all network connectivity on the host except LC comms to the backend. So it's network isolation, great to stop lateral movement.
Note that you should never upgrade a sensor version while the network is isolated through this mechanism. Doing so may result in the agent not regaining connectivity to the cloud, requiring a reboot to undo.
This command primitive is NOT persistent, meaning a sensor you segregate from the network using this command alone, upon reboot will rejoin the network. To achieve isolation from the network in a persistent way, see the isolate network
and rejoin network
Detection & Response rule actions.
Platforms:
Report/Reply Event:
SEGREGATE_NETWORK
Usage:
set_performance_mode
Turn on or off the high performance mode on a sensor. This mode is designed for very high performance servers requiring high IO throughout. This mode reduces the accuracy of certain events which in turn reduces impact on the system, and is not useful for the vast majority of hosts. You can read more about Performance Mode and its caveats here.
Platforms:
Usage:
shutdown
Execute an immediate system shut down (no warnings and zero delay time)
Platforms:
uninstall
Uninstall the sensor from that host.
For more information on Sensor uninstallation, including Linux systems, check here.
Platforms:
Usage:
yara_scan
Scan for a specific yara signature in memory and files on the endpoint.
Platforms:
The memory component of the scan on MacOS may be less reliable due to recent limitations imposed by Apple.
yara_update
Update the compiled yara signature bundle that is being used for constant memory and file scanning on the sensor.
Note
Instead of using the yara_update
command directly it is recommended to use the YARA extension available through the web UI and REST interface.
Platforms:
epp_status
Get the current status of EPP on a sensor.
Platforms:
epp_scan
Scan a directory or file using the EPP on the sensor.
Platforms:
epp_list_exclusions
List all the exclusions for EPP on a sensor.
Platforms:
epp_add_exclusion
Add a new exclusion to EPP on a sensor.
Platforms:
epp_rem_exclusion
Remove an exclusion for EPP on a sensor.
Platforms:
epp_list_quarantine
List quarantined EPP on a sensor.
Platforms: