MENU
    Reference: Endpoint Agent Commands
    • 22 May 2025
    • 21 Minutes to read
    • Dark

    Reference: Endpoint Agent Commands

    • Dark

    Article summary

    Supported Commands by OS

    For commands which emit a report/reply event type from the agent, the corresponding event type is provided.

    CommandReport/Reply EventmacOSWindowsLinuxChromeEdge
    artifact_getN/A☑️☑️☑️
    deny_treeN/A☑️☑️☑️
    dir_find_hashDIR_FINDHASH_REP☑️☑️☑️
    dir_listDIR_LIST_REP☑️☑️☑️
    dns_resolveDNS_REQUEST☑️☑️☑️☑️☑️
    doc_cache_getGET_DOCUMENT_REP☑️☑️
    exfil_addCLOUD_NOTIFICATION☑️☑️☑️
    exfil_delCLOUD_NOTIFICATION☑️☑️☑️
    exfil_getGET_EXFIL_EVENT_REP☑️☑️☑️
    file_delFILE_DEL_REP☑️☑️☑️
    file_getFILE_GET_REP☑️☑️☑️
    file_hashFILE_HASH_REP☑️☑️☑️
    file_infoFILE_INFO_REP☑️☑️☑️
    file_movFILE_MOV_REP☑️☑️☑️
    fim_addFIM_ADD☑️☑️☑️
    fim_delFIM_DEL☑️☑️☑️
    fim_getFIM_LIST_REP☑️☑️☑️
    hidden_module_scanHIDDEN_MODULE_DETECTED☑️☑️
    history_dumpHISTORY_DUMP_REP☑️☑️☑️☑️☑️
    log_getN/A☑️
    logoffN/A☑️☑️☑️
    mem_find_handleMEM_FIND_HANDLES_REP☑️
    mem_find_stringMEM_FIND_STRING_REP☑️☑️☑️
    mem_handlesMEM_HANDLES_REP☑️
    mem_mapMEM_MAP_REP☑️☑️☑️
    mem_readMEM_READ_REP☑️☑️☑️
    mem_stringsMEM_STRINGS_REP☑️☑️☑️
    netstatNETSTAT_REP☑️☑️☑️
    os_autorunsOS_AUTORUNS_REP☑️☑️
    os_driversN/A☑️
    os_kill_processOS_KILL_PROCESS_REP☑️☑️☑️
    os_packagesOS_PACKAGES_REP☑️☑️☑️☑️
    os_processesOS_PROCESSES_REP☑️☑️☑️
    os_resumeOS_RESUME_REP☑️☑️☑️
    os_servicesOS_SERVICES_REP☑️☑️☑️
    os_suspendOS_SUSPEND_REP☑️☑️☑️
    os_usersOS_USERS_REP☑️
    os_versionOS_VERSION_REP☑️☑️☑️
    putRECEIPT☑️☑️☑️
    rejoin_networkREJOIN_NETWORK☑️☑️☑️☑️☑️
    restartN/A☑️☑️☑️
    runN/A☑️☑️☑️
    seal☑️
    segregate_networkSEGREGATE_NETWORK☑️☑️☑️☑️☑️
    set_performance_modeN/A☑️☑️☑️
    shutdown☑️☑️☑️
    uninstallN/A☑️☑️☑️
    yara_scanYARA_DETECTION☑️☑️☑️
    yara_updateN/A☑️☑️☑️
    epp_status[EPP_STATUS_REP]☑️
    epp_scan[EPP_SCAN_REP]☑️
    epp_list_exclusions[EPP_LIST_EXCLUSIONS_REP]☑️
    epp_add_exclusion[EPP_ADD_EXCLUSION_REP]☑️
    epp_rem_exclusion[EPP_REM_EXCLUSION_REP]☑️
    epp_list_quarantine[EPP_LIST_QUARANTINE_REP]☑️

    Command Descriptions

    artifact_get

    Retrieve an artifact from a Sensor.

    The artifact collection command allows you to retrieve files directly from an EDR Sensor. This command is useful for collecting a single or multiple files from a Sensor in response to a detection or for incident triage purposes.

    Artifacts can be collected via the automated Artifact Collection in the web UI, initiated via API calls, or pulled via the artifact_get command. Each approach provides value, depending on your use case. Utilizing the Artifact Collection capability can automate artifact collection across a fleet, whereas sensor commands can help collect files from a single Sensor under investigation.

    Platforms:

    Report/Reply Event:
    N/A

    Usage:

    usage: artifact_get [-h] [--file FILE] [--source SOURCE] [--type TYPE]
                        [--payload-id PAYLOADID] [--days-retention RETENTION]
                        [--is-ignore-cert]
    
    optional arguments:
      --file FILE           file path to get
      --source SOURCE       optional os specific artifact source (not currently supported)
      --type TYPE           optional artifact type
      --payload-id PAYLOADID
                            optional specifies an idempotent payload ID to use
      --days-retention RETENTION
                            number of days the data should be retained, default 30
      --is-ignore-cert      if specified, the sensor will ignore SSL cert mismatch
                            while upload the artifact
    Plain text

    Note on usage scenarios for the --is-ignore-cert flag: If the sensor is deployed on a host where built-in root CAs are not up to date or present at all, it may be necessary to use the --is-ignore-cert flag to allow the logs to be pushed to the cloud.

    Unlike the main sensor transport (which uses a pinned certificate), the Artifact Collection feature uses Google infrastructure and their public SSL certificates. This may sometimes come up in unexpected ways. For example fresh Windows Server installations do not have the root CAs for google.com enabled by default.


    deny_tree

    Tells the sensor that all activity starting at a specific process (and its children) should be denied and killed. This particular command is excellent for ransomware mitigation.

    Platforms:

    Usage:

    usage: deny_tree [-h] atom [atom ...]
    
    positional arguments:
      atom        atoms to deny from
    Plain text

    dir_find_hash

    Find files matching hashes starting at a root directory.

    Platforms:

    Reply/Report Event:
    DIR_FINDHASH_REP

    Usage:

    usage: dir_find_hash [-h] [-d DEPTH] --hash HASHES rootDir fileExp
    
    positional arguments:
      rootDir               the root directory where to begin the search from
      fileExp               a file name expression supporting basic wildcards like
                            * and ?
    
    optional arguments:
      -d DEPTH, --depth DEPTH
                            optional maximum depth of the listing, defaults to a
                            single level
      --hash HASHES         sha256 to search for, can be specified multiple times
    Plain text

    dir_list

    List the contents of a directory.

    Windows Directories

    When using dir_list on Windows systems, ensure the rootDir value is contained within double quotes AND backslashes are escaped. To list all files in a directory, a wildcard (e.g., *) must be used for the fileExp value.

    For example, this will list all files in C:\

    • dir_list “c:\\” *

    These examples will NOT work correctly and will not show any files, but will not give an error since they are properly formatted:

    • dir_list c:\\ * (Missing double quotes)

    • dir_list “c:\\” (Missing fileExp value)

    Platforms:

    Report/Reply Event:
    DIR_LIST_REP

    Usage:

    usage: dir_list [-h] [-d DEPTH] rootDir fileExp
    
    positional arguments:
      rootDir               the root directory where to begin the listing from
      fileExp               a file name expression supporting basic wildcards like
                            * and ?
    
    optional arguments:
      -d DEPTH, --depth DEPTH
                            optional maximum depth of the listing, defaults to a
                            single level
    Plain text

    dns_resolve

    Cause the sensor to do a network resolution. Mainly used for internal purposes. An error code of 0 indicates a successful command.

    Platforms:

    Usage:

    dns_resolve [-h] domain
    
    positional arguments:
      domain      domain name to resolve
    Plain text

    Sample Output:

    {
       "ERROR" : 0
    }
    JSON

    You wll also see a corresponding DNS_REQUEST event in the Sensor timeline.

    Sample DNS_REQUEST Event:

    {
      "DNS_TYPE": 1,
      "DOMAIN_NAME": "www.google.com",
      "IP_ADDRESS": "142.251.116.105",
      "MESSAGE_ID": 30183
    }
    JSON

    doc_cache_get

    Retrieve a document / file that was cached on the sensor.

    Platforms:

    Report/Reply Event:
    GET_DOCUMENT_REP

    This command is currently listed to the following document types:

    • .bat

    • .js

    • .ps1

    • .sh

    • .py

    • .exe

    • .scr

    • .pdf

    • .doc

    • .docm

    • .docx

    • .ppt

    • .pptm

    • .pptx

    • .xlt

    • .xlsm

    • .xlsx

    • .vbs

    • .rtf

    • .hta

    • .lnk

    • Any files created in system32 on Windows.

    Usage:

    usage: doc_cache_get [-h] [-f FILE_PATTERN] [-s HASHSTR]
    
    optional arguments:
      -f FILE_PATTERN, --file_pattern FILE_PATTERN
                            a pattern to match on the file path and name of the
                            document, simple wildcards ? and * are supported
      -s HASHSTR, --hash HASHSTR
                            hash of the document to get
    Plain text

    exfil_add

    Add an LC event to the list of events sent back to the backend by default.

    Exfil Service

    Rather than using the exfil_add and exfil_del commands exclusively, it is recommended to use the Exfil extension available through the web UI and REST interface.

    Platforms:

    Usage:

    usage: exfil_add [-h] -e EXPIRE event
    
    positional arguments:
      event                 name of event to start exfiling
    
    optional arguments:
      -e EXPIRE, --expire EXPIRE
                            number of seconds before stopping exfil of event
    Plain text

    exfil_del

    Remove an LC event from the list of events always sent back to the backend.

    Exfil Service

    Rather than using the exfil_add and exfil_del commands exclusively, it is recommended to use the Exfil extension available through the web UI and REST interface.

    Platforms:

    Usage:

    usage: exfil_del [-h] event
    
    positional arguments:
      event       name of event to stop exfiling
    Plain text

    exfil_get

    List all LC events sent back to the backend by default.

    Platforms:

    Report/Reply Event:
    GET_EXFIL_EVENT_REP

    Usage:

    usage: exfil_get [-h]
    Plain text

    file_del

    Delete a file from the endpoint.

    Platforms:

    Report/Reply Event:
    FILE_DEL_REP

    **Usage: **

    usage: file_del [-h] file
    
    positional arguments:
      file        file path to delete
    Plain text

    file_get

    Retrieve a file from the endpoint.

    Note: The file_get command is limited to 10MB in size. For files larger than 10MB, please utilize the artifact_get command.

    Platforms:

    Report/Reply Event:
    FILE_GET_REP

    Usage:

    usage: file_get [-h] [-o OFFSET] [-s MAXSIZE] file
    
    positional arguments:
      file                  file path to file to get
    
    optional arguments:
      -o OFFSET, --offset OFFSET
                            offset bytes to begin reading the file at, in base 10
      -s MAXSIZE, --size MAXSIZE
                            maximum number of bytes to read, in base 10, max of
                            10MB
    Plain text

    file_hash

    Compute the hash of a file.

    Platforms:

    Report/Reply Event:
    FILE_HASH_REP

    Usage:

    usage: file_hash [-h] file
    
    positional arguments:
      file        file path to hash
    Plain text

    file_info

    Get file information, timestamps, sizes, etc.

    Platforms:

    Report/Reply Event:
    FILE_INFO_REP

    Usage:

    usage: file_info [-h] file
    
    positional arguments:
      file        file path to file to get info on
    Plain text

    file_mov

    Move / rename a file on the endpoint.

    Platforms:

    Report/Reply Event:
    FILE_MOV_REP

    Usage:

    usage: file_mov [-h] srcFile dstFile
    
    positional arguments:
      srcFile     source file path
      dstFile     destination file path
    Plain text

    fim_add

    Add a file or registry path pattern to monitor for modifications.

    FIM rules are not persistent. This means that once an asset restarts, the rules will be gone. The recommended way of managing rule application is to use Detection & Response rules in a similar way to managing events sent to the cloud.

    A sample rule is available here.

    Note that instead of using the fim_add and fim_del commands directly it is recommended to use the Integrity extension available through the web UI and REST interface.

    Platforms:
    (see this for notes on Linux support)

    Report/Reply Event:
    FIM_ADD

    Patterns include basic wildcards:

    • for one character: ?

    • for at least one character: +

    • for any number of characters: *

    • escape character: \

    Note that the pattern is not a string literal, therefore "" needs to be escaped by one more level than usual.

    So for example, you could do:

    • ?:\*\Programs\Startup\*

    • \REGISTRY\*\Microsoft\Windows\CurrentVersion\Run*

    Which would result in: fim_add --pattern "?:\*\Programs\Startup\*" --pattern "\REGISTRY\*\Microsoft\Windows\CurrentVersion\Run*"

    Usage:

    usage: fim_add [-h] --pattern PATTERNS
    
    optional arguments:
      --pattern PATTERNS  file path or registry path pattern to monitor
    Plain text

    fim_del

    Remove a pattern from monitoring.

    Platforms:
    (see this for notes on Linux support)

    Report/Reply Event:
    FIM_DEL

    usage: fim_del [-h] --pattern PATTERNS
    
    optional arguments:
      --pattern PATTERNS  file path or registry path pattern to stop monitoring
    Plain text

    fim_get

    Get the list of the current monitored pattern(s).

    Platforms:
    (see this for notes on Linux support)

    Report/Reply Event:
    FIM_LIST_REP

    usage: fim_get [-h]
    Plain text

    get_debug_data

    Retrieve debug data from the EDR sensor.

    Platforms:

    Report/Reply Event:
    DEBUG_DATA_REP


    hidden_module_scan

    Look for hidden modules in a process's (or all) memory. Hidden modules are DLLs or dylibs loaded manually (not by the OS).

    Platforms:

    Report/Reply Event:
    HIDDEN_MODULE_DETECTED

    Usage:

    usage: hidden_module_scan [-h] pid
    
    positional arguments:
      pid         pid of the process to scan, or "-1" for ALL processes
    Plain text

    history_dump

    Send to the backend the entire contents of the sensor event cache, i.e. detailed events of everything that happened recently.

    Platforms:

    Report/Reply Event:
    HISTORY_DUMP_REP

    Usage:

    usage: history_dump [-h] [-r ROOT] [-a ATOM] [-e EVENT]
    
    optional arguments:
      -r ROOT, --rootatom ROOT
                            dump events present in the tree rooted at this atom
      -a ATOM, --atom ATOM  dump the event with this specific atom
      -e EVENT, --event EVENT
                            dump events of this type only
    Plain text

    log_get

    log_get is a legacy command that has been replaced with artifact_get. You can still issue a log_get command from the Sensor, however the parameters and output are the same as artifact_get.

    logoff

    Execute a logoff for all the users

    Platforms:

    usage: logoff --is-confirmed
    Plain text

    mem_find_handle

    Find specific open handles in memory on Windows.

    Platforms:

    Report/Reply Event:
    MEM_FIND_HANDLES_REP

    Usage:

    mem_find_handle [-h] needle
    
    positional arguments:
      needle      substring of the handle names to get
    Plain text

    mem_find_string

    Find specific strings in memory.

    Platforms:

    Report/Reply Event:
    MEM_FIND_STRING_REP

    Due to recent changes in MacOS, this may be less reliable on that platform.

    Usage:

    mem_find_string [-h] -s STRING [STRING ...] pid
    
    positional arguments:
      pid                   pid of the process to search in, 0 for all processes
    
    optional arguments:
      -s STRING [STRING ...], --strings STRING [STRING ...]
                            list of strings to look for
    Plain text

    mem_handles

    List all open handles from a process (or all) on Windows.

    Platforms:

    Report/Reply Event:
    MEM_HANDLES_REP

    Usage:

    mem_handles [-h] [-p PID] [-a PROCESSATOM]
    
    optional arguments:
      -p PID, --pid PID     pid of the process to get the handles from, 0 for all
                            processes
      -a PROCESSATOM, --processatom PROCESSATOM
                            the atom of the target process
    Plain text

    mem_map

    Display the map of memory pages from a process including size, access rights, etc.

    Platforms:

    Report/Reply Event:
    MEM_MAP_REP

    Due to recent changes in MacOS, this may be less reliable on that platform.

    Usage:

    mem_map [-h] [-p PID] [-a PROCESSATOM]
    
    optional arguments:
      -p PID, --pid PID     pid of the process to get the map from
      -a PROCESSATOM, --processatom PROCESSATOM
                            the atom of the target proces
    Plain text

    mem_read

    Retrieve a chunk of memory from a process given a base address and size.

    Platforms:

    Report/Reply Event:
    MEM_READ_REP

    Due to recent changes in MacOS, this may be less reliable on that platform.

    Usage:

    mem_read [-h] [-p PID] [-a PROCESSATOM] baseAddr memSize
    
    positional arguments:
      baseAddr              base address to read from, in HEX FORMAT
      memSize               number of bytes to read, in HEX FORMAT
    
    optional arguments:
      -p PID, --pid PID     pid of the process to get the map from
      -a PROCESSATOM, --processatom PROCESSATOM
                            the atom of the target process
    Plain text

    mem_strings

    List strings from a process's memory.

    Platforms:

    Report/Reply Event:
    MEM_STRINGS_REP

    Due to recent changes in MacOS, this may be less reliable on that platform.

    Usage:

    mem_strings [-h] [-p PID] [-a PROCESSATOM]
    
    optional arguments:
      -p PID, --pid PID     pid of the process to get the strings from
      -a PROCESSATOM, --processatom PROCESSATOM
                            the atom of the target process
    Plain text

    netstat

    List network connections and sockets listening.

    Platforms:

    Usage:

    netstat [-h]
    Plain text

    Sample Output:

    {
      "FRIENDLY": 0,
      "NETWORK_ACTIVITY": [
        {
          "DESTINATION": {
            "IP_ADDRESS": "0.0.0.0",
            "PORT": 0
          },
          "PROCESS_ID": 716,
          "PROTOCOL": "tcp4",
          "SOURCE": {
            "IP_ADDRESS": "0.0.0.0",
            "PORT": 135
          },
          "STATE": 2
        },
        {
          ...
        }
      ]
    }
    JSON

    Netstat STATE fields can be mapped via the Windows MIB_TCP_STATE table, found here.

    State

    Value

    1

    CLOSED

    2

    LISTEN

    3

    SYN-SENT

    4

    SYN-RECEIVED

    5

    ESTABLISHED

    6

    FIN-WAIT-1

    7

    FIN-WAIT-2

    8

    CLOSE-WAIT

    9

    CLOSING

    10

    LAST-ACK

    11

    TIME-WAIT

    12

    DELETE TCB


    os_autoruns

    List pieces of code executing at startup, similar to SysInternals autoruns.

    Platforms:

    usage: os_autoruns [-h]
    Plain text

    os_drivers

    List all drivers on Windows.

    Platforms:

    usage: os_drivers [-h]
    Plain text

    os_kill_process

    Kill a process running on the endpoint.

    Platforms:

    usage: os_kill_process [-h] [-p PID] [-a PROCESSATOM]
    
    optional arguments:
      -p PID, --pid PID     pid of the process to kill
      -a PROCESSATOM, --processatom PROCESSATOM
                            the atom of the target process
    Plain text

    os_packages

    List installed software packages.

    Platforms:

    usage: os_packages [-h]
    Plain text

    os_processes

    List all running processes on the endpoint.

    For a faster response time, we recommend running os_processes --is-no-modules.

    Platforms:

    usage: os_processes [-h] [-p PID] [--is-no-modules]
    
    optional arguments:
      -p PID, --pid PID  only get information on process id
      --is-no-modules    do not report modules in processes
    Plain text

    os_resume

    Resume execution of a process on the endpoint.

    Platforms:

    usage: os_resume [-h] [-p PID] [-a PROCESSATOM] [-t TID]
    
    optional arguments:
      -p PID, --pid PID     process id
      -a PROCESSATOM, --processatom PROCESSATOM
                            the atom of the target process
      -t TID, --tid TID     thread id
    Plain text

    os_services

    List all services (Windows, launchctl on MacOS and initd on Linux).

    Platforms:

    usage: os_services [-h]
    Plain text

    os_suspend

    Suspend a process running on the endpoint.

    Platforms:

    usage: os_suspend [-h] [-p PID] [-a PROCESSATOM] [-t TID]
    
    optional arguments:
      -p PID, --pid PID     process id
      -a PROCESSATOM, --processatom PROCESSATOM
                            the atom of the target process
      -t TID, --tid TID     thread id
    Plain text

    os_users

    List system users.

    Platforms:

    usage: os_users [-h]
    Plain text

    os_version

    Get detailed OS information on the endpoint.

    Platforms:

    usage: os_version [-h]
    Plain text

    put

    Upload a payload to an endpoint without executing it.

    Platforms:

    usage: put [-h] --payload-name NAME [--payload-path PATH] [--is-ignore-cert]
    
    optional arguments:
      --payload-name NAME  name of the payload to run
      --payload-path PATH  full path where to put the payload (including file name)
      --is-ignore-cert     if specified, the sensor will ignore SSL cert mismatch
    Plain text

    Report/Reply Event(s):
    RECEIPT
    CLOUD_NOTIFICATION

    Error Codes

    A 200 ERROR code implies a successful put command, and will include the resulting file path. Any other error codes can be investigated here.

    Command Notes:

    Note on usage scenarios for the --is-ignore-cert flag: If the sensor is deployed on a host where built-in root CAs are not up to date or present at all, it may be necessary to use the --is-ignore-cert flag to allow the sensor to pull the payload to execute from the cloud.

    Unlike the main sensor transport (which uses a pinned certificate), the Payloads feature uses Google infrastructure and their public SSL certificates.

    This may sometimes come up in unexpected ways. For example fresh Windows Server installations do not have the root CAs for google.com enabled by default.

    Example:

    Assume you have a payload named sample-script.sh, and you wanted to upload it to the /tmp folder on a remote system, keeping the same name:

    put --payload-name "sample_script.sh" --payload-path "/tmp/sample_script.sh"
    Plain text

    If successful, this action will yield the following RECEIPT event:

    "details":{
        "event":{
            "ERROR":200
            "FILE_PATH":"/tmp/sample-script.sh"
        }
    "routing" : {...}
    JSON

    pcap_ifaces

    List the network interfaces available for capture on a host.

    Platforms:

    Usage:

    pcap_ifaces [-h]
    Plain text

    Sample Output:

    {
      "INTERFACE": [
        {
          "IPV4": [
            "10.128.15.198"
          ],
          "IPV6": [
            "fe80::4001:aff:fe80:fc6"
          ],
          "NAME": "ens4"
        },
        {
          "IPV4": [
            "127.0.0.1"
          ],
          "IPV6": [
            "::1"
          ],
          "NAME": "lo"
        },
        {
          "IPV4": [],
          "IPV6": [],
          "NAME": "any"
        },
        {
          "IPV4": [],
          "IPV6": [],
          "NAME": "nflog"
        },
        {
          "IPV4": [],
          "IPV6": [],
          "NAME": "nfqueue"
        }
      ]
    }
    JSON

    reboot

    Execute an immediate system reboot (no warnings and zero delay time)

    Platforms:

    usage: reboot --is-confirmed
    Plain text

    reg_list

    List the keys and values in a Windows registry key.

    Platforms:

    usage: reg_list [-h] reg
    
    positional arguments:
      reg         registry path to list, must start with one of "hkcr", "hkcc", "hkcu", "hklm", "hku", e.g. "hklm\software"...
    Plain text

    rejoin_network

    Tells the sensor to allow network connectivity again (after it was segregated).

    Platforms:

    Report/Reply Event:
    REJOIN_NETWORK

    Usage:

    usage: rejoin_network [-h]
    Plain text

    restart

    Forces the LimaCharlie agent to re-initialize. This is typically only useful when dealing with cloned sensor IDs in combination with the remote deletion of the identity file on disk.

    Platforms:


    run

    Execute a payload or a shell command on the sensor.

    Platforms:

    usage: run [-h] [--payload-name NAME] [--arguments ARGUMENTS]
               [--shell-command SHELLCMD] [--timeout TIMEOUT] [--is-ignore-cert][--interpreter INTERPRETER]
    
    optional arguments:
      --payload-name NAME   name of the payload to run
      --arguments ARGUMENTS
                            arguments to run the payload with
      --shell-command SHELLCMD
                            shell command to run
      --timeout TIMEOUT     number of seconds to wait for payload termination
      --is-ignore-cert      if specified, the sensor will ignore SSL cert mismatch
                            while upload the log
      --interpreter INTERPRETER
    specifies that the named payload should be executed with
    a specific interpreter like "powershell"
    Plain text

    Note on usage scenarios for the --is-ignore-cert flag: If the sensor is deployed on a host where built-in root CAs are not up to date or present at all, it may be necessary to use the --is-ignore-cert flag to allow the sensor to pull the payload to execute from the cloud.

    Using Arguments

    In some cases, using the --arguments parameter may result in an error. If so, insert a leading space into the provided arguments.

    For example --arguments ' -ano'

    Unlike the main sensor transport (which uses a pinned certificate), the Payloads feature uses Google infrastructure and their public SSL certificates.

    This may sometimes come up in unexpected ways. For example fresh Windows Server installations do not have the root CAs for google.com enabled by default.

    Some shell execution requires embedding quotes within the command, for example when executing powershell. Here’s an example:

    run --shell-command "powershell.exe -command \"Get-MpComputerStatus | Select-Object AMRunningMode\""
    Shell

    The above starts powershell.exe and passes it the -command argument and the value of the -command is "Get-MpComputerStatus | Select-Object AMRunningMode”.


    seal

    Instruct the sensor to harden itself from tampering. This capability protects against use cases such as local admin users attempting to uninstall the LimaCharlie service. Please note that sealed status is currently only reflected in CONNECTED and SYNC events.

    Seal Availability

    Supported on sensor version 4.29.0 or newer and currently only supported on Windows.

    Important note: the seal direct sensor command is stateless, meaning it will not survive a reboot. For this reason, in almost all cases, you want to automate the change of status in D&R rules using the seal and unseal response actions instead of this task. Alternatively you can also use the REST API endpoint {sid}/seal to change the status in a way that survives reboots.

    The should_seal Boolean parameter indicates whether a Sensor has yet to complete the seal command.

    Platforms:

    Usage:

    usage: seal [--enable] [--disable]
    Plain text

    Sample Event:
    On Sensors version 4.29.0 or newer, you will see the following metadata within SYNC or CONNECTED events:

    {
     ... ,
     "SEAL_STATUS" : {
        "ERROR": 0,
        "IS_DISABLED": 1
        }
    }
    JSON

    segregate_network

    Tells the sensor to stop all network connectivity on the host except LC comms to the backend. So it's network isolation, great to stop lateral movement.

    Note that you should never upgrade a sensor version while the network is isolated through this mechanism. Doing so may result in the agent not regaining connectivity to the cloud, requiring a reboot to undo.

    This command primitive is NOT persistent, meaning a sensor you segregate from the network using this command alone, upon reboot will rejoin the network. To achieve isolation from the network in a persistent way, see the isolate network and rejoin network Detection & Response rule actions.

    Platforms:

    Report/Reply Event:
    SEGREGATE_NETWORK

    Usage:

    usage: segregate_network [-h]
    Plain text

    set_performance_mode

    Turn on or off the high performance mode on a sensor. This mode is designed for very high performance servers requiring high IO throughout. This mode reduces the accuracy of certain events which in turn reduces impact on the system, and is not useful for the vast majority of hosts. You can read more about Performance Mode and its caveats here.

    Platforms:

    Usage:

    usage: set_performance_mode [-h] [--is-enabled]
    
    optional arguments:
      --is-enabled  if specified, the high performance mode is enabled, otherwise
                    disabled
    Plain text

    shutdown

    Execute an immediate system shut down (no warnings and zero delay time)

    Platforms:

    usage: shutdown --is-confirmed
    Plain text

    uninstall

    Uninstall the sensor from that host.

    For more information on Sensor uninstallation, including Linux systems, check here.

    Platforms:

    Usage:

    usage: uninstall [-h] [--is-confirmed]
    
    optional arguments:
      --is-confirmed  must be specified as a confirmation you want to uninstall
                      the sensor
    Plain text

    yara_scan

    Scan for a specific yara signature in memory and files on the endpoint.

    Platforms:

    The memory component of the scan on MacOS may be less reliable due to recent limitations imposed by Apple.

    yara_scan [--pid PID] [--filePath FILEPATH] [--processExpr PROCESSEXPR] [--is-memory-only] [--is-no-validation] [--root-dir ROOT-DIR] [--file-exp FILE-EXP] [--depth DEPTH] RULE
    
    Positional arguments:
      RULE                   rule to compile and run on sensor, Yara resource reference like "lcr://service/yara/my-source,other-source", literal rule or "https://" URL or base64 encoded rule
    
    Options:
      --pid PID, -p PID      pid of the process to scan [default: -1]
      --filePath FILEPATH, -f FILEPATH
                             path to the file scan
      --processExpr PROCESSEXPR, -e PROCESSEXPR
                             expression to match on to scan (matches on full process path)
      --is-memory-only       only scan the memory, ignore files on disk. [default: true]
      --is-no-validation     if specified, do not validate the rule before sending. [default: false]
      --root-dir ROOT-DIR, -r ROOT-DIR
                             the root directory where to begin the search for files to scan
      --file-exp FILE-EXP, -x FILE-EXP
                             a file name expression supporting basic wildcards like * and ? to match against files in the --root-dir [default: *]
      --depth DEPTH, -d DEPTH
                             optional maximum depth of the search for files to scan, defaults to a single level
    Plain text

    yara_update

    Update the compiled yara signature bundle that is being used for constant memory and file scanning on the sensor.

    Note

    Instead of using the yara_update command directly it is recommended to use the YARA extension available through the web UI and REST interface.

    Platforms:

    usage: yara_update [-h] rule
    
    positional arguments:
      rule        rule to compile and set on sensor for constant scanning, literal rule or "https://" URL or base64 encoded rule
    Plain text

    epp_status

    Get the current status of EPP on a sensor.

    Platforms:

    usage: epp_status [-h]
    Plain text

    epp_scan

    Scan a directory or file using the EPP on the sensor.

    Platforms:

    usage: epp_scan [-h] path
    
    positional arguments:
      path        File or directory to scan
    Plain text

    epp_list_exclusions

    List all the exclusions for EPP on a sensor.

    Platforms:

    usage: epp_list_exclusions [-h]
    Plain text

    epp_add_exclusion

    Add a new exclusion to EPP on a sensor.

    Platforms:

    usage: epp_add_exclusion [-h] value [--type]
    
    positional arguments:
      value        Value of the exclusion to add
    optional arguments:
      --type  Type of exclusion. Options are: extension, path, process
    Plain text

    epp_rem_exclusion

    Remove an exclusion for EPP on a sensor.

    Platforms:

    usage: epp_rem_exclusion [-h] value [--type]
    
    positional arguments:
      value        Value of the exclusion to remove
    optional arguments:
      --type  Type of exclusion. Options are: extension, path, process
    Plain text

    epp_list_quarantine

    List quarantined EPP on a sensor.

    Platforms:

    usage: epp_list_quarantine [-h]
    Plain text


    Was this article helpful?