Manual Magnet AXIOM
Manual Magnet AXIOM
CONTENTS
CONTENTS 2
What's new 21
Getting started with Magnet AXIOM 24
Start a case 24
Provide case details 24
Custom case types 24
Define custom case types 25
Cloud 49
Acquire cloud evidence 50
Amazon EC2 instance 50
Amazon S3 bucket 53
Cloud-based user accounts 55
Acquire a cloud user account 55
Apple 57
Box.com 60
Dropbox 63
Facebook 65
Google 67
Instagram 72
Lyft 74
Microsoft User account services 76
Azure 76
Microsoft Teams 78
Microsoft user account 80
Mega 87
Slack 89
Twitter 90
Uber 92
WhatsApp 94
Public activity 97
Supported Cloud data sources by authentication 100
Available cloud platforms by license type 106
Load cloud evidence 107
Load a cloud image 108
Supported evidence sources 109
Endpoint 111
Acquiring evidence from an endpoint 112
Acquired evidence encryption 112
Prerequisites for remote acquisition 112
Manage agents and endpoints 114
Manage agents 114
Agent details 114
Manage endpoints 115
Endpoint details 115
Download evidence from a queued collection 116
Manage offline endpoints in the queue 116
Monitor the status of evidence collection 116
Create a queued collection 117
Add endpoint manually 117
Create an agent 118
Agent ID 118
Operating system 118
Agent type 119
Agent masking details 119
Survive shutdown of endpoint 120
Connectivity details 120
Deploy an agent 122
Deploy a new agent 122
Deploy an existing agent to a new endpoint 123
Redeploy an agent to an endpoint 123
Troubleshooting deployment failures 124
Endpoint deployment details 124
Connect to an agent 125
Enable searching and filtering in the file browser 125
Connect to a newly deployed agent 125
Connect to an agent previously deployed to an endpoint 126
Troubleshooting connection failures 126
Endpoint connection details 127
Delete an agent 127
Remove an agent from an endpoint 127
Delete an agent 127
Remove the agent manually 128
Remove the agent using PsExec 128
Download items from endpoints 129
Supported evidence items 129
Download targeted locations 131
Location profile 131
Targeted locations 131
Default targeted locations 132
Windows 132
macOS 133
Linux 137
Download files and drives 139
Download Drives 139
Download files and folders 140
Filter by date range 140
Search by word or search term 141
Filter by column 141
Download memory 142
Add custom targeted locations 143
Wildcard characters 144
Add evidence from the endpoint to your case 146
Add evidence to your case 146
Customize remote acquisition settings 147
Change the agent default location 147
Automatically remove an agent from the endpoint 147
Compressing data before downloading 148
Compress data before downloading 148
Change the container type for downloads 149
Manage location profiles 149
Create a new location profile 150
Edit a location profile 150
Duplicate a location profile 150
Shared agent configuration 150
Create a shared agent configuration 151
Create new shared agent configuration 151
Requirements: 152
Create a new shared agent configuration 152
Hostname/IP address 152
Agent certificate 152
Add cyber workstations 153
Remove cyber workstations 153
Create a shared agent 154
Provide the configuration code 154
Add endpoints manually 155
Connect to existing shared agent configuration 156
Requirements 156
Connect to a shared agent configuration 156
Add endpoint manually 157
Update a shared agent configuration 157
Applying updated configuration code 158
Update local configuration code 158
Create an agent 159
Agent ID 159
Operating system 159
Agent type 159
Agent masking details 160
Survive shutdown of endpoint 160
Connectivity details 161
Mobile 162
Acquiring mobile evidence 162
Android 164
Acquiring an Android Device 164
Access to data on Android devices 164
Supported acquisition methods for Android devices 165
Prepare an Android device for image acquisition 165
Turn on USB debugging for Android devices 167
Bypass the lock screen on an LG device 167
Downgrading apps 168
Device drivers for popular Android device manufacturers 168
Acquire a locked Android device 169
Acquire an unlocked Android device 170
Customize Android acquisition settings 171
Create segments for Android images 171
Restore device state for Android devices 171
iOS 172
Acquiring an iOS device 172
Access to data on iOS devices 172
Supported acquisition methods for iOS devices 173
Prepare an iOS device for image acquisition 173
Acquire an encrypted iOS backup 174
Acquire a jailbroken iOS device 175
Connecting to a device using SSH 175
Acquire a full image from a jailbroken iOS device 176
Kindle Fire 177
Acquiring a Kindle Fire device 177
Media device (MTP) 178
Acquiring media and files through MTP 178
SIM cards 179
Acquiring SIM cards 179
Load evidence from mobile devices 180
Load a mobile image 180
Keychain and keystore files 180
iOS keychain 180
Android keystore 180
Cellebrite 181
Load files and folders from a mobile device 181
Load an encrypted iOS backup 182
Supported images and file types 182
Vehicles 183
Loading evidence from vehicles 183
Load a Magnet IVO image from a vehicle 183
What's new
Version Description
7.7.0 l Updated Files and folders to include ExFAT deleted file support.
l Updated Endpoint to include TLS1.3 support.
l Updated Export evidence for Magnet REVIEW to include the Magnet
REVIEW SaaS option.
7.6.0 l Updated Connect to an agent to include a file and folder listing from
the endpoint.
l Updated Endpoint to reference the supported evidence items.
l Updated Microsoft user account to include client credentials authen-
tication method.
l Updated View raw artifact data in Text and hex to include viewing
data as protobuf.
l Updated View Windows registry data to include collapsing items.
7.5.0 l Updated Search with YARA rules to include support for YARA rules
from a Git repository.
l Updated Apple to include iMessage as a separate acquisition
source.
l Updated Add endpoint manually to include Windows manual end-
points can be specified using an FQDN.
l Updated Filter by criteria in the evidence Search and filter evidence
to include filter sets.
l Added Save filter sets.
l Updated Customize AXIOM Examine settings across cases settings
across cases to include media preview settings.
7.4.0 l Updated Create an agent to include a link to the article AXIOM Cyber
signed macOS agents.
21
User Guide
Version Description
l Updated Find more artifacts to include a link to the article Creating
custom artifacts from SQLite database hits.
l Updated Image to include a link to the article Change the character
set encoding in Magnet AXIOM to match the encoding of .zip files.
l Updated Customize processing settings to include GrayKey/VeraKey
discovery settings.
l Updated View database tables to include the protobuf viewer.
l Updated Create exports for specific evidence types to include a link
to the article Understanding PST exports.
22
User Guide
Version Description
l Updated Customize log collection and diagnostics to include
enhanced file source exception reporting.
l Updated Customize processing settings to include image hash veri-
fication in the scan summary.
23
User Guide
Start a case
Your first step is to start your case. You can create a new case in AXIOM Process, or if you've
already created a case, you can also add evidence to an existing case by browsing to a case or
opening a recent case. If you choose to add evidence to an existing case, certain information—
such as the case number, search type, keyword lists, and more—will be locked down based on
the settings from the original search.
If you skip a step that's required, AXIOM Process flags it with a warning symbol , and you
won't be able to start processing until the step is complete.
24
User Guide
supports ASCII, UTF-8, UTF-16, and UTF-32 encoding of the custom types file. Case types
defined in the custom_types.txt file appear in the Custom Types list in the Case details page.
If you have multiple forensic images, you can add them all to the same case.
25
User Guide
Analyze evidence
After you finish configuring each step in AXIOM Process, click Analyze evidence to start scan-
ning the evidence. AXIOM Examine opens automatically to display any evidence that is
recovered. The Analyze evidence screen indicates what percentage of the scan is complete
along with information about search definitions and thread details.
After the search completes, there might be additional steps to complete. If you configured
AXIOM Process to find more artifacts using the Dynamic App Finder, you might have to con-
figure the artifacts that it discovers.
When a search completes, you can view a summary of the completed search—including any
exceptions that might have occurred. You can also view the scan summary from the Case dash-
board in AXIOM Examine. Unprocessed files are also tagged in AXIOM Examine with the Excep-
tions system tag.
26
User Guide
If you have multiple forensic images, you can add them all to the same case.
Computer 27
Cloud 49
Endpoint 111
Mobile 162
Computer
Supported evidence
Supported OS Description
source
Files and folders Windows Use this option to perform a triage investigation
27
User Guide
Supported evidence
Supported OS Description
source
AXIOM Process can obtain images from many types of Windows-based external drives that are
physically connected to your computer such as:
l HDD
l SSD
l USB
28
User Guide
l SD flash drives
l Other external drives
AXIOM Process can't detect and image network-attached storage (NAS) devices over the net-
work. If the computer that's running AXIOM Process is connected directly to the NAS with a
USB cable, detection of the device and imaging work as expected.
Acquire a drive
You can search images on network drives by providing a path to the network drive using the
format \\drive\folder.
If you've installed the Passware plugin, AXIOM Process detects whether a drive is encrypted.
For information about decrypting drives and cracking passwords, see Decrypting evidence.
1. In AXIOM Process, click Evidence Sources > Computer > Windows > Acquire Evid-
ence.
2. Select a drive, and then click Next.
3. If prompted, provide encryption details for the drive.
4. Select the type of image you want to acquire, and then click Next.
5. From the Search type drop-down, select the type of search you want to complete for
the drive.
6. To continue setting up your case, click Next.
There are four imaging options for Windows-based drives that you can choose from. The option
that you choose should reflect your time constraints and the type of data that you're looking
for.
29
User Guide
30
User Guide
Note: You can load evidence using the Drive or Files and Folders workflow however some
information about the artifacts will not be available once the evidence source has been
moved or modified. Whenever possible it's highly recommended to use an image as the evid-
ence source.
Search types
Depending on your evidence type, you can select the type of search that you want
AXIOM Process to run.
Tip: If you don't know the type of file system that you're running a search on, the file system
is not supported using a full or quick search, or you don't have a password to decrypt the
drive, use the Sector level option. Selecting the Sector level option forces AXIOM Process to
search an evidence source bit by bit, so it doesn't matter how the file system is structured.
Full Searches all areas of a drive or image for artifacts. This method
processes fragmented files more effectively than other meth-
ods.
Quick Searches the most common areas of your computer where evid-
ence can be found. Common areas include default application
data directories, the Windows registry, user profiles, and My
Documents.
Sector level Reads raw data from the hard drive and searches for artifacts
that can be carved out and pieced together from that data, with
no understanding of the underlying files and folders.
31
User Guide
When completing a quick search, AXIOM Process searches common areas of the file system.
Common areas include any paths that are specified as important by the artifacts you're includ-
ing in your search as well as any Users and Documents and Settings folders. For Windows file
system searches, AXIOM Process will also search the default locations of common browsers.
l Application support
l Library
l Users
l Documents
l Desktop
l Downloads
l Videos
l Pictures
l Root
$LogFile
$MFT
32
User Guide
Windows drive
Note: You can load evidence using the Drive or Files and Folders workflow however some
information about the artifacts will not be available once the evidence source has been
moved or modified. Whenever possible it's highly recommended to use an image as the evid-
ence source.
You can search any locally connected Windows-based media such as computer and USB drives
without first imaging them. Select any attached media or any partitions within the drive instead.
If you can't see mapped drives, you can make them visible by adding a DWORD value to the
registry. For more information about creating the DWORD value, sign in to the Customer Portal
to review the following article: Show mapped drives in AXIOM Process.
If you've installed the Passware plugin, AXIOM Process detects whether a drive is encrypted.
For information about decrypting drives and cracking passwords, see Decrypting evidence.
1. In AXIOM Process, click Evidence Sources > Computer > Windows > Load evidence
> Drive.
2. Select the drives and partitions that you want to search, and then click Next.
3. If prompted, provide encryption details for the drive.
4. For each drive or partition, from the Search type drop-down, select the type of
33
User Guide
Note: You can load evidence using the Drive or Files and Folders workflow however some
information about the artifacts will not be available once the evidence source has been
moved or modified. Whenever possible it's highly recommended to use an image as the evid-
ence source.
AXIOM Process will search specific files or folders. This option supports files and folders from
Windows, macOS, Linux, and Chromebooks. This option should be used to perform a triage
search of evidence. Whenever possible it's highly recommended to use an image as the evid-
ence source for your case.
If you can't see mapped drives, you can browse to the mapped file's original location using the
Folder browser, or you can make them visible by adding a DWORD value to the registry. For
more information about creating the DWORD value, log in to the Customer Portal to review the
following article: Show mapped drives in AXIOM Process.
Note: For files and folders on a mobile operating system, use the mobile evidence source
option instead.
1. In AXIOM Process, click Evidence sources > Computer >Windows, Mac, or Linux >
Load evidence > Files and folders.
2. Complete one of the following options:
l From the displayed network or disks, browse to and select the files or folders
you want to search, and then click Next.
l Click Folder browser to browse to folder stored locally on your computer, and
then click Select folder.
34
User Guide
l Click File browser to browse a file stored locally on your computer, and then
click Open.
3. Continue setting up your case.
Image
AXIOM Process can search Windows, macOS, Linux, and Chromebook images from other evid-
ence sources. For more information about the computer images that AXIOM Process supports,
see the Supported images and file types.
You can also search images on network drives by providing a path to the network drive using
the format \\drive\folder.
Load an image
When you load an image, if you've installed the Passware plugin, AXIOM Process can detect
whether an evidence source is encrypted and the encryption method used (where possible).
35
User Guide
You can also attempt to decrypt software-encrypted evidence from an APFS-formatted macOS
computer, without requiring the Passware plugin. For information about decrypting drives and
cracking passwords, see Decrypting evidence.
1. In AXIOM Process, click Evidence sources > Computer > Platform > Load evidence
> Image.
2. Browse to your file and click Open.
3. Select the partitions or specific files and folders that you want to include in your
search.
4. If prompted, provide encryption details for the image.
5. To continue setting up your case, click Next.
**Archive files .cpio, .cpio.gz, .crash, .docx, Supported: .gzip, .rar, .rar5,
.hpak, .gz, .gzip, .pptx, .rar, .tar, .zip, .zip.001, .7z.001
.tar.gz, .tgz, .xlsx, .zip, .zip.001,
.z00, .z01, .7z, .7z001
RAW images .bif, .bin, .dd, .dmp, .fip, .ima, Supported: DD (.000, 001,
.img, .mfd, .mem, .raw, .vfd .0000, .0001, .00001, etc.)
*Virtual machine images .vdi, .vhd, .vhdx, VMDK, XVA Supported: .vmdk flat-type
segmented files (*-
f001.vmdk, *-flat.vmdk)
36
User Guide
* Virtual Machine artifacts listed in additional sources must be extracted from the source
image and scanned separately.
**.zip files that were created using encoding different than AXIOM's default encoding, may not
be properly displayed in AXIOM Examine. Sign in to the Support Portal to read the following art-
icle: Change the character set encoding in Magnet AXIOM to match the encoding of .zip files.
Volume shadow copy runs as a service (volume shadow service) on a Windows computer to
create backups or snapshots of files or volumes (including user files).
When you complete a full search of a disk, volume shadow copies are included but sometimes
provide only partial results. You can use the Volume shadow copy option in AXIOM Process to
natively parse a volume shadow copy—this option provides more detail about where artifacts
were recovered from. You can select entire volume shadow copies or expand the copy to select
specific files that you want to search.
1. In AXIOM Process, click Evidence sources > Computer > Windows > Load evidence
> Volume shadow copy.
2. Depending on your evidence source, choose one of the following options:
l To select a connected disk, click Drive.
l To select an existing image, click Image and browse to your file.
3. Select the shadow copies or specific files that you want to include in your search.
4. To continue setting up your case, click Next.
Windows memory
Memory dumps contain a record of all the data currently stored in memory at the time the
dump occurs. These files can contain information about a user's activity on the computer that
might have otherwise been lost when the system crashed or was shut down. The information
available in a memory dump can be especially helpful in incident response investigations as
they contain information about which processes are running and which files are opened by the
user.
37
User Guide
You can acquire a memory dump from a target's computer using MAGNET DumpIt for
Windows, Magnet RAM Capture, or a third-party product.
In AXIOM Process, you can load Windows memory dumps in their native file format (for
example, .raw, core dumps, or .bin) and scan them for artifacts just like you would with a drive.
For example, you can search for known malware and recover the names of processes and IP
addresses, giving you insight into malware investigations.
AXIOM Process: Computer > Windows >Load evidence > Memory > Load memory dump file
To begin processing your memory dump, click load memory dump file and browse to select the
memory dump file. If the memory dump is a valid file, proceed with selecting a memory plug-in.
Depending on your license and the memory dump file selected, you may have an additional
option to use the Comae memory plug-in in addition to the Volatilty memory plug-in to perform
memory analysis.
For more information about selecting a memory plug-in, sign in to the Support Portal to read the
following article: Selecting memory plug-in with AXIOM Cyber.
You can use Comae to perform memory analysis of a Windows memory dump for the following
conditions:
Internet connectivity is required for Comae to download files for application memory analysis.
38
User Guide
In addition to offering support for newer operating systems such as Windows11, Comae can
decrease processing time since you do not need to select a memory profile.
We recommend using the Comae plug-in to perform memory analysis on a crash dump gen-
erated by Magnet DumpIt for Windows since both products were developed by Comae Tech-
nologies.
Note: By default, The MFT Memory artifact is not enabled since it can significantly increase
processing time. See the following to view the settings for MFT scan
1. In AXIOM Process, click Artifact details > Computer artifacts > Memory
2. Select or clear the MFT option for the artifact.
3. Continue setting up your case.
Volatility supports the following images and file types for memory analysis.
Raw images .raw, .dd, .img, .ima, .vfd, .flp, .bif, .bin, .dmg, .mem, .mdf
When analyzing memory dumps using Volatility a memory profile is required. Each memory
dump has a corresponding profile based on its operating system. You can indicate the profile
or have AXIOM Process attempt to find the appropriate profile. Having AXIOM Process identify
the memory profile could take considerable time, depending on the size of the memory dump.
See the following topic for more information about Volatity memory profiles
39
User Guide
In AXIOM Process, you can specify the individual memory artifacts that you want to include in
your search.
1. In AXIOM Process, click Artifact details > Computer artifacts > Memory.
2. Select the memory artifacts you want to search for.
3. Continue setting up your case.
If you used Volatility to scan the memory dump, each artifact corresponds to a Volatility com-
mand. For example, the Processes (pslist) artifact allows you to see which processes ran on a
system, and the Process Security Identifiers (getsids) artifact allows you to view the Security
Identifiers associated with processes. For more information about Volatility commands that
correspond to memory artifacts, see the Volatility Foundation's Command Reference.
You can find the profile of a memory dump using the build number of its operating system.
After you've located the build number, you can find a Volatility profile that matches the build at
www.github.com/volatilityfoundation/volatility/wiki/2.6-Win-Profiles. To learn if the profile is
supported by AXIOM Process, see Volatity memory profiles.
l If the memory dump was recovered from a drive that was already processed using
AXIOM Process, complete the following steps:
1. Open the case in AXIOM Examine.
2. In the Artifacts explorer, browse to the Operating System Information artifact
and locate the Version Number fragment.
l If the memory dump is on a drive that hasn't been processed, complete the following
steps:
1. On the computer where the memory dump was created, press the Windows key
+ R to open the Run dialog.
40
User Guide
If you know the profile of a memory image, you should manually select the profile to reduce
scan time.
Each memory dump has a corresponding profile, based on its operating system. If you don't
know the profile of a memory dump, AXIOM Process can perform a KDbg scan to attempt to
find recommended profiles.
AXIOM Process performs a KDbg scan to attempt to identify the profile. You can
view the results of this scan in the case summary text file in your case folder.
41
User Guide
Windows 10 Win10x64
Win10x64_10240_17770
Win10x64_10586
Win10x64_14393
Win10x64_15063
Win10x64_16299
Win10x64_17134
Win10x64_17763
Win10x64_18362
Win10x64_19041
Win10x86
Win10x86_10240_17770
Win10x86_10586
Win10x86_14393
Win10x86_15063
Win10x86_16299
Win10x86_17134
Win10x86_17763
Win10x86_19041
42
User Guide
Win2012R2x64_18340
Win2012x64
Windows 8 Win81U1x64
Win81U1x86
Win8SP0x86
Win8SP1x64
Win8SP1x64_18340
Win8SP1x86
Windows 7 Win7SP0x64
Win7SP0x86
Win7SP1x64
Win7SP1x64_23418
Win7SP1x64_24000
Win7SP1x86
Win7SP1x86_23418
Win7SP1x86_24000
Win2008R2sP1x64
Win2008R2SP1x64_23418
Win2008R2SP1x64_24000
43
User Guide
Win2008SP1x64
Win2008SP1x86
Win2008SP2x64
Win2008SP2x86
VistaSP0x86
VistaSP1x64
VistaSP1x86
VistaSP2x64
VistaSP2x86
Win2003SP1x64
Win2003SP1x86
Win2003SP2x64
Win2003SP2x86
Windows XP WinXPSP1x64
WinXPSP2x64
WinXPSP2x86
WinXPSP3x86
44
User Guide
Decrypt evidence
For many evidence sources, if you installed the Passware plugin, AXIOM Process detects
whether an evidence source is encrypted and, where possible, the type of encryption method
that was used. You can also attempt to decrypt software-encrypted evidence from an APFS-
formatted macOS computer, without requiring the Passware plugin.
For supported encryption types, you can provide known decryption credentials such as pass-
words and recovery keys, to decrypt the evidence source before AXIOM Process searches it.
For some evidence sources, if you don't know the password, you can try cracking it—otherwise,
AXIOM Process attempts a sector-level search of the drive.
For Windows 10 devices that have BitLocker Device Encryption turned on (including many
Microsoft Surface Pro devices), AXIOM Process will automatically decrypt the device if the
encryption is suspended, also known as a clear key state. If AXIOM Process is unable to auto-
matically decrypt the device, you're prompted to provide known decryption credentials for the
device.
In AXIOM Process, a locked icon appears beside both decrypted and encrypted partitions, as
it's not guaranteed that AXIOM Process will successfully decrypt the drive.
During a search, AXIOM Process adds the decrypted evidence source and the password that
successfully decrypted the evidence source to the Location for acquired evidence that you con-
figured for the case. For decrypted evidence from a macOS computer with the APFS file sys-
tem, you'll find a decrypted image for each partition. Before you attempt to decrypt an evidence
source, make sure you have enough space for the decrypted images.
45
User Guide
FileVault and All versions of macOS formatted with HFS+ (non-system partitions
FileVault 2 are not supported) or APFS
McAfee Drive McAfee 7.x and later (non-system partitions are not supported)
Encryption
PGP Whole Disk PGP Desktop 9.x - 10.x (encrypted drives can't currently be decryp-
Encryption ted using administrator credentials)
(PGP WDE)
Symantec Endpoint All versions (requires Symantec Endpoint Encryption account pass-
Encryption word)
TrueCrypt TrueCrypt 5.0 and later (hidden and system partitions are not sup-
ported)
VeraCrypt All current versions are supported with the exception of UEFI.
If you know the password or recovery key for an evidence source, you can attempt to decrypt it.
For evidence from a macOS computer with the APFS file system, AXIOM Process supports user
46
User Guide
passwords or personal recovery keys, and, in some cases, might be able to display a password
hint.
1. In the Decryption option drop-down list, click I have the password/recovery key.
2. In the Password/Recovery key field, provide a password or recovery key.
3. To verify that the password is correct, click Check.
4. To finish setting up your case, click Next.
You need both a password and a wipe key to decrypt a macOS (HFS+ and HFSX) evidence
source that is encrypted by FileVault. To recover the wipe key, search the recovery partition of
the macOS computer.
1. In AXIOM Process, click Evidence Sources > Computer > Mac > Files and folders.
2. Select the check box beside the recovery partition.
3. Finish setting up your case.
4. Once processing is complete, extract the following file: Encryp-
tedRoot.plist.wipekey. This file is usually stored at \Recovery HD\-
com.apple.-
boot.P\Sys-
tem\Library\Caches\com.apple.corestorage\EncryptedRoot.plist.wipekey.
1. In AXIOM Process, click Evidence Sources > Computer > Mac > Images or Files and
folders.
2. Browse to or select the evidence source you want to decrypt, and then click Next.
3. In the Key file field, provide the wipe key.
4. In the Password field, provide the known password.
5. To verify that the password is correct, click Check.
6. For each item, select the type of search you want to complete.
7. To continue setting up your case, click Next.
47
User Guide
If you don't know the password for a McAfee-encrypted evidence source, you can attempt to
decrypt it using a machine key. Machine keys are Base64 strings that must be 44 characters
long and are unique to each computer. If you provide a machine key in the correct format but
the key is incorrect (for example, the key is not associated with the evidence you are trying to
decrypt), AXIOM Process attempts to decrypt the evidence source but creates an image
without any results.
You obtain a machine key from the McAfee administrator. You find the key at the bottom of the
XML file, between the <MfeEpeExportMachineKey> tags.
In AXIOM Process, when you attempt to decrypt a drive, only the largest partition appears to be
available, as McAfee encrypts entire drives and not individual partitions.
1. In the Decryption option drop-down list, click I have the machine key.
2. In the Machine key field, paste the 44-character machine key from the XML file.
3. To verify that the password is correct, click Check.
4. To continue setting up your case, click Next.
You need both a password and a Personal Iterations Multiplier (PIM) to decrypt VeraCrypt-
encrypted partitions. The PIM specifies the number of iterations used by the header key deriv-
ation function. The higher the PIM, the more secure the encryption is. For more information
about the PIM, see the VeraCrypt PIM documentation.
Note: If you enter the wrong PIM, VeraCrypt won't be able to decrypt the partition.
48
User Guide
To crack the password of a drive, you must be using AXIOM Process with the Passware plugin.
You must also have a password list file in .txt format.
With the dictionary attack capabilities of the Passware plugin, you can use custom password
lists, in .txt format, to attempt to decrypt drives, mobile devices, and images. Passware reads
each new line as a separate password. Additionally, Passware reads spaces at any point in the
line as part of the password.
You can use the AXIOM Wordlist Generator to retrieve a list of keywords from the devices in
your case. This tool writes keywords to a .txt file that you can use to decrypt drives, mobile
devices, and images.
McAfee, APFS, and FileVault-encrypted evidence sources can't be decrypted using password
cracking.
Warning: Password cracking can take a significant amount of time and system resources,
and isn't guaranteed to work. To save time, consider cracking encrypted sources separately
from sources with known passwords.
1. In the Decryption option drop-down list, select I want to crack the password.
2. Click Browse and browse to the location of the .txt file.
3. To continue setting up your case, click Next.
The Analyze evidence screen displays the cracking progress and the number of passwords that
have been attempted. If the drive is successfully decrypted, the blue locked icon changes to the
blue unlocked icon and AXIOM Process begins searching the drive immediately.
If password cracking is successful, that source is skipped during processing. You can find the
correct password, decryption duration, and more in the Passware XML report file. This file is loc-
ated in your case folder and will have a similar name to the decrypted image.
Cloud
49
User Guide
With a AXIOM Cyber license, you can access Microsoft 365 and Google Workspace accounts
with administrator credentials and selectively acquire evidence, and you can acquire evidence
from Amazon S3 and EC2, and Microsoft Azure virtual machines.
AXIOM Cloud is available with a valid cloud license. To find out how to purchase a cloud
license, contact [email protected].
All cloud-based evidence source acquisitions are encrypted, and the encryption methods vary
for each source.
When acquiring cloud evidence, AXIOM Process acquires live data. If a supported platform
makes a change to their product, this change might affect the types of services or content
AXIOM Process can acquire and process. For a current list of any known changes to our ability
to acquire data from our supported platforms (including specific artifacts that might be
impacted), please log in to the Customer Portal to read the following article: Status of sup-
ported cloud acquisition platforms.
When you create a new case in AXIOM Process, you can acquire a single EC2 instance with a
single S3 bucket. If you want to acquire additional instances, add them as a new evidence
source after the original search completes.
50
User Guide
AXIOM Process supports acquiring EC2 instances for Amazon Linux and Ubuntu Server
SSD volume types.
Amazon does not allow direct downloading from an EC2 instance, so to acquire evidence from
an EC2 instance, AXIOM Process initiates an export in AWS which copies the EC2 instance and
its associated drives to create an image. AWS then exports this image to an S3 bucket.
When acquiring an EC2 instance, you do not need to specify a date range. Date ranges are
applicable to directly acquiring S3 buckets only.
Note: There are typically costs associated with transferring data from AWS over the internet
to a local machine. When you acquire evidence from AWS, you might be charged a nominal
fee per GB of data downloaded based on your storage plan. For more information about spe-
cific charges you might incur, please consult the Amazon S3 pricing plans.
To acquire evidence from an Amazon EC2 instance, there are several prerequisites and lim-
itations you should be aware of. For detailed information about how to prepare for acquiring an
EC2 instance, review the Limitations and prerequisites for acquiring an EC2 instance article in
the Magnet Forensics Customer Portal.
To sign in to and acquire an EC2 instance, you must provide authentication details for the
AWS account required for your organization's AWS configuration. Depending on your organ-
ization's AWS configuration, you might be prompted to provide additional authentication
details. You can find these authentication details in the AWS Management Console. For more
information about the authentication details required and where to find them, review the Pre-
pare the AWS authentication details for AXIOM article in the Magnet Forensics Customer
Portal.
1. In AXIOM Process, click Evidence sources > Cloud > Acquire evidence.
2. Confirm that you have proper search authorization.
3. Click Amazon.
51
User Guide
After you gain access to the AWS account, you can specify that you want to acquire an EC2
instance, and then select the EC2 instance that you want to download.
1. In Select services and content, select the Amazon EC2 instances source type
option.
2. In the Content column, click Edit.
3. In the Select EC2 instances to download section, search for the EC2 instance or
click View all instances.
4. In the table, select the EC2 instance that you want to download, and then click Next.
The following types of data can be acquired from an Amazon EC2 instance.
For a complete list of supported cloud data sources by authentication type, review supported
cloud data sources by authentication type.
To download an EC2 instance, AXIOM Process initiates an export in AWS. This export copies
the EC2 instance and all of the drives associated with it to create an image. Next, AWS exports
the image to an S3 bucket.
To export an image to an S3 bucket, you must provide some information about the export such
as the disk image format and the S3 bucket you want to export the image to. To help organize
52
User Guide
your evidence in the S3 bucket, you can optionally provide a prefix to add to the name of the
image of the EC2 instance. For example, you could add the target's name as the prefix value.
AXIOM Process supports VHD, VMDK, and RAW disc images formats for images of an EC2
instance.
1. In the Export description field, provide a description for the exported EC2 instance.
2. In the Disk image format drop-down, select a format for the image of the exported
EC2 instance.
3. In the S3 bucket field, type the name of the S3 bucket where you want to store the
image.
4. In the S3 prefix field, optionally provide a prefix to add to the name of the image of
the EC2 instance.
5. When you've finished selecting services and content, click Next to continue setting
up your case.
Note: Storing an image of an EC2 instance in an S3 bucket might incur monthly costs. After
you've successfully acquired the EC2 instance, consider removing the image from the S3
bucket to avoid additional expenses.
Amazon S3 bucket
To sign in to and acquire S3 buckets, you must provide authentication details for the
AWS account required for your organization's AWS configuration. Depending on your organ-
ization's AWS configuration, you might be prompted to provide additional authentication
details. You can find these authentication details in the AWS Management Console. For more
information about how to find each of the required authentication details, review the Find AWS
authentication details article in the Magnet Forensics Customer Portal.
1. In AXIOM Process, click Evidence sources > Cloud > Acquire evidence.
2. Confirm that you have proper search authorization.
3. Click Amazon.
53
User Guide
After you gain access to the Amazon account, you can select a date range to acquire data
from. By default, AXIOM Process acquires data from as far back in time as possible for the
account. Acquiring some accounts can take a long time depending on the amount of data they
contain, so you might want to narrow the date range to decrease the amount of time the acquis-
ition takes.
1. In the Date range drop-down list, select one of the following options:
l To acquire data after a specified date, click After.
l To acquire data before a specified date, click Before.
l To acquire data between two specified dates, click Custom date range.
2. Click the calendar icon and choose a date.
After you gain access to the AWS account, you can specify that you want to acquire an S3
bucket, and then select the buckets or files that you want to download.
1. In Select services and content, select the Amazon S3 files source type option.
2. In the Content column, click Edit.
3. Select the buckets or files that you want to acquire.
4. To continue setting up your case, click Next
54
User Guide
For a complete list of supported cloud data sources by authentication type, review supported
cloud data sources by authentication type.
To acquire evidence from the cloud, you can sign in to an account with the target's user name
and password, or—for some platforms—an authentication token that AXIOM Process discovers
during a search or creates itself. For some cloud platforms, you can also acquire activity that is
accessible to the public.
For a list of the supported cloud platforms and the license required, see Supported cloud plat-
forms and services.
For more information about preparing cloud accounts for acquisition, see the help topic for the
cloud platform you are trying to acquire.
When you create a new case in AXIOM Process, you can acquire a single account for each
cloud platform or service. If you want to add additional accounts, Add, remove, or reprocess
evidence in a case after the original search completes.
After your search completes, you can find the login credentials for each cloud account that you
acquire in the Cloud Accounts Information artifact in AXIOM Examine so that you can easily
acquire additional information from the account later. You can also acquire additional inform-
ation from the cloud by Acquire more data from a cloud account found during a search or
decrypting a WhatsApp backup using a recovered decryption key.
Each service and platform is saved in a separate folder, each containing an attachments folder.
The files are saved in the same structure that appears in the account online and in the File sys-
tem view in AXIOM Examine.
If your agency requires that you use AXIOM Process through a proxy server, you can still use
AXIOM Cloud to acquire users' accounts for Box.com, Dropbox, Facebook, Google, Instagram,
55
User Guide
and Microsoft. For more information about how to use AXIOM Process through a proxy server,
see Connect to the internet using a system proxy.
You can save cloud acquisitions in AFF4-L or ZIP containers. The default container type for
cloud acquisitions is AFF4-L.
Apple ✓ ✓
Box.com (User) ✓ ✓
Box.com (Admin) ✓
Dropbox ✓ ✓
Facebook ✓ ✓
Google (User) ✓ ✓
Google (admin) ✓
IMAP / POP ✓ ✓
Lyft ✓ ✓
Mega ✓ ✓
56
User Guide
Microsoft (User) ✓ ✓
Microsoft Azure ✓
Microsoft Teams ✓
Slack ✓
Uber ✓ ✓
For a complete list of supported cloud data sources by authentication type, review supported
cloud data sources by authentication type.
Apple
When you acquire an Apple user account, you must take the following steps:
Before you begin, see Acquire a cloud user account for considerations that apply to all cloud
account acquisitions.
Note: When AXIOM Process gains access to an account, the owner of the account might
receive an email notifying them that someone has signed in to their account.
When acquiring an Apple account, you can authenticate using the username and password, or a
token. The types of data that you can acquire using the username and password or token
57
User Guide
authentication methods is the same, however the data available might be limited to the per-
missions of the token.
Authentication steps
1. In AXIOM Process, click Evidence sources > Cloud > Acquire evidence.
2. Confirm that you have proper search authorization.
3. Click Apple.
4. Authenticate with your chosen method.
1. In the Date range drop-down list, select one of the following options:
l To acquire data after a specified date, click After.
l To acquire data before a specified date, click Before.
l To acquire data between two specified dates, including those dates selected,
click Custom date range.
2. Click the calendar icon and choose a date.
Apple
58
User Guide
2FA/MFA sup-
Authentication type Data sources
port
For a complete list of supported cloud data sources by authentication type, review supported
cloud data sources by authentication type.
59
User Guide
Box.com
When you acquire a Box.com user account, you must take the following steps:
Before you begin, see Acquire a cloud user account for considerations that apply to all cloud
account acquisitions.
Before you acquire the account, you might need to perform some steps that will allow the
account to be acquired. Review the following articles to help you prepare the account:
l To acquire a Box.com account, you might need to configure the Admin Console in
Box.com to allow access to AXIOM Process. If the Box.com administrator limited
which third-party applications can connect to the Box.com account, you'll receive an
error. For more information on how to ensure the account is ready for acquisition, see
Configure a Box.com account for acquisition.
l A co-admin account must have Edit settings and apps for your company enabled to
acquire other accounts. For steps on how to configure a co-admin account with Edit
settings, see Configure a Box.com co-admin account to acquire accounts.
Note: When AXIOM Process gains access to an account, the owner of the account might
receive an email notifying them that someone has signed in to their account.
60
User Guide
You can authenticate a Box.com account using a username and password or using a token.
The data that can be acquired differs based on the type of account (user or admin) that you are
acquiring. The authentication method does not change the data that can be acquired.
Authentication steps
1. In AXIOM Process, click Evidence sources > Cloud > Acquire evidence.
2. Confirm that you have proper search authorization.
3. Select Box.com.
4. Authenticate with your chosen method.
User/admin ✓ ✓
Admin ✓ ✓
61
User Guide
1. In the Date range drop-down list, select one of the following options:
l To acquire data after a specified date, click After.
l To acquire data before a specified date, click Before.
l To acquire data between two specified dates, including those dates selected,
click Custom date range.
2. Click the calendar icon and choose a date.
Box.com
For a complete list of supported cloud data sources by authentication type, review supported
cloud data sources by authentication type.
62
User Guide
Dropbox
When you acquire a Dropbox account, you must take the following steps:
Before you begin, see Acquire a cloud user account for considerations that apply to all cloud
account acquisitions.
Note: When AXIOM Process gains access to an account, the owner of the account might
receive an email notifying them that someone has signed in to their account.
When acquiring a Dropbox account, you can authenticate using the username and password, or
a token. The types of data that you can acquire using the username and password or token
authentication methods is the same, however the data available may be limited to the per-
missions of the token.
Authentication steps
1. In AXIOM Process, click Evidence sources > Cloud > Acquire evidence.
2. Confirm that you have proper search authorization.
3. Click Dropbox.
4. Authenticate with your chosen method.
63
User Guide
You can acquire files and folders from Dropbox. By default, AXIOM Process acquires data from
as far back in time as possible for the account. Acquiring some accounts can take a long time
depending on the amount of data they contain, so you might want to narrow the date range to
decrease the amount of time the acquisition takes. The date range logic applies to the fol-
lowing metadata properties and includes files that match the "from" and "to" date:
l Client modified: The modification time set by the desktop client when the file was
added to Dropbox. This time is not verified and should not be used to determine if a
file has changed or not.
l Server modified: The last time the file was modified on Dropbox.
l Time taken: The timestamp when the photo or video was taken.
Dropbox
64
User Guide
For a complete list of supported cloud data sources by authentication type, review supported
cloud data sources by authentication type.
When you acquire a Facebook user account, you must take the following steps:
Before you begin, see Acquire a cloud user account for considerations that apply to all cloud
account acquisitions.
Note: When AXIOM Process gains access to an account, the owner of the account might
receive an email notifying them that someone has signed in to their account.
When acquiring a Facebook account, you can only authenticate using the username and pass-
word.
Authentication steps
1. In AXIOM Process, click Evidence sources > Cloud > Acquire evidence.
2. Confirm that you have proper search authorization.
3. Click Facebook.
4. Authenticate with your username and password.
65
User Guide
1. In the Date range drop-down list, select one of the following options:
l To acquire data after a specified date, click After.
l To acquire data before a specified date, click Before.
l To acquire data between two specified dates, click Custom date range.
2. Click the calendar icon and choose a date.
Facebook Public
Username/Password
l Profile information
l Timeline posts
66
User Guide
For a complete list of supported cloud data sources by authentication type, review supported
cloud data sources by authentication type.
When you acquire a Google user account, you must take the following steps:
Before you begin, see Acquire a cloud user account for considerations that apply to all cloud
account acquisitions.
Before you acquire the account, you might need to perform some steps that will allow the
account to be acquired. Consider if any of the following scenarios applies to you:
l To allow Magnet AXIOM to access data from user accounts under an administrator's
Google Workspace account, you must configure the administrator account to give
read-only access to user data in the domain. For steps on how to configure these set-
tings in the admin console, see Configure the Google Admin console to give access
to Google Workspace user accounts
l Two-factor authentication is used to verify a user's identity by requiring extra authen-
tication information, such as a number code in addition to login credentials. For more
information on how to access the additional authentication information, see Access-
ing cloud accounts that use two-factor authentication.
67
User Guide
Note: When AXIOM Process gains access to an account, the owner of the account might
receive an e-mail notifying them that someone has signed in to their account.
There are a few different authentication methods you can use when acquiring a Google
account. Each authentication method gives you access to different types of data on the target
account. The data that you can acquire from an account differs between admin and user
accounts, regardless of the authentication method used. The authentication methods include:
l Username and password - Use this option if you have the user name and password of
the account. For more information on the differences between acquiring a user and
admin account, see Authenticate a Google account using the user name and pass-
word through AXIOM Process or AXIOM Cloud Authenticator
l Google Chrome authentication (advanced) - Use this option if you are having trouble
authenticating in AXIOM Process. You must download the AXIOM Cloud Authentic-
ator browser extension before authenticating.
After you authenticate the account, close the browser window and return to
AXIOM Process to continue with the acquisition. Any additional browser activity
will be logged against the target account.
For more information on the differences between acquiring a user and admin
account, see Authenticate a Google account using the user name and password
through AXIOM Process or AXIOM Cloud Authenticator.
l External browser authentication - Use this option if you are having trouble authen-
ticating in AXIOM Process.
l Account token - Use this option if you have an account token that you found in a
search. For more information on locating and using a token from a search, see Add
cloud evidence using recovered passwords and tokens.
For instructions on how to authenticate the account, see Authentication steps. For more inform-
ation on selecting data from the account, see Select the data to acquire.
68
User Guide
Authenticate a Google account using the user name and password through
AXIOM Process or AXIOM Cloud Authenticator
A Google Workspace administrator has different privileges than other users. With an admin-
istrator account, you can access data from the signed-in account, as well as the user accounts
that the administrator has access to. If you choose to access admin account data only, you will
only have access to the data from the admin account that you provide credentials for. Logging
in with the account's user name and password or through gives you access to all data in the
account.
When you are acquiring data from an admin and user account, be aware that the date range
configured applies to all selected accounts, however the type of data that you acquire from
each account is set on a per account basis. Accounts that do not have read access cannot be
added as evidence sources.
Authentication steps
1. In AXIOM Process, click Evidence sources > Cloud > Acquire evidence.
2. Confirm that you have proper search authorization.
3. Select Google.
4. Authenticate with your chosen method.
5. (Optional for admin accounts authenticated with user name and password) Add
user accounts:
a. Select Add user accounts.
b. In the Add user accounts dialog, search for an account.
You can search against user names and email addresses. Accounts with
read access as well as those that do not have read access are included in
the search.
c. To select an account, you can select a result from the auto suggestion list,
or after entering a search value, press Enter and then select one or more
accounts from the table.
d. Click Add accounts to add the selected accounts as evidence sources.
69
User Guide
6. If you authenticated with an admin account and you want to add it to the acquis-
ition, select Add authenticated admin account.
7. To set the data to be acquired for each account, click Select data to acquire next to
the account you want to configure.
1. In the Date range drop-down list, select one of the following options:
l To acquire data after a specified date, click After.
l To acquire data before a specified date, click Before.
l To acquire data between two specified dates, including those dates selected,
click Custom date range.
2. Click the calendar icon and choose a date.
When acquiring Google Drive, AXIOM Process acquires all files and folders that are present
within the date range even if the relevant date times (creation, accessed, modified) are before
the date range.
l Username/Password ✓ l Gmail
l Chrome authentication l Google Activity
70
User Guide
*The following MIME types will have metadata available in your acquisition, but are not sup-
ported for download:
l application/vnd.google-apps.audio
l application/vnd.google-apps.drive-sdk
l application/vnd.google-apps.fusiontable
l application/vnd.google-apps.map
71
User Guide
l application/vnd.google-apps.photo
l application/vnd.google-apps.unknown
l application/vnd.google-apps.video
For a complete list of supported cloud data sources by authentication type, review supported
cloud data sources by authentication type.
When you acquire an Instagram user account, you must take the following steps:
Before you begin, see Acquire a cloud user account for considerations that apply to all cloud
account acquisitions.
Note: When AXIOM Process gains access to an account, the owner of the account might
receive an email notifying them that someone has signed in to their account.
When acquiring an Instagram account, you can only authenticate using the username and pass-
word of the account.
72
User Guide
Authentication steps
1. In AXIOM Process, click Evidence sources > Cloud > Acquire evidence.
2. Confirm that you have proper search authorization.
3. Click Instagram.
4. Authenticate with the username and password.
1. In the Date range drop-down list, select one of the following options:
l To acquire data after a specified date, click After.
l To acquire data before a specified date, click Before.
l To acquire data between two specified dates, click Custom date range.
2. Click the calendar icon and choose a date.
73
User Guide
For a complete list of supported cloud data sources by authentication type, review supported
cloud data sources by authentication type.
Lyft
When you acquire a Lyft user account, you must take the following steps:
Before you begin, see Acquire a cloud user account for considerations that apply to all cloud
account acquisitions.
Note: When AXIOM Process gains access to an account, the owner of the account might
receive an email notifying them that someone has signed in to their account.
Authentication steps
1. In AXIOM Process, click Evidence sources > Cloud > Acquire evidence.
2. Confirm that you have proper search authorization.
3. Click Lyft.
4. Authenticate with the username and password for the account.
74
User Guide
1. In the Date range drop-down list, select one of the following options:
l To acquire data after a specified date, click After.
l To acquire data before a specified date, click Before.
l To acquire data between two specified dates, including those dates selected,
click Custom date range.
2. Click the calendar icon and choose a date.
Lyft
For a complete list of supported cloud data sources by authentication type, review supported
cloud data sources by authentication type.
75
User Guide
You can acquire evidence from the following Microsoft User account services:
Azure
Note: Only one Microsoft evidence source can be included in a case. Each Microsoft evid-
ence source must be in a separate case.
Azure
When you acquire an Azure account, you must take the following steps:
Before you begin, see Acquire a cloud user account for considerations that apply to all cloud
account acquisitions.
76
User Guide
Note: When AXIOM Process gains access to an account, the owner of the account might
receive an email notifying them that someone has signed in to their account.
1. In AXIOM Process, click Evidence sources > Cloud > Acquire evidence.
2. Confirm that you have proper search authorization.
3. Click Azure.
4. Authenticate with the account credentials.
Note: Storing an image of an Azure virtual machine might incur monthly costs. After you've
successfully acquired the virtual machine, consider removing the image from Azure to avoid
additional expenses.
Azure
For a complete list of supported cloud data sources by authentication type, review supported
cloud data sources by authentication type.
77
User Guide
Microsoft Teams
When you acquire a Microsoft Teams account, you must take the following steps:
Before you begin, see Acquire a cloud user account for considerations that apply to all cloud
account acquisitions.
Note: When AXIOM Process gains access to an account, the owner of the account might
receive an email notifying them that someone has signed in to their account.
There are a few different authentication methods you can use when acquiring a Microsoft
Teams account. Each authentication method gives you access to different types of data on the
target account. The authentication methods include:
l Username and password - Use this option if you have the username and password of
the account.
l External browser authentication - Use this option if you are having trouble authen-
ticating in AXIOM.
78
User Guide
l Account token - Use this option if you have an account token that you found in a
search. For more information on locating and using a token from a search, see Add
cloud evidence using recovered passwords and tokens.
Authentication steps
1. In AXIOM Process, click Evidence sources > Cloud > Acquire evidence.
2. Confirm that you have proper search authorization.
3. Click Microsoft Teams.
4. Authenticate with your chosen method.
1. In the Date range drop-down list, select one of the following options:
l To acquire data after a specified date, click After.
l To acquire data before a specified date, click Before.
l To acquire data between two specified dates, including those dates selected,
click Custom date range.
2. Click the calendar icon and choose a date.
Microsoft Teams
79
User Guide
For a complete list of supported cloud data sources by authentication type, review supported
cloud data sources by authentication type.
When you acquire a Microsoft account, you must take the following steps:
Before you begin, see Acquire a cloud user account for considerations that apply to all cloud
account acquisitions.
80
User Guide
l To acquire evidence from Microsoft user accounts, you might need to configure Act-
ive Directory in Azure to allow access to Magnet Forensics International, Inc applic-
ation and give access to user accounts. For more information on how to configure
Azure, see Configure Microsoft Azure to give access to Microsoft user accounts.
l Microsoft 365 accounts with administrator privileges often have access to more data
than typical user accounts. With a global administrator account, you might be able
acquire more data including audit logs and other users' mailboxes. By default, admin-
istrator accounts don't have read access to other users' mailboxes. For more inform-
ation on how to configure read access to only the accounts you want to acquire as
part of an investigation, or all accounts, see Configure an Microsoft 365 account for
acquisition.
l If you have a Microsoft 365 account with administrator privileges, you can give exam-
iners access to other users' SharePoint accounts. When you give examiners access
to other users' SharePoint accounts, they also get access to those users' OneDrive
accounts. If you would like to provide examiners with this level of access, see Give
examiners access to users' Microsoft 365 SharePoint and OneDrive accounts
Note: When AXIOM Process gains access to an account, the owner of the account might
receive an email notifying them that someone has signed in to their account.
There are a few different authentication methods you can use when acquiring a Microsoft
account. Each authentication method gives you access to different types of data on the target
account. The data that you can acquire from an account differs between admin and user
accounts, regardless of the authentication method used. The authentication methods include:
l Username and password - Use this option if you have the username and password of
the account.
l External browser authentication - Use this option if you are having trouble authen-
ticating in AXIOM.
81
User Guide
l Account token - Use this option if you have an account token that you found in a
search. For more information on locating and using a token from a search, see Add
cloud evidence using recovered passwords and tokens.
l Client credentials - This method acquires data at the organization level. Use this
option if you have a Cloud Premium license and Administrator access to your Azure
Portal. For more information about obtaining client credentials, sign in to the Support
Portal to read the following article: Sign in to Microsoft using client credentials.
Authentication steps
1. In AXIOM Process, click Evidence sources > Cloud > Acquire evidence.
2. Confirm that you have proper search authorization.
3. Click Microsoft, then Microsoft account.
4. Authenticate with your chosen method.
After you gain access to a cloud account, you can select a date range to acquire data from. By
default, AXIOM Process acquires data from as far back in time as possible for the account.
Acquiring some accounts can take a long time depending on the amount of data they contain,
so you might want to narrow the date range to decrease the amount of time the acquisition
takes.
82
User Guide
1. In the Date range drop-down list, select one of the following options:
l To acquire data after a specified date, click After.
l To acquire data before a specified date, click Before.
l To acquire data between two specified dates, including those dates selected,
click Custom date range.
2. Click the calendar icon and choose a date.
Use a single keyword list to limit the content acquired from a Microsoft Outlook mail account.
Keywords will only filter Outlook mail acquisitions and will not be used to filter other Microsoft
applications.
Keyword lists must be .txt files and each search term must appear on a new line. A keyword list
can contain up to 30 keywords. Each keyword must be minimum of 2 characters in length.
Note: Keyword lists with more than 10 entries can significantly increase the time to acquire
larger Outlook mail accounts.
For more information about best practices and limitations on using keywords to acquire
Microsoft mail accounts, log in to the Customer Portal to read the following article: Using
keyword lists and date ranges for Microsoft mail acquisitions.
83
User Guide
Select the SharePoint sites to acquire from the authenticated account's organization.
SharePoint can only be accessed at an organization level. SharePoint is only available with the
Cloud Premium license.
Add user accounts and the authenticated account you wish to acquire.
84
User Guide
Once the user accounts have been selected, click Select data to acquire for each user account
to define the applications to acquire.
Note: The number beside each Outlook folder represents the count of messages in the cur-
rent folder only. It does not include the count for any sub-folders.
Select the files you want to acquire from the authenticated account's OneDrive account.
85
User Guide
Microsoft
Username/Password ✓ l Office365/Microsoft
Mail
l OneDrive Files
l OneDrive Version His-
tory
l Office365 Outlook
Contact
l Office365 Audit Logs*
l Sharepoint *
l Office365 Outlook Cal-
endars
86
User Guide
For a complete list of supported cloud data sources by authentication type, review supported
cloud data sources by authentication type.
Mega
When you acquire a Mega user account, you must take the following steps:
Before you begin, see Acquire a cloud user account for considerations that apply to all cloud
account acquisitions.
Note: When AXIOM Process gains access to an account, the owner of the account might
receive an email notifying them that someone has signed in to their account.
Authentication steps
1. In AXIOM Process, click Evidence sources > Cloud > Acquire evidence.
2. Confirm that you have proper search authorization.
3. Click Mega.
4. Authenticate with your chosen method.
87
User Guide
After you gain access to a cloud account, you can select a date range to acquire data from. By
default, AXIOM Process acquires data from as far back in time as possible for the account.
Acquiring some accounts can take a long time depending on the amount of data they contain,
so you might want to narrow the date range to decrease the amount of time the acquisition
takes.
1. In the Date range drop-down list, select one of the following options:
l To acquire data after a specified date, click After.
l To acquire data before a specified date, click Before.
l To acquire data between two specified dates, including those dates selected,
click Custom date range.
2. Click the calendar icon and choose a date.
Mega.NZ
For a complete list of supported cloud data sources by authentication type, review supported
cloud data sources by authentication type.
88
User Guide
Slack
When you acquire a Slack account, you must take the following steps:
Before you begin, see Acquire a cloud user account for considerations that apply to all cloud
account acquisitions.
Before you acquire the account, you might need to Configure Slack to allow access to
AXIOM Process.
Note: When AXIOM Process gains access to an account, the owner of the account might
receive an email notifying them that someone has signed in to their account.
When acquiring a Slack account, you can authenticate using the username and password, or a
token. The types of data that you can acquire using the username and password or token
authentication methods is the same, however the data available may be limited to the per-
missions of the token.
89
User Guide
takes. The date range logic applies to posts and messages posted or sent within the date
range, including the dates selected.
1. In the Date range drop-down list, select one of the following options:
l To acquire data after a specified date, click After.
l To acquire data before a specified date, click Before.
l To acquire data between two specified dates, click Custom date range.
2. Click the calendar icon and choose a date.
Slack
For a complete list of supported cloud data sources by authentication type, review supported
cloud data sources by authentication type.
From the Select services and content section, select the content you want to acquire and then
click Next.
When you acquire a Twitter account, you must take the following steps:
90
User Guide
Before you begin, see Acquire a cloud user account for considerations that apply to all cloud
account acquisitions.
Note: When AXIOM Process gains access to an account, the owner of the account might
receive an email notifying them that someone has signed in to their account.
When acquiring a Twitter account, authenticate using the username and password.
1. In the Date range drop-down list, select one of the following options:
l To acquire data after a specified date, click After.
l To acquire data before a specified date, click Before.
l To acquire data between two specified dates, including those dates selected,
click Custom date range.
2. Click the calendar icon and choose a date.
91
User Guide
For a complete list of supported cloud data sources by authentication type, review supported
cloud data sources by authentication type.
From the Select services and content section, select the content you want to acquire and then
click Next.
Uber
When you acquire an Uber account, you must take the following steps:
Before you begin, see Acquire a cloud user account for considerations that apply to all cloud
account acquisitions.
92
User Guide
Note: When AXIOM Process gains access to an account, the owner of the account might
receive an email notifying them that someone has signed in to their account.
Authentication steps
1. In AXIOM Process, click Evidence sources > Cloud > Acquire evidence.
2. Confirm that you have proper search authorization.
3. Click Uber.
4. Authenticate with your chosen method.
1. In the Date range drop-down list, select one of the following options:
l To acquire data after a specified date, click After.
l To acquire data before a specified date, click Before.
l To acquire data between two specified dates, including those dates selected,
click Custom date range.
2. Click the calendar icon and choose a date.
93
User Guide
Uber
For a complete list of supported cloud data sources by authentication type, review supported
cloud data sources by authentication type.
From the Select services and content section, select the content you want to acquire and then
click Next.
l Only the previous year's worth of data can be acquired using cloud authentication.
l You might not be able to acquire all messages from accounts with a large amount
of data.
In these instances, you might be able to acquire the remaining messages from the device
that created the messages or a WhatsApp backup.
When you acquire a WhatsApp account, you must take the following steps:
Before you begin, see Acquire a cloud user account for considerations that apply to all cloud
account acquisitions.
94
User Guide
Note: When AXIOM Process gains access to an account, the owner of the account might
receive an email notifying them that someone has signed in to their account.
There are a few different authentication methods you can use when acquiring a WhatsApp
account. Each authentication method gives you access to different types of data on the target
account. The authentication methods include:
l QR code access - You must have access to WhatsApp on the device. The QR code
method does not include acquiring WhatsApp backup data. The device being scanned
must have a strong internet connection.
l Google drive backup - The backup will only be available if the user has WhatsApp
backup turned on for their Google account.
o User name and password - Might require multi-level authentication.
o Google Chrome extension (advanced) - You must download the AXIOM Cloud
Authenticator browser extension before authenticating.
Authentication steps
1. In AXIOM Process, click Evidence sources > Cloud > Acquire evidence.
2. Confirm that you have proper search authorization.
3. Select WhatsApp.
4. Authenticate with your chosen method.
95
User Guide
1. In the Date range drop-down list, select one of the following options:
l To acquire data after a specified date, click After.
l To acquire data before a specified date, click Before.
l To acquire data between two specified dates, including those dates selected,
click Custom date range.
2. Click the calendar icon and choose a date.
WhatsApp QR Code
For a complete list of supported cloud data sources by authentication type, review supported
cloud data sources by authentication type.
l Groups
o Participants - Participant names include the name set on the user's WhatsApp
profile. If the contact's profile name is not provided, the name appears empty
and only the author's phone number is shown.
96
User Guide
l Chats
o Text messages
o Image messages
o Document messages
o Audio messages
o Video messages
o Extended text messages (only replies to quoted messages are supported)
l Contacts - Contact names include the name set on the user's WhatsApp profile, not
the name set for the contact on the target's device.
Public activity
You can acquire publicly available activity from Twitter, Instagram, and Facebook. When you
create a new case in AXIOM Process, you can acquire a single date range and user name for
each platform. If you want to search for additional date ranges and user names, you can add
them as a new evidence source after the original search completes.
Note: Depending on the amount of data available, acquiring public activity can take a long
time, so you should narrow the date range to decrease the amount of time the acquisition
takes and to find the most important evidence.
In some situations, AXIOM Process might not be able to acquire all public activity.
Public Twitter activity, such as Retweets, content filtered by Twitter from public search results,
protected Tweets, user accounts that are not completely configured, or Tweets that are not part
of the supported history of the Twitter Standard Search API. The returned results might vary
97
User Guide
depending on which Tweets the Twitter algorithms make available on the Advanced Search
page at a given time.
AXIOM Process might not be able to acquire some public Instagram activity, such as if the Ins-
tagram posts are later made private.
The data available to acquire from Facebook depends on the privacy settings set by the target
account. For example, if the target user set the audience for their posts to be "Friends alone",
the posts can only be acquired if the Facebook account you signed in to in AXIOM Process is a
friend of the target user. Additionally, if friends of the target account have deactivated their
Facebook accounts, these accounts might not be displayed by Facebook and will not be
acquired by AXIOM Process.
You can acquire publicly available activity from Twitter without requiring authentication inform-
ation for specific users. When you search for publicly available Twitter activity from a specific
user name, include the complete handle.
Make sure that you include the @ symbol (for example, @MagnetForensics) and format the
user name correctly. For example, Twitter user names must be less than 15 characters and
include only alphanumeric characters (letters A-Z and numbers 0-9) and underscores.
1. In AXIOM Process, click Evidence sources > Cloud > Acquire evidence.
2. Confirm that you have proper search authorization.
3. Click Twitter > Twitter public activity.
4. Select the Date range you want to acquire data from.
5. In the User name field, provide the user name of the account whose public activity
you want to acquire.
6. Select the services and content you want to acquire.
7. To continue setting up your case, click Next.
98
User Guide
Instagram offers a limited subset of data publicly before requiring viewers to sign in to an
account. To fully acquire the publicly available data, you must sign in to an Instagram account.
You can use any active Instagram account to acquire public activity.
Note: AXIOM Process will not store the account credentials in the case and will only use the
credentials for the purposes of acquiring data.
After signing in to an Instagram account, choose whether you want to acquire public activity for
a specific user name or hashtag. Instagram user names must be less than 30 characters and
can include letters, numbers, periods and underscores. You do not need to include the @ or #
symbol prior to the user name or hashtag.
1. In AXIOM Process, click Evidence sources > Cloud > Acquire evidence.
2. Confirm that you have proper search authorization.
3. Click Instagram > Instagram public activity.
4. To acknowledge the message indicating that you need to sign into an account, click
Next.
5. Provide a user name and password for any active Instagram account, and then click
Log in.
6. Select the Date range you want to acquire data from.
7. Select whether you want to acquire posts from a specific user name or hashtag.
8. Provide the user name of the account whose public activity you want to acquire or
provide the hashtag you want to search for.
9. Click Check to confirm that the account exists and that it is set to public.
Note: To acquire the data of a private account, you must log in to the target Ins-
tagram user account. To learn more about acquiring data from a private account,
see Cloud-based user accounts.
99
User Guide
Facebook offers a limited subset of data publicly before requiring viewers to sign in to an
account. To fully acquire the publicly available data, you must sign in a Facebook account. You
can use any active Facebook account to acquire public activity.
Note: AXIOM Process will not store the account credentials in the case and will only use the
credentials for the purposes of acquiring data.
After signing in to a Facebook account, enter the URL of the target Facebook account whose
activity you want to acquire. Make sure that you include the full URL, including "https://". Usu-
ally, the URL looks like "https://www.facebook.com/unique user ID/".
1. In AXIOM Process, click Evidence sources > Cloud > Acquire evidence.
2. Confirm that you have proper search authorization.
3. Click Facebook > Public activity.
4. To acknowledge the message indicating that you need to sign into an account, click
Next.
5. Provide a user name and password for an Instagram account, and then click Log in.
6. Select the Date range you want to acquire data from.
7. In the Target profile URL field, provide the URL of the target Facebook account
whose activity you want to acquire.
8. To continue setting up your case, click Next.
Sign in to the Customer Portal to view the status of supported cloud acquisition platforms for
more information concerning platform availability.
100
User Guide
Apple
2FA/MFA sup-
Authentication type Data sources
port
Azure
Box.com
Dropbox
101
User Guide
Facebook Public
Username/Password
l Profile information
l Timeline posts
l Username/Password ✓ l Gmail
l Chrome authentication l Google Activity
(advanced) l Google Audit Logs
l Google Calendar
l Google Connected Apps
l Google Drive Activity*
l Google Drive Files
l Google Drive Version History
l Google Hangouts
l Google Photos
l Google Stored Passwords
l Google Timeline Locations
l Recent Devices
102
User Guide
*The following MIME types will have metadata available in your acquisition, but are not sup-
ported for download:
l application/vnd.google-apps.audio
l application/vnd.google-apps.drive-sdk
l application/vnd.google-apps.fusiontable
l application/vnd.google-apps.map
l application/vnd.google-apps.photo
l application/vnd.google-apps.unknown
l application/vnd.google-apps.video
IMAP/POP
103
User Guide
Lyft
Mega.NZ
Microsoft
Username/Password ✓ l Office365/Microsoft
Mail
l OneDrive Files
l OneDrive Version His-
tory
l Office365 Outlook
Contact
l Office365 Audit Logs*
l Sharepoint *
l Office365 Outlook Cal-
endars
104
User Guide
Mail
l OneDrive Files
l Office365 Outlook
Contact
l Sharepoint
l Office365 Outlook Cal-
endars
Microsoft Teams
Slack
105
User Guide
l Following
Uber
WhatsApp QR Code
Apple ✓ ✓
Box.com (User) ✓ ✓
Box.com (Admin) ✓
106
User Guide
Dropbox ✓ ✓
Facebook ✓ ✓
Google (User) ✓ ✓
Google (admin) ✓
IMAP / POP ✓ ✓
Lyft ✓ ✓
Mega ✓ ✓
Microsoft (User) ✓ ✓
Microsoft Azure ✓
Microsoft Teams ✓
Slack ✓
Uber ✓ ✓
107
User Guide
rant returns, iCloud backups, Microsoft Office 365 Unified Audit Logs, Skype exports, Skype war-
rant returns, Slack archives, and Snapchat warrant returns, and Twitter warrant returns.
When you acquire a cloud evidence source, AXIOM Process creates a .zip file containing the
hashed cloud image. You can load this cloud image into AXIOM Processif you want to process
the evidence as a part of another case.
Note: AXIOM Process allows you to load and process warrant return files provided by Apple,
Facebook, Google, Instagram, Skype, and Snapchat. Sometimes, the platform providing the
warrant return file make changes to its format which might impact the ability for
AXIOM Process to process the warrant return package.
For a current list of any known changes to our ability to process warrant returns and the
approximate dates of warrant returns AXIOM Process is known to support, please log in to
the Customer Portal to read the following article: Status of supported cloud acquisition plat-
forms. If you are unable to process a warrant return outside of these dates, please contact
Magnet Technical Support.
Before you load a cloud image, make sure you have the appropriate user permissions to access
the file.
If you're loading an Apple warrant return, make sure you decrypt the package using the instruc-
tions provided by Apple. For more information, log in to the Customer Portal to review the Pre-
pare Apple warrant returns for acquisition article. After you've decrypted the package,
AXIOM Process can decrypt encrypted backups contained within the decrypted warrant return.
If you're loading a .zip file from the Facebook Download your Information option, make sure the
content is in JSON format. By default, Facebook downloads the information in HTML. For steps
on how to download the .zip file, see How do I download a copy fo my information on Face-
book?
1. In AXIOM Process, click Evidence sources > Cloud > Load evidence.
2. Select the type of image you want to load.
108
User Guide
Note: If you load an AXIOM Cloud .zip file that was created in a newer version of
AXIOM Process than the version you are currently using, it's possible that you might recover
less evidence.
You can load the following cloud evidence sources in AXIOM Process:
AXIOM
Platform AXIOM Cloud Image type Description
Cyber
109
User Guide
AXIOM
Platform AXIOM Cloud Image type Description
Cyber
book.
110
User Guide
AXIOM
Platform AXIOM Cloud Image type Description
Cyber
Endpoint
111
User Guide
Agents are standalone executable processes that you deploy to and run on an endpoint. Once
the agent is running, it attempts to make a connection back to AXIOM Process at a defined
interval. While connected to the agent, select and download items of interest to your invest-
igation. Once you've downloaded evidence, remove the agent or keep the agent on the endpoint
if you plan to download additional evidence in the future.
AXIOM Process supports the remote acquisition of drives, memory, and logical files from the
file system even if the drive is encrypted. For more information about supported evidence items
by operating system, see Supported evidence items.
If you lose connection to the agent while downloading evidence, AXIOM Process automatically
reconnects to the agent when available. You can also configure the agent to persist on the end-
point if the computer is shut down due to a restart or a crash. AXIOM Process will automatically
resume downloading any evidence that was still in progress, which means that you don't need
to restart your investigation if you lose connection to the endpoint (including after a restart).
AXIOM uses TLS1.3 (RSA-2048 asymmetric encryption) for the handshake. After the con-
nection is established, the cyber workstation and the endpoint negotiate and then determine
the most secure encryption method for the acquisition.
112
User Guide
113
User Guide
To review or acquire data from an endpoint, create and deploy a new agent to the endpoint or
connect to an existing agent on that endpoint from the Manage agents and endpoints page.
Manage agents
In the Agents section, view and manage all the agents you've created in AXIOM Process:
Agent details
Item Description
Agent ID The unique ID to identify the agent in AXIOM Process. If you didn't
enter an Agent ID when configuring the agent, AXIOM Process auto-
matically created a unique ID for you.
Agent file name The file name (or executable name) for the agent.
Saved location The full path of the location where the agent is stored on the exam-
iner workstation. Click the file path to open the folder.
Operating system The type of operating system the agent was configured to acquire
data from.
Created date/time The date and time when the agent was created.
114
User Guide
Manage endpoints
In the Endpoints section, view all the available endpoints for each agent. By default, the table is
sorted by hostname in alphabetical order.
Endpoint details
Item Description
Agent status The activity status of the agent. This can be Online or Offline
depending on the agent status on the endpoint or Agent expired if
the agent self-destructed on that endpoint and you can no longer
connect to it.
Last known online The last known time that the endpoint was online.
time
Approximate self- The approximate time when the agent self-destructed on that end-
destruct time point and you can no longer connect to it.
Data acquired The amount of data acquired from the remote acquisition on the
endpoint.
115
User Guide
Before selecting multiple endpoints, make sure you have completed all the steps on the agent
configuration page since all the endpoints in the queue will need to use the same agent and will
have the same collection details. You can only select up to 15 endpoints at a time.
You can customize how AXIOM Process manages offline endpoints in the queue on the Specify
multiple endpoint collection settings page, under Queue management settings.
You can configure how to manage an offline endpoint in the queue by specifying how long to
wait for the endpoint to come online before moving to the next item, and whether to move an
offline endpoint to the end of the queue or skip the endpoint entirely. If you choose to skip the
endpoint, the status in the Evidence sources table will be Failed.
When an offline endpoint has been moved to the bottom of the queue, you can specify the num-
ber of times to retry before skipping the endpoint entirely. A skipped endpoint will appear as
Failed in the Evidence sources table. You can also choose to wait for the endpoint to come
online.
You can monitor the status of evidence collection from each endpoint on the Downloading
status screen. If the status is Memory profile needed, you must provide the correct image pro-
file based on the operating system build number to process the memory image. To add the
memory profile, hover over the endpoint and click Select memory profile. In the Select profile
pop-up modal, upload the required image.
116
User Guide
After evidence collection from each endpoint has been processed, you can proceed to add the
collection to evidence sources. If the status for all endpoints is failed, you will need to cancel
the acquisition.
1. On the Manage agents and endpoints screen, click Select multiple endpoints.
2. In the Select multiple endpoints table, select the agent to acquire data from.
3. Under the agent name, select the endpoints for your data collection. Click Next.
4. On the Select items to download screen, select a location profile, the targeted loc-
ations and full memory dump. Click Next.
5. On the Specify multiple endpoint collection settings screen, review the Endpoint
connection settings.
6. Click Begin queued collection.
7. On the Downloading status screen, you can monitor the status of evidence col-
lection from each endpoint.
8. Click Add to evidence sources. If the status for all endpoints is failed, you will need
to click Cancel the acquisition.
On the Evidence sources screen, you should now see entries for all the endpoints in the queued
collection and you can continue to processing details.
Create an endpoint manually and define the collection before the agent comes online. Once the
endpoint has the agent installed and comes online, the acquisition can begin.
Note: When using shared agents, each cyber workstation participating in a shared agent con-
figuration must be manually add the endpoints to perform an acquisition.
117
User Guide
1. From the Manage agents and endpoints or Connect to endpoints screen, click Add
endpoint manually.
2. Provide the Hostname/IP address. Windows manual endpoints can be specified
using an FQDN.
3. Select the Agent ID. The agent ID can only be selected when creating the endpoint
manually from the Manage agents and endpoints screen.
4. Click Add endpoint.
Once the endpoint has been created, you can define the collection as a single collection or part
of a queued collection.
Create an agent
AXIOM Process: Click Evidence sources > Remote computer > Create new agent
Agents are executable programs that are deployed to endpoints that connect to examination
workstations for the purposes of acquiring data remotely. To create a new agent, specify the
agent type, provide optional agent masking details, and connectivity details. AXIOM Process
remembers some of the details so that you don't need to fill them in next time you open
AXIOM Process to create a new agent.
Agent ID
Provide a unique value to identify the agent. If you don’t enter an Agent ID, AXIOM Process will
automatically create a unique ID for you.
Operating system
From the drop-down list, select which operating system you want to create the agent for.
118
User Guide
Agent type
l Shared agents can connect to cyber workstations defined in a shared agent con-
figuration. When creating a shared agent, the port specified for incoming connections
must be the same for all cyber workstations participating in the shared agent con-
figuration. Any changes to the shared agents will require an updated configuration
code to be applied to all cyber workstations participating in the shared agent con-
figuration. See Update a shared agent configuration to understand how changes
affect an existing shared agent configuration.
l Ad-hoc agents can only connect with the examiner workstation that created the
agent.
Note: macOS agents are created as signed applications. Agent masking details for macOS
agents are not configurable since application details are provided at time of agent creation.
For more information about signed macOS agents, sign in to the Support Portal to read the
following article: AXIOM Cyber signed macOS agents.
Agent masking details are metadata you can provide to help disguise the agent on the endpoint
to look like a typical system process. This can help prevent the target user from noticing that
there is a remote acquisition application running on their computer.
Click show more details to configure additional masking details. The details you provide pop-
ulate fields for the executable file in locations like the Properties or Get Info dialogs.
Item Description
File name The file name (or executable name) for the agent.
File description The name of the agent as you want it to appear in the application
properties.
Company The company name as you want it to appear when a user hovers
over the agent executable file.
Product name The product name of the agent as you want it to appear in the applic-
ation properties. For many applications, this value is often the same
119
User Guide
Item Description
Copyright The copyright details that you want to appear in the application prop-
erties.
Legal trademarks The trademark information that you want to appear in the applic-
ation properties.
You can optionally configure the agent to persist on the endpoint if the computer is shut down
due to a restart or a crash. Depending on the operating system of the endpoint, the agent will be
installed as a Windows service, macOS background process (daemon), or a Linux service. The
name of the service or daemon on the endpoint is determined by the information you populate
in the File description and File name fields when you configure the agent. By default, the service
or daemon is named after the File description. If no File description is provided, the File name is
used instead.
Note: If you're actively downloading evidence from the endpoint at the time of the shut
down, the agent will automatically resume downloading evidence once the endpoint restarts.
If you completed your investigation prior to the shut down and disconnected from the agent,
the agent will persist on the endpoint in an idle state. Reconnect to begin downloading evid-
ence again.
Connectivity details
Connectivity details provide information about the computer that is going to deploy the agent
including the IP address and port. You can also configure how often you want the agent to
attempt to connect back to AXIOM Process once it's deployed and the amount of time after
which the agent will stop trying to make a connection back to AXIOM Process.
Item Description
Examiner work- The IP address, host name, or machine name of the computer that's
station host name or running AXIOM Process.
IP address
120
User Guide
Item Description
Port A port on the computer deploying the agent that AXIOM Process will
bind to locally. This is the port that the agent calls back on and the
port that AXIOM Process listens on.
Reconnect delay The amount of time (in seconds) that the agent will wait between
unsuccessful connection attempts to AXIOM Process. The default
value is 10 seconds.
Disconnected keep The amount of time (in seconds, minutes, hours, or days) after
alive which the agent will stop trying to make a connection back to
AXIOM Process. The default value is 1 day.
Proxy connection If your organization routes network traffic through a proxy, configure
method the agent to connect back to AXIOM Process using a proxy. Depend-
ing on the operating system the agent is created for, configure the
agent to automatically detect proxy settings or manually set a proxy
server.
Select Manually set a proxy server to set the proxy server you want
the agent to use to connect back to AXIOM Process. Provide the
proxy server IP address and the proxy server port.
121
User Guide
Item Description
After you create the agent, review the agent details, and then deploy the agent.
Deploy an agent
Deploy the agent to the endpoint so you can then connect and select the data you want to
acquire. Depending on the needs of your investigation, you can:
l Deploy a new agent that you created for a specific case or investigation.
l Deploy an agent that you previously created to a new endpoint.
l Redeploy an expired agent to an existing endpoint.
To deploy an agent, you must provide information about the endpoint including the IP address,
user name and password, and the location where you want to store the agent on the endpoint.
The user account must have local administrative permissions on the endpoint.
Note: AXIOM Process does not support deployment of agents on all machines across a net-
work or enterprise such as installing an agent on a Gold Build image.
If you’re unable to deploy an agent to an endpoint using the built-in deployment solution in
AXIOM Process, log in to the Customer Portal to review the Deploying an agent to a remote
computer using a third-party solution article.
If you created a new agent, continue the workflow in AXIOM Process to deploy the agent to the
endpoint.
122
User Guide
After the agent successfully deploys the endpoint, connect to the agent.
You can deploy an agent that you previously created to a new endpoint.
1. On the Manage agents and endpoints screen, in the Agents table, hover over the
agent and click Deploy agent.
2. On the Review agent details screen, click Deploy agent.
3. Provide information about the endpoint that you want to deploy the agent to.
4. Click Deploy agent.
After the agent successfully deploys the endpoint, connect to the agent.
If you previously deployed an agent to the endpoint, but the agent expired, you can redeploy the
agent. If you previously deployed an agent to the endpoint, and the agent is still available, you
can connect to the agent instead.
1. On the Manage agents and endpoints screen, in the Endpoints table, hover over the
endpoint and click Redeploy agent.
2. On the Review agent details screen, click Deploy agent.
3. Provide information about the endpoint that you want to deploy the agent to.
4. Click Deploy agent.
After the agent successfully deploys the endpoint, connect to the agent.
123
User Guide
If the deployment attempt fails, check the information you provided to deploy the agent is
correct such as the correct user name and password for the endpoint. For more information
about troubleshooting deployment failures, please log in to the Customer Portal and review
the following articles:
If your issue persists, consider using an alternative method to deploy the agent to the end-
point, and then proceed to the "Connect to agent" step.
Item Description
Remote computer IP The IP address, host name, or machine name of the endpoint you're
address going to deploy the agent to.
User name The user name for the administrator account you're using to log in
to the endpoint. The user account must have local administrative
permissions on the endpoint. These credentials are used to authen-
ticate the copy of the agent to the endpoint as well as to run the
executable as an administrator.
Password The password for the administrator account you're using to log in to
the endpoint.
124
User Guide
Item Description
Agent location on The location where you want to store the agent on the endpoint. Con-
remote computer sider storing the agent in a location where it's unlikely to be noticed
such as C:\Windows\Temp\, /private/var/, or /usr/local.
The administrator account you use to deploy the agent must have
permission to access this location.
Connect to an agent
Connect to the agent on the endpoint to select the data you want to acquire. You can connect
to a newly deployed agent or to an agent that was previously deployed to an endpoint.
To search, sort, and filter the files and folders from the endpoint in AXIOM Process, configure
the agent to start downloading information about the file system structure as well as file and
folder metadata. After connecting to the endpoint, the agent builds an index of the file system
structure to help you get to the evidence faster. This also downloads a file and folder listing of
the endpoint after the acquisition completes.
While connecting to the endpoint, select items from Targeted locations that you're interested in
downloading. The Files and drives and Memory options become available after a successful
connection.
Remote acquisitions often require downloading large amounts of data over the network. If net-
work usage is a concern, you can help reduce the amount of data that gets sent by com-
pressing it on the endpoint before downloading. For more information, see Compressing data
before downloading.
Once the agent has successfully deployed to a new endpoint, connect to the agent.
125
User Guide
After successfully connecting to the agent, you can download items from the endpoint.
If you previously deployed an agent to an endpoint, and the agent has not expired, you can con-
nect to it directly from the Manage agents and endpoints screen. If you previously deployed an
agent to the endpoint, but the agent expired, make sure that you redeploy the agent.
Note: If you're connecting to an agent that was created and deployed using an older version
of AXIOM Cyber, AXIOM Process automatically updates the agent before attempting to con-
nect.
1. On the Manage agents and endpoints screen, in the Endpoints table, hover over the
agent and click Connect to endpoint.
2. Follow the instructions in AXIOM Process to customize your connection settings.
3. Click Connect to endpoint.
After successfully connecting to the agent, you can download items from the endpoint.
For information about troubleshooting connection failures, please log in to the Customer
Portal and review the following articles:
126
User Guide
Item Description
Agent status The activity status of the agent. This can be Online or Offline
depending on the agent status on the endpoint or Agent expired if
the agent self-destructed on that endpoint and you can no longer
connect to it.
Last known online The last known time that the endpoint was online.
time
Approximate self- The approximate time when the agent self-destructed on that end-
destruct time point and you can no longer connect to it.
Data acquired The amount of data acquired from the remote acquisition on the
endpoint.
Delete an agent
1. On the Manage agents and endpoints screen, in the Endpoints table, hover over an
entry.
2. Click the trash icon to delete the agent from the endpoint.
The agent will receive a self-destruct command when it checks in with the Cyber workstation.
Delete an agent
1. On the Manage agents and endpoints screen, in the Agents table, hover over the
agent.
127
User Guide
The agent will automatically delete itself based on the agent's disconnected keep alive setting.
If an endpoint was restarted and the agent was not configured to start up as a service, you
may need to remove the agent manually from the endpoint.
Since the agent is just an executable, you can simply remove the agent from the endpoint.
If you are unable to delete the agent because the file reports as being open in another program,
you will have to stop the agent on the endpoint before you can delete it. You can remote in to
the endpoint and use the task manager to end the agent process or Remove the agent using
PsExec.
Ensure you have downloaded and installed PsExec and you have administrative permissions on
the endpoint.
In the Windows Search Bar, type cmd and open a Command Prompt as an Administrator.
128
User Guide
You can download items from a single or multiple endpoints. Depending on the operating sys-
tem of the endpoint, select the drives, files and folders, and memory that you want to download.
To save time searching the complete list of files and folders, select targeted locations to view a
list of typical files and folders that you might want to download. Once AXIOM Process connects
to the endpoint, you have access to download more data.
Note: If you stop and delete an agent from the endpoint while evidence items are still down-
loading, AXIOM Process includes partial results in the image from the items that were still
downloading.
AXIOM Process provides a count of the number of potential items to download from the loc-
ation you selected and indicates how many items have been downloaded successfully. To find
out more details about why an item might not have downloaded, you can review the log.txt log
file. Before the search is started, this log is in the install directory of AXIOM Process. The
default is C:\Program Files\Magnet Forensics\Magnet AXIOM\AXIOM Process\log.txt. After
the search begins, this log is moved to the case folder.
You can manually refresh the list of files and folders, drives, and memory processes. If you
refresh a list, any items you previously selected remain selected. If a list item was deleted from
the endpoint, the item is removed from the list.
Operating
Item Description
system
Targeted Windows, Includes a list of typical files and folders and volatile arti-
locations macOS, facts that you might want to download during a remote
Linux
acquisition such as user folders, browser activity, and sys-
tem files.
129
User Guide
Operating
Item Description
system
Files and Windows, Files and folders: This option represents a logical image that
drives macOS, contains all files and folders on the file system. A files and
Linux
folders search provides logical access to any connected,
unencrypted drives on the endpoint and allows you to see
the files as the target user sees them.
130
User Guide
Targeted locations are typical files and folders and volatile artifacts that you might want to
download during a remote acquisition. This list includes both default system targeted locations
as well as targeted locations that you've added. For more information about adding your own
targeted locations to this list, review Add custom targeted locations.
Location profile
Use location profiles to quickly select multiple targeted locations at once. For more information
about managing location profiles, review Manage location profiles.
Targeted locations
When downloading evidence from a single or multiple endpoints, you can select a Location pro-
file, or items from the Targeted locations list even before the agent connects to the endpoint(s).
While the agent connects to the endpoint(s), these items are put in a pending state. After a suc-
cessful connection, AXIOM Process begins downloading the items automatically.
Follow the steps below to download targeted locations from a single endpoint. If you're down-
loading targeted locations as part of a queued collection, see Create a queued collection for
more information.
1. On the Review and select the data from the target computer screen, click Targeted
Locations.
2. In the Targeted locations table, select the items that you want to download.
3. Click Next.
131
User Guide
Windows
132
User Guide
macOS
133
User Guide
134
User Guide
downloads
from the
endpoint.
/Users/[user_name]/.zsh_history; /Users/[user_name]/.zshrc
135
User Guide
/Users/[user_name]/Library/Application Sup-
port/CloudDocs/session/db/*.*
/Users/[user_name]/Library/Application Sup-
port/com.apple.spotlight/com.apple.spotlight.Shortcuts.v3
136
User Guide
internet
files, down-
load his-
tory,
cookies,
and more
for Chrome,
Firefox,
Opera, and
Safari.
Active w
Users
Network sharing -l
Shares
(English
support
only)
Process ps a
List
Scheduled crontab -l
Processes
Linux
137
User Guide
/var/lib/dhclient/*.*
/var/lib/dhcpd/*.*
138
User Guide
Process List ps a
Download files and folders (representing a logical image that contains all files and folders) or
drives (for Windows only, representing a physical image). When you download a logical image
that contains files and folders, you have the option of using ZIP or AFF4-L as the container type.
The default container type for logical images is AFF4-L.
Note: When acquiring evidence from a macOS computer, you might see some items in the
Select data to download file tree that have been greyed-out such as fifo, charspecial, or
socket. While the file system reports these items as files, they either contain no data or the
data is not readable, and they cannot be acquired.
Download Drives
1. On the Review and select the data from the target computer screen, click Files and
drives.
2. Under Select data to download, click Drives.
139
User Guide
3. To turn on compression for the download, select the Compress data on the remote
computer before downloading option.
4. Select the items that you want to download.
5. Click Next.
You can select specific files and folders you want to acquire from the endpoint. If you con-
figured the agent to download information about the file system structure after connecting, you
can also apply date range filters, search for words or search terms in a selected folder, and sort
and filter by file name, extension, or size.
Note: Sometimes the agent is unable to access certain files or folders, so these items will
not appear when browsing or searching the file system. For example, the agent might not
have permissions to access them.
1. On the Review and select the data from the target computer screen, click Files and
drives.
2. Under Select data to download, click Files and folders.
3. If applicable, search, sort, and filter the files and folders to help find key evidence.
4. Select the items that you want to download.
5. Click Next.
Apply date range filters to only display files in a certain time frame. By default, AXIOM Process
acquires data from as far back in time as possible for the endpoint. Because s Some acquis-
itions can take a long time depending on the amount of data they contain, consider narrowing
the date range to decrease the amount of time the acquisition takes.
Note: You can apply date range filters when they are available once AXIOM Process has fin-
ished downloading the file system details.
140
User Guide
1. In the Date range drop-down list, select one of the following options:
l To acquire data after a specified date, click After.
l To acquire data before a specified date, click Before.
l To acquire data between two specified dates, click Custom date range.
2. Click the calendar icon and choose a date. You will need to choose two dates if you
selected Custom date range in step 1.
3. Click Apply filter.
Note: Search results include any files or folders whose created, accessed, modified, or added
dates match the date range filter that you applied.
You can search the files and subfolders in the folder you're currently viewing for specific words
or search terms. To search the entire endpoint for a specific term, navigate to the top level of
the computer from the file tree.
Note: If a date range has been specified, the search results will only display files cor-
responding to that date range. If you want to display all the files including the searched text,
click Clear filter beside the column drop-down to return to All dates before searching.
Filter by column
You can filter files and folders by some of the available columns, such as by file extension or
file size.
141
User Guide
1. In AXIOM Process, right-click the header of a column and select Filter on column.
2. Complete one of the following options:
l For numeric columns, specify a range or an exact value to filter on.
l For string columns, specify a search term.
3. Click Search.
To clear a filter, right-click the header of a column and select Clear filter.
Download memory
You can select and download memory processes running on an endpoint. Memory processes
can be collected from individual endpoints or from multiple endpoints, as part of a queued col-
lection. When downloading memory processes from an individual endpoint, you can download
individual memory processes or complete a full memory acquisition. When downloading from
multiple endpoints, you can only acquire the full memory. Downloading memory is currently
available for Windows computers only.
When downloading a full memory dump, consider turning on compression for the download.
Compressing data can help improve acquisition times. For more information, see Compressing
data before downloading.
Follow the steps below to download individual memory processes or complete a full memory
acquisition from a single endpoint. If you're completing a full memory acquisition as part of a
queued collection, see Create a queued collection for more information.
1. On the Review and select the data from the target computer screen, click Memory.
2. Complete one of the following options:
l To select individual memory processes to download from the endpoint(s), select
Individual processes, and then choose the processes you want to acquire.
l To download a full memory dump from the endpoint, select Full memory acquis-
ition.
3. Click Next.
142
User Guide
Add your own targeted locations to the default list in Magnet AUTOMATE Enterprise. To add a
custom targeted location, provide a description and at least one path for the folders or files that
you want to acquire.
A path can be either a valid Windows, macOS, or Linux path that points to a folder or a file. For
Windows acquisitions, use a backslash (\) as a path separator. For macOS and Linux acquis-
itions, use a slash (/) as a path separator. AXIOM Process validates the paths that you provide
and considers the operating system of the agent. For example, if you're creating a custom tar-
geted location while completing a remote acquisition with an agent created for
macOS computers, AXIOM Process looks for a slash (/) as the path separator.
Include wildcard characters in the paths you create to serve as placeholders for items like all
user names, all file names, and more.
1. On the Select targeted locations screen, click Add new targeted location.
2. In the Description field, provide a name for the targeted location.
3. In the Paths to acquire field, provide one or more paths for the folders or files that
you want to acquire.
4. Click Okay.
The custom targeted locations that you add are available in the Targeted locations list for
future remote acquisitions that correspond to the same operating system.
143
User Guide
Wildcard characters
Wildcard char-
Description Example paths
acter
144
User Guide
Wildcard char-
Description Example paths
acter
145
User Guide
Once you've selected all the evidence from the endpoint, and the evidence items have finished
downloading, you can begin to add the evidence to your evidence sources. First,
AXIOM Process will complete some additional processing steps such as archiving items, hash-
ing the archive, and checking for encryption and RAM.
AXIOM Process creates an archive of the downloaded evidence in the location that you spe-
cified for your case files. In the same location, you'll find a log file that provides details about
the remote acquisition such as the date and time the archive was created, the MD5 and SHA1
hashes, and device information for the endpoint.
If AXIOM Process detects encryption for supported encryption types, you can provide known
decryption credentials such as passwords and recovery keys to decrypt the evidence source
before a search. For more information, see Decrypt evidence.
If you've downloaded memory from a Windows computer, in most cases, AXIOM Process can
automatically select the correct image profile. If AXIOM Process detects multiple memory
images or doesn't currently support the memory image, you're prompted to select an image pro-
file. For more information about processing memory, see Windows memory.
When you add evidence from the endpoint as an evidence source, you can decide whether you
want to keep the agent installed on the endpoint or delete the agent. If you plan to download
additional evidence items in the future, consider keeping the agent installed on the endpoint.
146
User Guide
AXIOM Process creates one .zip file for logical evidence, one .zip file for memory processes,
one .bin file for full memory acquisition (RAM dump), and one .bin file for physical evidence.
The file names for each evidence source include descriptive information such as the computer
name and the local date/time the .zip or .bin files were generated.
When configuring a new agent in AXIOM Process, the agent is automatically saved to the
default location (C:\). When creating an agent, you can save the agent to a shared location that
is accessible to other users. To change the agent default location, complete the following task:
You can configure AXIOM Process to automatically delete the agent from an endpoint after the
remote acquisition completes.
147
User Guide
Remote acquisitions often require downloading large amounts of data over the network. If net-
work usage is a concern, you can help reduce the amount of data that gets sent by com-
pressing it on the endpoint before downloading. Compressing the data can also speed up the
overall acquisition time on slower networks. However, on faster networks, you might see an
increase to the total acquisition time as compressing the data takes longer than transferring it
on those networks.
Some acquisition types are more receptive to compression than others. RAM acquisitions are
generally a good candidate for compression as in some cases RAM data can be compressed
by 80% or more. On the opposite side of the spectrum, compressing an encrypted drive won’t
result in meaningful improvements on the size of the download. If you’re downloading files that
are already compressed on the endpoint, you won’t see much benefit to compressing them
again.
Compressing data can cause a noticeable usage of system resources on the endpoint. If the
data that you’re acquiring doesn’t compress well, or if you’re concerned about the subject noti-
cing the increase in system resource usage, you might want to consider skipping the com-
pression step.
You can turn on the compression setting globally for drive, file and folder, targeted location, and
RAM dump downloads from the Settings menu. Only RAM process downloads cannot currently
be compressed. You can also override the global compression setting while you configure indi-
vidual drive and RAM dump downloads.
148
User Guide
Remote acquisitions can save their data in ZIP or AFF4-L containers. Some remote acquisition
methods do not support AFF4-L and will always use ZIP regardless of the default type that is
selected. The default container type for supported methods is AFF4-L.
Use location profiles to create groups of targeted locations for performing repeated col-
lections. For more information about adding your own targeted locations to this list, review Add
custom targeted locations.
You can select or manage location profiles even before the agent connects to the endpoint(s).
Location profiles are available from the Select targeted locations screen when connecting to a
single endpoint or from the Select items to download screen proceeding the Selecting multiple
endpoints screen.
You can only select a single location profile per collection. Once a location profile is created,
you can edit, delete or create a duplicate location profile.
149
User Guide
Once you have created the location profile, it will be available for selection on the Review and
select the data from the target computer screen in the Location Profile drop-down list.
Creating a duplicate location profile allows you to make changes to a new location profile while
retaining the settings of the original location profiles.
A shared agent configuration provides you with the ability to extend the management of end-
point acquisitions beyond the single cyber workstation that created the agent. Create a shared
150
User Guide
agent configuration with deployed shared agents to allow multiple cyber workstations to man-
age an acquisition of a single or multiple endpoints.
Review the following topics to learn more about creating and managing a shared agent con-
figuration.
AXIOM Process: Click Evidence sources > Remote computer > Managed shared agent con-
figuration
A shared agent configuration allows multiple cyber workstations to manage shared agents and
acquisitions of endpoints. Cyber workstations can either create a new shared agent con-
figuration or Connect to existing shared agent configuration.
Creating a shared agent configuration starts with adding the current workstation as the first
cyber workstation. Once you have identified the current workstation by its Hostname/IP
address, you can add additional cyber workstations to the shared agent configuration.
Tip: For best results, follow the steps below in order when creating a shared agent con-
figuration. Log in to the Customer Portal to read the following article: Creating a shared
agent configuration in AXIOM Cyber.
151
User Guide
Requirements:
l You have Administrator access to the cyber workstation.
l The same SSL certificate is installed on all cyber workstations participating in the
shared agent configuration.
l The same port is available for incoming connections as other cyber workstations par-
ticipating in the shared agent configuration.
On the current cyber workstation, launch AXIOM Cyber and perform the following steps.
Hostname/IP address
Agent certificate
You must install SSL certificates in both the Personal and Trust Root Certificate Authorities
folder on each cyber workstation participating in the shared agent configurations.
To select the SSL certificate installed in the local Windows certificate store, perform the fol-
lowing steps.
152
User Guide
For more information about installing and using SSL certificates, log in to the Support Portal to
read the following article: SSL certificates and shared agent configuration.
You can have multiple cyber workstations in the shared agent configuration capable of man-
aging deployed shared agents and performing acquisitions of endpoints. Cyber workstations
can be added after a shared agent configuration is complete. However, it is recommended that
you include all the participating cyber workstations during the creation of the shared agent con-
figuration.
On the current cyber workstation, launch AXIOM Cyber and perform the following steps.
Once complete, each cyber workstation will have to Connect to existing shared agent con-
figuration.
Each cyber workstation has the ability to remove a cyber workstation from a shared agent con-
figuration.
153
User Guide
Once a cyber workstation has been removed, the local configuration code will need to be reset
on the cyber workstation to fully leave the shared agent configuration.
Refer to Update a shared agent configuration to understand how changes affect an existing
shared agent configuration.
You can create a shared agent from any cyber workstation in a shared agent configuration.
However, its highly recommended to create the shared agent on the same workstation that cre-
ated the shared agent configuration and after all cyber workstations have been defined. If any
changes are made to the shared agent configuration or the shared agents, the configuration
code of each cyber workstation may differ as the configuration code is not synced across cyber
workstations automatically.
On the current cyber workstation, launch AXIOM Cyber and perform the following steps.
After you add the cyber workstations in the shared agent configuration they require a con-
figuration code to actually join the shared agent configuration. This configuration code
154
User Guide
contains the connectivity information of all cyber workstations participating in the shared agent
configuration and the shared agents.
Note: The configuration code is not synced across cyber workstations automatically.
Anytime there is an update to the shared agent configuration or shared agents, only the con-
figuration code on the current workstation is updated. You must distribute the updated con-
figuration code to all cyber workstations participating in the shared agent configuration.
To obtain the configuration code, launch AXIOM Cyber and perform the following steps.
Tip: This value can be saved in a text file or sent in an email providing the formatting of con-
figuration code remains unchanged. Some applications may insert unwanted formatting,
such as line breaks or word wrapping.
For more information about the configuration code, refer to the following topic: Update a
shared agent configuration.
On each cyber workstation participating in the shared agent configuration, you must manually
add endpoints before they can perform an acquisition of an endpoint. You can add endpoints
before or after you deploy a shared agent.
If you are creating a shared agent configuration, you can manually add the endpoints at this
time.
On the current cyber workstation, launch AXIOM Cyber and perform the following steps.
155
User Guide
Cyber workstations defined in the shared agent configuration must first join an existing shared
agent configuration before you can add endpoints manually. Refer to the topic Connect to exist-
ing shared agent configuration for more information about joining a shared agent con-
figuration.
Connecting to a shared agent configuration allows the current cyber workstation to manage
shared agents and perform acquisitions of endpoints.
Requirements
If you haven't created a shared agent configuration, or you do not have one or more of the listed
requirements, see Create a shared agent configuration for more information.
To connect the current cyber workstation to a shared agent configuration, launch AXIOM Cyber
and perform the following steps.
156
User Guide
If the configuration validation failed, ensure the configuration code is the most recent and has
not been modified.
To learn more about using the configuration code as it relates to connecting to an existing
shared agent configuration, see Update a shared agent configuration.
After connecting to a shared agent configuration, you must Add endpoint manually to perform
an acquisition.
When you make any changes to a shared agent configuration, the changes are also applied in
the configuration code on the local cyber workstation. The configuration code contains ref-
erences and connectivity details of the cyber workstations participating in the shared agent con-
figuration and the shared agents known to the current cyber workstation.
Some of the changes that will update the configuration code include:
157
User Guide
The configuration code is not automatically synced across cyber workstations. If you make
any changes to the shared agent configuration after its initial creation, the configuration
code of each cyber workstation may differ.
It's imperative that all cyber workstation participating in a shared agent configuration have the
same configuration code. See Create a shared agent configuration for more information about
obtaining and providing the configuration code to all cyber workstations participating in the
shared agent configuration.
Use the reset local configuration code when the current cyber workstation has been removed
from a shared agent configuration or when you need to update your local configuration code.
For more information about removing a cyber workstation from a shared agent configuration,
see the following topic: Remove cyber workstations
Update your local configuration when another cyber workstation has made changes to the
shared agent configuration or the shared agents. Once the configuration has been reset, you
can paste the contents of the updated configuration code.
To reset the local configuration code on the current cyber workstation, launch AXIOM Cyber
and perform the following steps.
158
User Guide
Create an agent
AXIOM Process: Click Evidence sources > Remote computer > Create new agent
Agents are executable programs that are deployed to endpoints that connect to examination
workstations for the purposes of acquiring data remotely. To create a new agent, specify the
agent type, provide optional agent masking details, and connectivity details. AXIOM Process
remembers some of the details so that you don't need to fill them in next time you open
AXIOM Process to create a new agent.
Agent ID
Provide a unique value to identify the agent. If you don’t enter an Agent ID, AXIOM Process will
automatically create a unique ID for you.
Operating system
From the drop-down list, select which operating system you want to create the agent for.
Agent type
l Shared agents can connect to cyber workstations defined in a shared agent con-
figuration. When creating a shared agent, the port specified for incoming connections
must be the same for all cyber workstations participating in the shared agent con-
figuration. Any changes to the shared agents will require an updated configuration
code to be applied to all cyber workstations participating in the shared agent con-
figuration. See Update a shared agent configuration to understand how changes
affect an existing shared agent configuration.
l Ad-hoc agents can only connect with the examiner workstation that created the
agent.
159
User Guide
Note: macOS agents are created as signed applications. Agent masking details for macOS
agents are not configurable since application details are provided at time of agent creation.
For more information about signed macOS agents, sign in to the Support Portal to read the
following article: AXIOM Cyber signed macOS agents.
Agent masking details are metadata you can provide to help disguise the agent on the endpoint
to look like a typical system process. This can help prevent the target user from noticing that
there is a remote acquisition application running on their computer.
Click show more details to configure additional masking details. The details you provide pop-
ulate fields for the executable file in locations like the Properties or Get Info dialogs.
Item Description
File name The file name (or executable name) for the agent.
File description The name of the agent as you want it to appear in the application
properties.
Company The company name as you want it to appear when a user hovers
over the agent executable file.
Product name The product name of the agent as you want it to appear in the applic-
ation properties. For many applications, this value is often the same
as the file description.
Copyright The copyright details that you want to appear in the application prop-
erties.
Legal trademarks The trademark information that you want to appear in the applic-
ation properties.
You can optionally configure the agent to persist on the endpoint if the computer is shut down
due to a restart or a crash. Depending on the operating system of the endpoint, the agent will be
installed as a Windows service, macOS background process (daemon), or a Linux service. The
160
User Guide
name of the service or daemon on the endpoint is determined by the information you populate
in the File description and File name fields when you configure the agent. By default, the service
or daemon is named after the File description. If no File description is provided, the File name is
used instead.
Note: If you're actively downloading evidence from the endpoint at the time of the shut
down, the agent will automatically resume downloading evidence once the endpoint restarts.
If you completed your investigation prior to the shut down and disconnected from the agent,
the agent will persist on the endpoint in an idle state. Reconnect to begin downloading evid-
ence again.
Connectivity details
Connectivity details provide information about the computer that is going to deploy the agent
including the IP address and port. You can also configure how often you want the agent to
attempt to connect back to AXIOM Process once it's deployed and the amount of time after
which the agent will stop trying to make a connection back to AXIOM Process.
Item Description
Examiner work- The IP address, host name, or machine name of the computer that's
station host name or running AXIOM Process.
IP address
Port A port on the computer deploying the agent that AXIOM Process will
bind to locally. This is the port that the agent calls back on and the
port that AXIOM Process listens on.
Reconnect delay The amount of time (in seconds) that the agent will wait between
unsuccessful connection attempts to AXIOM Process. The default
value is 10 seconds.
161
User Guide
Item Description
Disconnected keep The amount of time (in seconds, minutes, hours, or days) after
alive which the agent will stop trying to make a connection back to
AXIOM Process. The default value is 1 day.
Proxy connection If your organization routes network traffic through a proxy, configure
method the agent to connect back to AXIOM Process using a proxy. Depend-
ing on the operating system the agent is created for, configure the
agent to automatically detect proxy settings or manually set a proxy
server.
Select Manually set a proxy server to set the proxy server you want
the agent to use to connect back to AXIOM Process. Provide the
proxy server IP address and the proxy server port.
After you create the agent, review the agent details, and then deploy the agent.
Mobile
Acquiring mobile evidence
Using AXIOM Process, you can acquire mobile devices as well as load existing images, files,
and folders previously acquired from mobile devices.
162
User Guide
When you image a mobile device, specifying the operating system alerts AXIOM Process as to
which set of artifacts should be scanned for, as data resides in different locations depending
on the operating system. While some artifacts (i.e. Facebook, Twitter, WhatsApp, etc.) can be
parsed from multiple mobile operating system types, the location and structure of the data can
vary on each operating system.
Supported evidence
Method Description
source
Media devices that sup- Use this option to acquire evidence from media
port MTP devices that support the media transfer protocol
(MTP). Examples of media devices that typically
support MTP include digital cameras, feature
phones, and smartphones such as Android, iOS,
BlackBerry, and Windows Phone.
Load evid- Images and files and Use this option to load existing images, files, and
ence folders folders from supported Android, iOS, Windows
Phone, and Kindle Fire devices.
163
User Guide
Android
For Android devices running version 2.1 and later, AXIOM Process can obtain full images from
rooted Android devices and quick images from other Android devices.
l A quick image is a comprehensive logical image that contains both user data and
some native application data. AXIOM Process attempts multiple acquisition methods
to get you as much information as possible from the device, as quickly as possible,
so that you can start examining the evidence right away.
l A full image is a physical or file-system logical image. During this type of acquisition,
AXIOM Process copies the entire contents of a device into a single file (either a .raw
file or a .zip file, depending on the device). With a full image, you have a higher pos-
sibility of recovering data from unallocated space (that is, deleted files).
If you're unable to acquire either a quick or a full image, another option for some devices is to
acquire media.
Review the Supported acquisition methods for Android devices topic for more information
about which acquisition methods are available for specific Android versions.
In addition to acquiring evidence from an Android device, you can load existing images and
files and folders.
The type of image that you can acquire from a device depends on the level of access that you
have. Acquiring a full image requires that you have privileged access to the device. Privileged
access indicates that you have an enhanced level of permissions which allow you to interact
with the device in ways that a regular user can't.
On Android devices, having root access gives you enhanced permissions so that you can run
apps that need access to certain system settings, flash custom images to the device, and
more.
164
User Guide
For full images, if an Android device is not rooted, AXIOM Process attempts to gain privileged
access to the device using tested rooting methods. AXIOM Process creates a log file doc-
umenting the process, and indicates which roots are tried and whether any are successful.
Full images are formatted as .raw files and quick images are formatted as .zip files.
OS Method Evidence
Quick Android 2.1 to Android Debug Contents of any external storage (for
8+ Bridge (ADB) example, an SD card).
mode
Android (Sam- MTP bypass Pictures, videos, and any other files dis-
sung models coverable via MTP.
only)
** Requires a rooted device. In some cases, AXIOM Process can root the device for you.
Before you acquire an image from an Android device, verify that your computer and device are
set up correctly.
165
User Guide
To make sure AXIOM Process can connect to the Android device and acquire the most com-
plete forensic image possible, there are several options that you need to set.
Tip: If you don't want your search criteria to be saved in the recent search history on the
device, don't use the magnifying glass on the mobile device to search for settings or other
information.
166
User Guide
l Allow the installation of applications from unknown sources. In Settings > Security,
turn on Unknown Sources. The wording of the setting might vary depending on the
device manufacturer.
Tip: You must turn on USB debugging mode before you receive a prompt to trust the com-
puter. To revoke the trust setting, in Settings > Developer options tap Revoke USB debug-
ging authorizations.
Depending on the type of Android device, there are different ways to turn on USB debugging or
developer mode. Here's how you can turn on USB debugging for a few popular devices:
Android 2.x+ In Settings > Applications > Development, tap the Enable USB
Debugging option.
Android 4.2+ In Settings > About phone, tap the Build Number field approximately
7 times until "You are now a Developer" displays on the screen.
HTC One In Settings > About > Software information > More > Build number,
(M7/M8/M9) tap the Build Number field approximately 7 times until "You are now
a Developer" displays on the screen.
LG G2/G3 In Settings > About phone > Software information > Build number,
tap the Build Number field approximately 7 times until "You are now
Samsung Galaxy a Developer" displays on the screen.
Stock Android In Settings > About phone, tap the Build Number field approximately
7 times until "You are now a Developer" displays on the screen.
If a LG Android device is locked and you don't have the passcode, you can attempt to bypass
the lock screen in AXIOM Process. AXIOM Process supports bypassing the lock screen for
many LG devices but does not currently support LG Nexus devices.
167
User Guide
After successfully bypassing the lock screen, you can perform an acquisition of the device
without needing the passcode.
1. In AXIOM Process, click Evidence Sources > Mobile > Android > Acquire Evidence >
Advanced (Lock Bypass) > LG Electronics > Lock bypass.
2. Follow the instructions in AXIOM Process.
3. To start an acquisition of the device, click Next and select start an unlocked acquis-
ition workflow for the device.
Downgrading apps
Some newer mobile device apps block access to their data. You can choose to temporarily
install a previous version of the app that provided access to the data, acquire the evidence, and
then install the original app back on the device again.
When acquiring a quick image of a device running Android 6.0 and earlier, you can turn on app
downgrading in AXIOM Process.
Warning: There are risks associated with app downgrading. You might change data on the
device when you use this feature.
If you're connected to the Internet while using AXIOM Process, AXIOM Process attempts to
download the appropriate drivers for the mobile device that you're imaging. If the correct driver
can't be found, you might have to visit the device manufacturer's website to download the
driver. Here are the links to download drivers for a few popular devices:
l HTC: www.htc.com/us/software
l LG: www.lg.com/us/support
l Motorola: support.motorola.com
l Nexus: developer.android.com
l Samsung: developer.samsung.com
l Sony: developer.sony.com/develop/drivers/
168
User Guide
To help you acquire the most complete forensic image as possible, AXIOM Process supports
several advanced mobile acquisition methods that increase your chances of getting a full
image of the device. Some methods require that you flash the device with a recovery image,
while others take advantage of download modes or device hardware features.
For more information about acquiring Android devices using Advanced lock bypass, review the
following articles about acquisition methods for popular device manufacturers in the Customer
Portal. For some acquisition methods, you can also download recovery images and drivers.
Hardware / Man-
Acquisition method Image type
ufacturer
MTK chipsets Acquire an MTK device using download mode Full image
Qualcomm chip- Acquire a Qualcomm device using EDL mode Full image
sets
All Android Flash a custom recovery image of an Android device Full image
devices
169
User Guide
If the Android device you want to acquire is unlocked, and you can turn on USB debugging, you
can you attempt to acquire a full or a quick image of the device using Android Debug Bridge
(ADB). Acquiring a full image requires privileged (root) access.
1. Start the ADB workflow in AXIOM Process: Click Evidence Sources > Mobile >
Android > Acquire Evidence > ADB (Unlocked).
2. Follow the instructions in AXIOM Process.
3. To continue setting up your case, click Next.
170
User Guide
You can specify the size of the image segments that you want AXIOM Process to create when
it acquires evidence from Android and drive images. Each option represents a different size
that reflects its storage capabilities. By default, image segmentation is turned off.
While AXIOM Process acquires evidence from Android devices, it installs an agent application
onto the device to assist with recovering data. When the scan completes, AXIOM Process can
remove the agent application from the device. By default, the agent application is left on the
device.
171
User Guide
iOS
AXIOM Process can obtain a quick image from iOS devices (version 5.0 and later) and full
images from jailbroken iOS devices.
l A quick image is a comprehensive logical image that contains both user data and
some native application data. AXIOM Process attempts multiple acquisition methods
to get you as much information as possible from the device, as quickly as possible,
so that you can start examining the evidence right away.
l A full image is a physical or file-system logical image. During this type of acquisition,
AXIOM Process copies the entire contents of a device into a single file (either a .raw
file or a .zip file, depending on the device). With a full image, you have a higher pos-
sibility of recovering data from unallocated space (that is, deleted files).
If you're unable to acquire either a quick or a full image, another option for some devices is to
acquire media.
In addition to acquiring evidence from an iOS device, you can load existing images and files and
folders such as including encrypted iOS backups and GrayKey images.
The type of image that you can acquire from a device depends on the level of access that you
have. Acquiring a full image requires that you have privileged access to the device. Privileged
access indicates that you have an enhanced level of permissions which allow you to interact
with the device in ways that a regular user can't. Gaining privileged access to an iOS device is
often achieved by jailbreaking the device.
On iOS devices, a jailbreak uses an exploit or security vulnerability in the software to give you
enhanced permissions to the operating system. For early iOS versions, these permissions
allowed you to get a full image of the device, but for iOS 5.0 and later, the encryption allows
only a logical image to be obtained.
172
User Guide
Jailbreaks are often discovered after the release of a new iOS version. The timing of their avail-
ability depends on how difficult it is to find the vulnerability in the software. For many modern
iOS devices, there are no public jailbreaks available. You should monitor public jailbreaks to
stay current.
Both full images and quick images from an iOS device are formatted as .zip files.
OS Method Evidence
iOS 5 to 11+ Apple File Con- Camera pictures, ringtones, and iTunes
duit books.
iOS 8 and File relay Some native device data, including: com-
earlier plete photo album, SMS/MMS and iMes-
sage, address book, typing cache,
geolocation cache, application screen
shots, WiFi hot spots, voicemail, and nat-
ive email metadata.
Before you acquire an image from an iOS device, verify that your computer and device are set
up correctly.
173
User Guide
To allow AXIOM Process to connect to the iOS device and acquire the most complete forensic
image possible, there are several options that you need to set. After setting these options, you
should also perform an encrypted backup. AXIOM Process can often extract more evidence
from an iOS device if it first creates an encrypted backup of the device. An encrypted backup
can include information that isn't available in a normal quick image, such as saved passwords
(iOS keychain), health data (HealthKit), smart home data (HomeKit), and more.
Tip: If you don't want your search criteria to be saved in the recent search history on the
device, don't use the magnifying glass on the mobile device to search for settings or other
information.
During the acquisition setup, AXIOM Process automatically prompts you for an encryption pass-
word if you choose the Quick image option. After the search starts, AXIOM Process creates an
encrypted backup of the device and then decrypts the backup using the password that you
provide. After imaging completes, AXIOM Process removes the password from the device.
174
User Guide
1. In AXIOM Process, click Evidence sources > Mobile > iOS > Acquire evidence.
2. Select the device, and then click Next.
3. Select the Quick image type and click Next.
4. In the Encrypted iTunes backups dialog, provide a password to use for encryption
and click Okay.
5. To continue setting up your case, click Next.
You can extract a full image from an iOS device if the device is jailbroken, and SSH is installed.
When SSH is configured, it allows you to interact with the device in ways that a regular user
can't. You can run commands on the device, access the file system, or install third-party applic-
ations.
When you connect a jailbroken iOS device to AXIOM Process, it attempts to detect SSH auto-
matically. If the device is supported, AXIOM Process indicates that it has privileged access to
the device. If AXIOM Process can't connect to the device, only the Quick image option is avail-
able.
Note: AXIOM Process no longer supports AFC2 as a service to communicate with iOS
devices. This service was often used by jailbreak tools such as Cydia but is less commonly
supported in newer jailbreaks.
When AXIOM Process detects that SSH is present on an iOS device, it attempts to connect to
the device automatically by using the default SSH credentials (username: root, password:
alpine).
If the SSH credentials are not set to the default values, AXIOM Process prompts you to provide
the correct credentials to attempt to connect again.
If connecting to the device using SSH is unsuccessful, AXIOM Process will attempt to connect
to the device using TCP and will require the device to be connected to the network.
175
User Guide
To acquire a full image of an iOS device, AXIOM Process must have privileged access to the
device.
1. In AXIOM Process, click Evidence sources > Mobile > iOS > Acquire evidence.
2. Select the device to acquire, and then click Next.
3. Select the Full image type.
4. To continue setting up your case, click Next.
176
User Guide
Kindle Fire
AXIOM Process includes support for acquiring evidence from Kindle Fire devices. Kindle Fire
uses a custom version of the Android operating system. While AXIOM Process supports acquis-
ition of Android devices, using the Kindle Fire acquisition method provides support for Kindle-
specific applications and artifacts. For example, Kindle Fire devices use the Amazon Silk
browser, which uses Amazon Web Services (AWS) and stores browser-related artifacts dif-
ferently than other Android devices. AXIOM Process searches the Amazon Silk browser for evid-
ence such as remnants from AWS on the device.
In addition to acquiring evidence from a Kindle device, you can load existing images and files
and folders previously acquired from the device.
To acquire evidence from a Kindle Fire device, complete the following steps:
1. In AXIOM Process, click Evidence sources > Mobile > Kindle Fire > Acquire evid-
ence.
2. Select the device, and then click Next.
3. Select the type of image you want to acquire, and then click Next.
4. Continue setting up your case.
177
User Guide
Using the media transfer protocol (MTP), you can acquire media and files—including pictures,
videos, audio files, documents, downloads, application data, and user data—from a media
device. If other acquisition methods don't work for smartphones, MTP can sometimes bypass
certain encryption methods and passwords so you can obtain a logical acquisition of the
device.
You can use the MTP option with media devices that support the media transfer protocol
(MTP), including: digital cameras, feature phones, and smartphones like Android, iOS, Black-
Berry, and Windows Phone.
Before you begin: To acquire evidence from smartphones using MTP, the USB charging option
must be set to Media Transfer Protocol.
1. In AXIOM Process, click Evidence sources > Mobile > Media device (MTP).
2. Select the device, and then click Next.
3. Select the type of image you want to acquire, and then click Next.
4. Continue setting up your case.
178
User Guide
SIM cards
You can acquire mobile phone SIM cards and create a logical image of the SIM card files. This
type of image contains all of the dedicated and elementary files available on the SIM card but is
not a byte for byte copy of the SIM card.
Before you begin: Install the drivers required by your SIM card reader hardware and make sure
that the SIM card reader is connected to your computer.
1. In AXIOM Process, click Evidence sources > Mobile > SIM card.
2. Select the SIM card, and then click Next.
3. Select the type of image you want to acquire, and then click Next.
4. Continue setting up your case.
179
User Guide
Note: The VeraKey option is only available for AXIOM Cyber users.
Use this option to process previously acquired images (including GrayKey or VeraKey category
based extractions) from mobile devices.
If you acquired an iOS or Android image using GrayKey, VeraKey, or an iOS Cellebrite checkra1n
extraction, you can optionally provide an Android keystore or an iOS .plist keychain when you
load the evidence source.
The keychain and keystore files both contain passwords and decryption keys for the applic-
ations on the device. AXIOM Process will process the file first to extract the passwords and
decryption keys, and then use those items to decrypt application data to give you access to
more data. The decrypted results will automatically appear in AXIOM Examine.
iOS keychain
For information about processing an iOS GrayKey or VeraKey image, sign in to the Support
Portal to read the following article: Load a GrayKey or VeraKey image.
Android keystore
For information about using the Android keystore and Graykey images, sign in to the Support
Portal to read the following article: Decrypt app data using the Android keystore and GrayKey.
180
User Guide
Cellebrite
For information about processing unrecognized Cellebrite image formats, sign in to the Support
Portal to read the following article: Processing unrecognized UFD/UFDX formats in AXIOM art-
icle.
181
User Guide
Warning: Before you connect an iOS device to iTunes, you must first ensure that the Prevent
iPods, iPhones, and iPads from syncing automatically option is turned on before you con-
nect the device. If you don't turn this setting on first, there's a chance that you might con-
taminate your evidence by syncing external data to your device.
1. In AXIOM Process, click Evidence sources > Mobile > iOS > Load evidence.
2. Complete one of the following options:
l To load an image of an encrypted iOS backup, click Image.
l To load an encrypted backup file, click Files and folders.
3. Browse to the encrypted iTunes backup, and then click Open.
4. When prompted, provide the password, and then click Check.
5. Click Okay.
6. Continue setting up your case.
After AXIOM Process finishes searching the evidence, you'll see two evidence sources in
AXIOM Examine—one for the original encrypted source and one for the decrypted backup.
Archive files .ab, .cpio, .cpio.gz, .dar, .docx, .gz, Supported: .gzip, .rar, .zip,
.gzip, .pptx, .rar, .tar, .tar.gz, .tgz, .zip.001, .7z.001
.xlsx, .zip, .zip.001, .z00, .z01, .7z,
.7z001
182
User Guide
RAW images .bif, .bin, .dd, .dmp, .fip, .ima, .img, Supported: DD (.000, 001,
.mfd, .mem, .raw, .vfd .0000, .0001, etc.)
Vehicles
Loading evidence from vehicles
AXIOM Process can report evidence such as Routes, Trackpoints, and Waypoints by reading
exported IVO files recovered using iVe from vehicles.
You will need to make sure that you choose the Magnet export option from iVe so
AXIOM Process can read your IVO file(s).
183
User Guide
PROCESSING DETAILS
Configure advanced processing features so that you can use to get more out of your search:
After processing completes, you can open and search the contents of any discovered archives
or mobile backups in AXIOM Examine.
184
User Guide
1. In AXIOM Process, click Processing details > Search archives and mobile backups.
2. In the Mobile backup passwords field, provide each potential password on its own
line.
3. Continue setting up your case.
Set the number of nested archive and mobile backup search layers
You can choose the number of layers of nested archives and mobile backups that AXIOM Pro-
cess searches (to a maximum of 100 layers).
1. In AXIOM Process, click Processing details > Search archives and mobile backups.
2. In the Nested archives and mobile backups field, type the number of nested archive
and mobile backup layers that you want AXIOM Process to search for.
3. Continue setting up your case.
185
User Guide
1. In AXIOM Process, click Processing details > Search archives and mobile backups.
2. To turn off searching archives, clear the Search archives option.
3. To turn off searching mobile backups, clear the Search mobile backups option.
4. Continue setting up your case.
Some of your evidence sources may contain encrypted files. It is possible that even some
decrypted evidence sources may contain some encrypted files. AXIOM Process supports
decrypting evidence using Dell Credant/Dell Data Protection Encryption (DDPE).
Use the Decode file-based decryption option to apply DDPE decryption to the selected evidence
source. AXIOM Process decrypts the files with DDPE offline. Once processed, AXIOM Process
creates a secondary evidence source for just the decrypted version of the files. The decrypted
evidence source can be found in the acquired evidence location that you configured for the
case.
Only DDPE files will appear in the new evidence source, and will correspond with their original
location in the file system. Encrypted files may still appear as artifacts in the primary evidence
source if they match artifact generation patterns.
For more information on decrypting a particular evidence source, see Decrypt evidence.
186
User Guide
5. Select the Evidence source. You can only decrypt one evidence source at a time.
Only evidence sources that are applicable for decryption will be available. For
example, you cannot select unpartitioned space.
6. Continue with your search.
AXIOM Examine: In the Artifacts explorer, on the Filters bar, click Keyword lists > Add
keywords
Use keywords and regular expressions to search or filter large amounts of text in the evidence.
Keywords that you include in your search are added to the Keywords filter in the Artifacts
explorer in AXIOM Examine. If you selected to tag privileged content for review in Examine, you
can filter the privileged content using the Tags and comments filter.
Search types
Consider whether an Artifacts or an All content search makes more sense for your case. Arti-
fact searches are faster whereas all content searches take longer but are more thorough.
Artifacts
l Artifact keyword searching looks for keywords in only the artifacts that
AXIOM Process can or has recovered. As part of this process, encrypted or encoded
artifacts are decrypted into plain text that can be searched using keywords.
l Search results are limited to the artifacts that AXIOM Process supports but hits are
found quickly.
l In AXIOM Examine, each of the keywords and regular expressions that you get a res-
ult on are added to the Keywords filter.
l You can turn on or turn off an entire list of items by clicking on the file name.
187
User Guide
All content
l Searching for keywords in all content is a byte for byte search of data in the encoding
type that you specify. AXIOM Examine supports ASCII, UTF-7, UTF-8, UTF-16, and UTF-
32. If you're not sure which encoding type to use, select them all.
l During an all content keyword search, AXIOM Process or AXIOM Examine will look for
matching bytes in little-endian byte order for keywords encoded using UTF-16 and
UTF-32. Keywords encoded using ASCII, UTF-7, and UTF-8 are endianness inde-
pendent and read byte by byte.
l Case-sensitive search is only available for all content searches. Select the Case sens-
itive option next to the search term or keyword list.
l AXIOM Process and AXIOM Examine look for keywords across the entire evidence
source—not just the artifacts that it recovers.
l Searching all content for keywords can increase processing time significantly, but
AXIOM Process and AXIOM Examine can find hits in data (including deleted content)
without a corresponding artifact type. During an all content search, AXIOM Examine
will process keyword snippets from the selected evidence sources only. Afterwards,
AXIOM Examine will search all artifacts in the case for matches.
l In AXIOM Examine, in the Artifacts explorer, each of the keywords and regular expres-
sions that you get a result on are added as new keyword snippets. If a keyword result
is found on an item that is both an artifact and resides in the file system (for example
a result on a document discovered in unallocated space) the keyword is counted
twice. It appears as a result on the artifact itself and as a new keyword snippet.
Privileged content
l Privileged content keyword lists perform an Artifacts search to exclude content from
the Artifacts explorer or to tag matching content for review in AXIOM Examine.
l Use privileged content keywords when configuring your case in AXIOM Process.
Select Artifact details > Privileged content.
l The formatting requirements for privileged content keyword lists are similar to other
keywords lists.
188
User Guide
Note: Results in the File system explorer are not affected when filtering privileged content.
If you stop processing keywords while AXIOM Examine is adding results from the keyword
search to your case, only the partial results will be added to your case. After you stop pro-
cessing, AXIOM Examine will add the partial results to the search index and keyword list filter,
which might take some time.
189
User Guide
Regex
A regular expression is a pattern that you define using a sequence of letters, numbers, and spe-
cial characters. AXIOM Process and AXIOM Examine support the .NET Framework syntax for
creating regular expressions. For more information about using regular expressions in AXIOM,
sign in to the support portal to read the following article: Add regular expressions to search in
Magnet AXIOM.
You can configure OCR to run automatically during the post-processing actions portion of a
search. If you don't run OCR immediately after a search, you can do so later from
AXIOM Examine.
After processing the files, you can view the extracted text in the Text extracted using OCR pre-
view card in AXIOM Examine. Additionally, you can search the extracted text from these files
using the keyword search in AXIOM Examine, and you can include text extracted using OCR as
an attachment for artifacts in HTML exports.
Text extraction using OCR is available with an active Magnet AXIOM Complete, AXIOM Cyber,
or Magnet AXIOM Examine license.
Note: Text extraction using OCR is currently unavailable in the Media explorer.
190
User Guide
Note: Running OCR requires more processing time. To decrease processing time, consider
running OCR from AXIOM Examineafter your case finishes processing.
1. In AXIOM Process, click Processing details > Extract text from files (OCR).
2. Under Process files using optical character recognition (OCR), select the files you
want to extract text from.
3. Continue setting up your case.
Note: OCR is optimized to extract text from pictures in PDF documents, scanned documents,
and pictures of documents. While OCR can extract text from other types of pictures, such as
pictures of scenery, results might vary.
1. In AXIOM Examine, on the Process menu, click Extract text from files (OCR).
2. From the Extract text from files dialog, select the types of artifacts that you want to
extract text from.
3. If applicable, select the items you want to process.
4. Click Process artifacts.
While text extraction is in progress, you can view the evidence that has already been processed.
In the status bar, click Show results.
191
User Guide
You can also apply the Extracted text (OCR) content types filter to view all evidence items
where text was extracted using OCR. For more information about filtering evidence, review the
Filter by criteria in the evidence topic.
Note: If a PDF document or picture was recovered through carving, text extracted using
OCR will not appear in the Text extracted using OCR card in the File system explorer. You
must view extracted text for carved evidence from the Artifacts explorer.
AXIOM Process: Select Processing details > Calculate hashes and find matches
AXIOM Examine: Select Process > Categorize pictures and videos by hash value
By calculating hash values for all files and importing hash sets of known files, AXIOM Process
automatically searches and categorizes evidence for you. AXIOM Process remembers your pre-
vious selections the next time you create a new case or add evidence to an existing case.
192
User Guide
Calculating hash values slows down processing times. By default, files larger than 500 MB will
not be hashed though you can customize the file size limit for hashing.
1. In AXIOM Process, click Processing details > Calculate hashes and find matches.
2. In Calculate hash values for all files, select Calculate hash values for all files.
3. Continue setting up your case.
Hash lists must be .txt files containing MD5 or SHA1 hashes (such as NSRL files), with each
hash on a separate line. After you add a hash list, you can provide a tag that gets applied to the
files. You can view the matching files in the File system explorer in AXIOM Examine.
Tip: Instead of searching for hashes using local hash list files, as outlined below, you can
also use hash sets stored in your organization's Magnet Hash Sets Manager database. To
learn more, see Find matching hashes using Magnet Hash Sets Manager.
1. In AXIOM Process, click Processing details > Calculate hashes and find matches.
2. Select the option to Calculate hash values for all files.
3. In Tag known files with matching hash values, click Add hash list.
4. Browse to the location where you saved the hash list and click Open.
5. If applicable, clear the Enabled option next to any previously imported hash list files
that you don't want to use for this search.
193
User Guide
Hash lists must be .txt files containing MD5 hashes (such as NSRL files), with each hash value
declared on its own line. Even though the files are excluded from the Artifacts explorer, you can
still view the files and the tag that is applied to them in the File system explorer. For more
information about the new RDSv3 format and how to use it, log on the Customer Portal to read
the following article: Recommended NSRL datasets in AXIOM.
Tip: Instead of searching for hashes using local hash list files, as outlined below, you can
also use hash sets stored in your organization's Magnet Hash Sets Manager database. To
learn more, see Find matching hashes using Magnet Hash Sets Manager.
1. In AXIOM Process, click Processing details > Calculate hashes and find matches.
2. Select the option to Calculate hash values for all files.
3. In Ignore non-relevant files, click Add hash list.
4. Browse to the location where you saved the hash sets, and then click Open.
5. If applicable, clear the Enabled option next to any previously imported hash sets
that you don't want to use for this search.
6. Continue setting up your case.
AXIOM Process can create hash values in MD5, SHA256, and SHA1 formats.
194
User Guide
When you set up a search, you can add files that contain hash values. AXIOM Process then
uses these values to ignore non-relevant files or automatically categorize pictures. In either
case, AXIOM Process must hash every file it encounters during a search to compare to the
hash lists. Hashing very large files can take a long time, so you can set the maximum size of
files to hash to help improve search times. The default value is 500 MB.
You can change the location where imported hash sets are stored. If you change the location
where imported hash values are stored, AXIOM Process must restart to apply the change.
To apply the changed location of the hash set database, AXIOM Process must restart.
If the hash set on your computer isn't stored in the new location that you choose,
AXIOM Process must move it to the new location before it restarts.
If there is no hash set on your computer, AXIOM Process creates an empty HashList.db file at
the new location you choose before it restarts.
195
User Guide
Note: To help streamline AXIOM Cyber investigations, Project VIC and CAID features are
unavailable by default. To use these features, you must first Customize log collection and dia-
gnostics.
AXIOM Process: Select Processing details > Calculate hashes and find matches
AXIOM Examine: Select Process > Categorize pictures and videos by hash value
Import hash lists that contain known pictures and videos so that AXIOM Process automatically
searches and categorizes these evidence sources for you.
In addition to your own .txt files, you can import .json files from organizations like Project
VIC and CAID, which allow for the sharing of hash sets between law enforcement organizations
for the purpose of identifying media related to child exploitation. When you import Project
VIC hash lists, you can view additional VICS metadata in AXIOM Examine such as tags, series,
distributed media, identified victims, and more.
You can also enable PhotoDNA to use fuzzy matching to help identify even more pictures. With
PhotoDNA enabled, AXIOM Process can identify pictures that are similar in appearance to exist-
ing Project VIC pictures and categorize them in the same way.
Tip: Instead of searching for hashes using local hash list files, as outlined below, you can
also use hash sets stored in your organization's Magnet Hash Sets Manager database. To
learn more, see Find matching hashes using Magnet Hash Sets Manager.
You can select the hash sets you want to use to categorize pictures and videos found in your
evidence sources. If you haven't previously imported local hash lists, add local hash lists and
configure your hash sets first.
196
User Guide
1. In AXIOM Process, click Processing details > Calculate hashes and find matches.
2. In the Categorize pictures and videos by hash value table, select the local hash
sets you want AXIOM Process to use to categorize evidence.
3. If applicable, clear the Enabled option next to any hash sets that you don't want to
use for this search.
4. Continue setting up your case.
When your search completes, AXIOM Examine adds each category number it gets hits for to the
Media categorizations filter. When you categorize media using Project VIC hash lists, you can
view VICS attributes and values in Media category details and filter by VICS attributes using the
Media attributes (VICS) filter.
To automatically categorize picture and video evidence by hash value, import local hash lists
into AXIOM Process. These lists can be from organizations like Project VIC and CAID or your
own files. Hash lists must be .json files or .txt files containing MD5, SHA1, or
PhotoDNA hashes. For .txt files, each hash must be declared on its own line.
After you import a local hash list, you can add the hash list to a new or existing hash set, for
example, when you want to update a Project VIC or CAID hash set with incremental updates
downloaded from Hubstream.
Tip: If you haven't previously configured your hash sets in AXIOM Process, set up your media
categorization profile in AXIOM Examine by choosing a media categorization list. You can
choose pre-set media categorization profiles for Canada (Project VIC), International (Project
VIC), the United States (Project VIC), and the United Kingdom (CAID), or you can add a new
list or import a list of media categories. When you choose a media categorization list in
AXIOM Examine, you'll see the category names and colors you're familiar with when man-
aging picture and video hash sets in AXIOM Process.
1. In AXIOM Process, click Processing details > Calculate hashes and find matches.
2. In Categorize pictures and videos by hash value, click Add hash list.
3. In Step 1, click Select hash list.
197
User Guide
4. Browse to the hash list you want to import and click Open.
5. In Step 2, complete one of the following options:
l To add the imported hash list to an existing hash set, select the hash set you
want to update.
l To add the imported hash list to a new hash set, click Add new hash set. Provide
a name for the hash set and click Add.
6. In Step 3, complete one of the following options:
l If the hash list you imported is a .txt file, from the drop-down, select the category
you want to update in the hash set and click Update hash set. Repeat for other
categories you want to update.
l If the hash list you imported is a .json file, select the categories you want to
update in the hash set and click Update hash set.
7. When you've finished updating your hash sets, click Close.
If a matching hash value appears in more than one hash set with different categories applied to
it AXIOM Process will apply the assigned category from the higher priority hash set.
1. In AXIOM Process, click Processing details > Calculate hashes and find matches.
2. In the Categorize pictures and videos by hash value table, click the hash set to
reprioritize.
3. In the Priority column, click the up or down arrow to change the priority.
Enable PhotoDNA
If you import hash sets in AXIOM Process for the purpose of picture categorization, you can
use PhotoDNA and fuzzy matching to help identify more pictures. Using PhotoDNA,
AXIOM Process can identify pictures that have been modified to change their hash values and
pictures that are similar in appearance to existing Project VIC pictures.
In addition to finding matching pictures with identical hashes, PhotoDNA also uses fuzzy
matching to find similar pictures with slight modifications. A user may have modified a picture
by re-sizing, cropping, or drawing over it, by adding a watermark, or by changing the resolution.
198
User Guide
Even with these changes, PhotoDNA can identify the picture as similar to the original picture.
PhotoDNA works by converting pictures into a black-and-white format, dividing them into
squares, and calculating a numerical value for each square. These values, which represent the
shading in each square, are the PhotoDNA signature or hash of a picture.
When categorizing media using Project VIC or another hash set, PhotoDNA will categorize
matches as non-pertinent only if there is a cryptographic hash match (MD5 or SHA1). Pho-
toDNA will not categorize media as non-pertinent for matches alone.
Once your Magnet Forensics product is integrated with Magnet Hash Sets Manager, your team
members can use it to access all the uploaded hash sets it contains to match files by hash
across their cases. From AXIOM Examine, you can also Manually apply media categories to
case evidence.
To download the Magnet Hash Sets Manager installer and guide, visit the free tools page on the
customer portal.
Integrate Magnet Hash Sets Manager with AXIOM Process or AXIOM Examine
199
User Guide
Search for matches from hash sets using Magnet Hash Sets Manager
After you've integrated Magnet Hash Sets Manager with AXIOM Process, you can use hash sets
from the centralized database to categorize media, tag known files, and ignore non-relevant
files in your case.
1. In AXIOM Process, when you're creating or adding evidence to a case, under Pro-
cessing details, click Calculate hashes and find matches.
2. If you want to use hash sets to search for known or non-relevant files, select the
option to Calculate hash values for all files.
3. Under Search for matches from hash sets, if you haven't already integrated Magnet
Hash Sets Manager with AXIOM Process, click Integrate with Magnet Hash Sets
Manager.
a. In the Settings window, under Product integrations, select Magnet Hash
Sets Manager.
b. Provide a server IP address and port, then click Connect to server.
4. Scroll down to the hash set type you want to search for.
5. In the table, in the Enabled column, select the hash sets you want to use to search
for evidence in your case.
6. Continue processing your evidence.
If a matching hash value appears in more than one hash set with different categories applied to
it AXIOM Process will apply the assigned category from the higher priority hash set.
1. In AXIOM Process, click Processing details > Calculate hashes and find matches.
2. In the Categorize pictures and videos by hash value table, click the hash set to
reprioritize.
3. In the Priority column, click the up or down arrow to change the priority.
200
User Guide
For optimal performance of this feature, see optimizing the performance of Magnet.AI
You can configure AXIOM Process so that AXIOM Examine begins categorizing chats imme-
diately after your case finishes processing.
1. In AXIOM Process, click Processing details > Analyze chats with Magnet.AI.
2. Under Categorize chats with Magnet.AI, select the chat categories you want
Magnet.AI to categorize.
3. Continue setting up your case.
If you didn't previously configure AXIOM Process to categorize chats immediately after your
case finished processing, you can start categorizing chats from AXIOM Examine.
Using Magnet.AI can be resource intensive. You can configure how AXIOM Examine allocates
system resources to either prioritize categorizing evidence with Magnet.AI quickly or to allow
you to continue to reviewing evidence in AXIOM Examine while Magnet.AI is still processing.
1. In AXIOM Examine, on the Process menu, click Categorize chats with Magnet.AI.
2. In the System resource allocation drop-down list, choose how you want
AXIOM Examine to allocate system resources while categorizing chats.
3. Select the chat messages you want Magnet.AI to categorize, and then click Next.
4. Select the chat categories you want Magnet.AI to categorize.
5. Click Categorize chats.
201
User Guide
While Magnet.AI categorization is in progress, you can view the evidence that has already been
categorized. In the status bar, click Show results.
AXIOM Process: Select Processing details > Analyze pictures with Magnet.AI
Depending on the number of pictures being categorized in the case, categorizing pictures might
take a while. Some categories, such as handwriting, hate symbols, human faces, human hands,
and license plates, require additional processing time. While Magnet.AI is still processing, you
can continue to review the evidence in AXIOM Examine.
Note: When you categorize pictures using Magnet.AI, if AXIOM Examine detects a GPU on
your computer, and the GPU has more than 126 MB of free memory, it automatically
attempts to use it. Using a GPU instead of a CPU can significantly decrease the time it takes
to categorize pictures.
For more information about optimal performance of this feature, see Optimize the per-
formance of Magnet.AI.
Tip: To learn more about Magnet.AI categories and performance, sign in to the Support
Portal to read the following articles:
202
User Guide
Thorn provides improved models for categorizing pictures as possible child abuse and nudity.
Thorn is free of charge and only available to law enforcement agencies.
Select Edit beside the Thorn integration status to enable Thorn integration in Product Integ-
rations by requesting an activation key.
You can configure AXIOM Process so that AXIOM Examine begins categorizing pictures imme-
diately after your case finishes processing.
Tip: When categorizing pictures with Magnet.AI, we recommend that you save picture attach-
ments to the case rather than access them from the original source. For more information,
see Save picture attachments to the case.
1. In AXIOM Process, click Processing details > Analyze pictures with Magnet.AI.
2. Under Categorize pictures with Magnet.AI, select the picture categories you want
Magnet.AI to categorize.
3. Continue setting up your case.
If you didn't previously configure AXIOM Process to categorize pictures immediately after your
case finished processing, you can start categorizing pictures from AXIOM Examine.
Using Magnet.AI can be resource intensive. You can configure how AXIOM Examine allocates
system resources to either prioritize categorizing evidence with Magnet.AI quickly or to allow
you to continue to reviewing evidence in AXIOM Examine while Magnet.AI is still processing.
1. In AXIOM Examine, on the Process menu, click Categorize pictures with Magnet.AI.
2. In the System resource allocation drop-down list, choose how you want Magnet
AXIOM to allocate system resources while categorizing pictures.
3. Select the pictures you want Magnet.AI to categorize, and then click Next.
203
User Guide
While Magnet.AI categorization is in progress, you can view the evidence that has already been
categorized. In the status bar, click Show results.
If you haven't changed the setting to build picture comparison automatically, or performed any
picture categorization using Magnet.AI, you must manually trigger building picture comparison
in your case. If you add more evidence to your case, you must build picture comparison again
for new picture files to be included in similar picture searches. Magnet.AI will only analyze the
new picture files.
To build picture comparison, in AXIOM Examine, on the Tools menu, click Build picture com-
parison.
Picture comparison will build in the background while you continue working in your case.
1. In AXIOM Process, under Processing details, click Analyze pictures with Magnet.AI.
2. Under Build picture comparison, select the checkbox.
204
User Guide
If you turn on this setting using either method, it will remain on for the next case unless you
clear it again.
Note: Magnet.AI will search all uncorrupted picture files in your case. However, if the case
contains more than 10,000 pictures, AXIOM Examine can only show a maximum of 10,000 of
the most similar pictures in the search results.
You can select a reference picture from your case or import an external picture. Select a picture
from the Media explorer, or from the Artifacts or File system explorer in Row, Column, Classic,
or Thumbnail view.
You can import an external picture to use as a reference picture. Pictures that you import are
not added to the case as evidence.
205
User Guide
Matching results are sorted from most similar to least similar in the Media explorer and in
Thumbnail view only. If you examine the matching results in another view, the results will not be
sorted. If you return to the Media explorer or Thumbnail view, the matching results will be sor-
ted if you haven't removed the Similar pictures filter.
After AXIOM Examine finds similar pictures, you can select the number of search results to
show, up to a maximum of 10,000 pictures.
In AXIOM Process: Click Processing details > Add CPS data to search > Add CPS export file.
Note: To help streamline investigations, this feature is unavailable for AXIOM Cyber users by
default. To use this feature, you must first Customize log collection and diagnostics.
206
User Guide
To help protect children that are targeted by suspects using the internet, the Child Rescue Coali-
tion's Child Protection System (CPS) collects online data that tracks person-to-person activity
such as IP addresses, file hashes, person-to-person user GUIDs, and more.
You can include CPS evidence in your search in AXIOM Process or add evidence from the
CPS to your case in AXIOM Examine.
After processing is complete, AXIOM Examine tags the matching data in the Artifacts and File
system explorers.
Use YARA rules, to identify matching files in an image. One or more rules make up a rule set. A
rule set is stored in a YARA file. Rules can be public or private.
When performing a search, AXIOM Process searches against all rules in the rule set.
AXIOM Process displays results against the overall public rule. There is no limit to the number
of rule sets you can apply to a scan. However, be aware that your scan times might increase
with the number of rule sets you apply to your scan.
207
User Guide
You can add your own YARA files from saved directories, Git repositories, or as individual
imports.
To add your own rule sets from saved directories, you can declare one or more folders where
your YARA rule sets are stored. AXIOM Process will identify any .yar or .yara files in these
folders, and any subfolders, and make the rule sets from these folders available for use when
processing evidence. Should you update the files in the saved directories, navigate away from
the screen and then return to the YARA rules screen to display the updated content. The default
location for YARA rules is \Magnet Forensics\Magnet AXIOM\YARA\.
You can upload a rule set in a YARA file from anywhere on your workstation. When you upload a
YARA file, the file is imported into one of the declared sync folders.
208
User Guide
Your YARA file now appears in the list of rule sets and the contents are stored in the synced
folder.
Git repository
Once added, the YARA rules found at the specified Git URL will be listed. Select Sync GIT repos-
itories to pull and update all YARA rule sets from the Git repositories. The Location where the
uploaded YARA files will be imported to is not configurable.
Manually created rule sets can be saved to any of the directories you have declared for your
YARA rules. If you have not saved any directories, your new YARA rule set will be saved to the
default location.
209
User Guide
When you enable the Dynamic App Finder, AXIOM Process looks for databases that contain cer-
tain types of data (conversations, geolocation data, website URLs, and person identifiers).
After the search completes, you can view and configure the recovered artifacts in
AXIOM Process on the Customize artifacts screen.
210
User Guide
If AXIOM Process recovers any custom file types, AXIOM Examine displays the hits in the Arti-
facts explorer under the category heading you configured in the Custom file types list.
AXIOM Process does not index or search file type artifact hits that it discovers—you should
review hits for file type artifacts manually.
You can change where the Custom file type list is saved. You can also add more file types and
choose which file types you want AXIOM Process to search for.
Warning: Only one person can open the Custom file type list at a time. If the list is saved to a
shared network, you must close the list on your computer before anyone else can open it.
211
User Guide
Category Choose an artifact category from the options provided. These categories
correspond to the artifact categories available in AXIOM Examine. The
category you choose determines where the file type artifact will appear in
the Artifacts explorer in AXIOM Examine. You can't enter your own cat-
egory name.
Name Enter the name of the file type artifact, as you want it to appear in AXIOM
Examine.
To search for multiple headers and/or footers for the same file type,
enter the file type multiple times in the list using the same Category and
Name. AXIOM Examine will display hits for the file type as a single arti-
fact.
Note: AXIOM Process will not process custom file type artifacts that
have the same name as artifacts already supported by AXIOM artifacts.
212
User Guide
Description A description of the custom file type you're searching for. Providing a
description is helpful to other examiners who might be using the Custom
file types list.
Extensions To identify files by their file extension, or parse, enter one or more file
extensions. To enter multiple extensions, separate each value by a semi-
colon.
File extensions are not case sensitive and you can include or exclude a
period.
Header To identify files by their binary content, or carve, enter the hexidecimal
byte header. Enter each byte as "\x" followed by the two-character hex
header value. Specifying a header can improve the search performance
of AXIOM Process because the software knows where to search.
You can enter a header value with or without providing a footer value.
Depending on whether you specify just a header, just a footer, or both,
AXIOM Process searches the file differently. For more information, see
Searching for headers and footers in custom file types.
Header offset If the file's header does not occur at the beginning of a file, enter the
header offset.
Footer To identify files by their binary content, or carve, enter the hexidecimal
byte footer. Enter each byte as "\x" followed by the two-character hex
header value. Specifying a footer can improve the search performance of
AXIOM Process because the software knows where to search.
213
User Guide
You can enter a footer value with or without providing a header value.
Depending on whether you specify just a header, just a footer, or both,
AXIOM Process searches the file differently. For more information, see
Searching for headers and footers in custom file types.
Footer offset If the file's footer does not occur at the end of a file, enter the footer off-
set.
The footer offset is expressed as a numeric value greater than zero. This
is an optional value. If you do not provide a value, the footer offset is
assumed to be zero.
Maximum size In bytes, specify the maximum amount of data that you want to carve,
of data to carve beginning from the header offset, for a particular file type artifact hit. The
maximum size of data to carve is expressed as a numeric value greater
than zero.
This is an optional value. If you don't provide a value, AXIOM Process will
carve 1 KB of data. If you specify a maximum of 0 bytes to carve and turn
on the Remove duplicates setting, AXIOM Examine will display a single
artifact hit if the header signature is located in multiple locations in the
file.
214
User Guide
No Yes AXIOM Process saves only the footer data you specify.
Yes Yes AXIOM Process saves the file data from the header you specify to
the footer you specify.
215
User Guide
Note: Certain artifacts depend on Windows components to recognize artifact hits. If Win-
dows updates are applied to your Forensic workstation you might see hit count differences
when scanning previously processed evidence using the same version of AXIOM Process.
216
User Guide
For more information about searching for custom artifacts, see Searching for custom artifacts.
Decrypt artifacts
For some artifacts, you can provide potential passwords or decryption keys to try to decrypt the
user's account or data.
If this option is available for a specific artifact, you'll find an Options link below the artifact
name with the ability to provide a password or decryption key.
If you choose to save picture attachments to your case, your case folder size can increase. The
pictures will be saved to the attachments database in your case folder.
Note: .tiff, .raw, and .3fr files, as well as carved pictures and thumbnails are saved to the
case regardless of this setting.
1. In AXIOM Process, click Artifact details > Computer or Mobile artifacts > Media.
2. Under the Pictures artifact, click Options.
217
User Guide
3. Clear the Access pictures from the source (do not save to case) option, and then
click Okay.
4. Continue setting up your case.
1. In AXIOM Process, click Artifact details > Computer or Mobile artifacts > Media.
2. Under the Pictures artifact, click Options.
3. Select or clear the Extract EXIF data option, and then click Okay.
4. Continue setting up your case.
1. In AXIOM Process, click Artifact details > Computer or Mobile artifacts > Media.
2. Under the Pictures or Videos artifact, click Options.
3. Select or clear the Detect skin tone option, and then click Okay.
4. Continue setting up your case.
When AXIOM Process finishes searching the evidence, you can filter evidence in the case by
skin tone percentage in AXIOM Examine.
218
User Guide
1. In AXIOM Process, click Artifact details > Computer or Mobile artifacts > Media.
2. Under the Pictures or Videos artifact, click Options.
3. Select the Resize to a maximum width/height of option and specify the maximum
dimension (in pixels), and then click Okay.
4. Continue setting up your case.
1. In AXIOM Process, click Artifact details > Computer or Mobile artifacts > Media.
2. Under the Pictures or Videos artifact, click Options.
3. Select the Create a preview using still frames option.
4. Click Okay.
5. Continue setting up your case.
219
User Guide
If you choose to save video attachments to your case, your case folder size can increase. The
videos will be saved to the attachments database in your case folder.
Note: If the evidence in your case is from a VSC or ISO image, you must save the video to
your case to get a preview of the video in the case. Consider exporting VSC and ISO images
and processing them separately from the rest of your evidence.
1. In AXIOM Process, click Artifact details > Computer or Mobile artifacts > Media.
2. Under the Videos artifact, click Options.
3. Select the Save videos up to option and specify the maximum size for the videos.
The default maximum size is 500 MB.
4. Click Okay.
5. Continue setting up your case.
1. In AXIOM Process, click Artifact details > Computer or Mobile artifacts > Media.
2. Under the Videos artifact, click Options.
3. In the Carved video size field, specify the size of carved videos that you want to
save. The default size is 20 MB.
4. Click Okay.
5. Continue setting up your case.
220
User Guide
221
User Guide
You can now find your imported artifact profile in the Profile drop-down list.
222
User Guide
This option takes the most time but will gather the most information from the file system and
unallocated space. To maximize the data returned, most artifacts have a carving component
included.
223
User Guide
This option will shorten processing time, but some items embedded within files or unallocated
space will be missed. If you choose to only parse artifacts, you can carve the same artifacts
later.
Evidence sources that were selected to be parsed can be reprocessed using carving.
Note: Only those artifacts that were initially parsed can be reprocessed with carving. You can-
not modify which artifacts are reprocessed with carving.
Note: When reprocessing artifacts with carving, the option to Carve parsed arti-
facts is auto selected and cannot be changed.
224
User Guide
Privileged content
Privileged content
Evidence sources often contain information that you as an investigator are not permitted to
view. Evidence sources may also include artifacts that require reviewing to be deemed as priv-
ileged.
When you need to manage privileged content in your case, you can use privileged content lists
to exclude matches from the Artifacts explorer, or to tag artifacts for review in AXIOM Examine.
Privileged content lists perform searches on artifacts only. Search results are limited to the arti-
facts that AXIOM Process supports but hits are found quickly.
To begin filtering privileged content, check Identify/remove privileged content in the case.
This option is selected by default and will exclude all matches from appearing in the Artifacts
explorer in your case.
Matches will also be excluded from the Artifacts explorer if they contain a privileged content
keyword match in the file path and have a hash match using Tag known files with matching
225
User Guide
hash values. See Calculate hash values and find matches for more information about using
hash lists for known files.
Note: The data is still present in the case and available through the File system explorer.
This option will tag matching artifacts in AXIOM Examine without excluding results.
The default tag value for each privileged content list is Privileged content. You can provide a
custom tag value for each privileged content list or reuse an existing tag. Privileged content tag
values can not be empty or match an existing system tag (for example, Evidence, Of interest,
Bookmark).
Once the search is complete, the privileged content tag is available in the Tags and Comments
filter bar in AXIOM Examine. You can manage the privileged content tags in AXIOM Examine as
you would any other tag. See Add a tag or comment to evidence for more information.
226
User Guide
Regex
A regular expression is a pattern that you define using a sequence of letters, numbers, and spe-
cial characters. AXIOM Process and AXIOM Examine support the .NET Framework syntax for
creating regular expressions. For more information about using regular expressions in AXIOM,
sign in to the support portal to read the following article: Add regular expressions to search in
Magnet AXIOM.
When processing the case with the Exclude privileged content in the case option, the case
information will include the privileged content keywords and the counts of excluded artifacts
for each. Once an artifact is excluded by a keyword match, it will not be searched for further
privileged content keywords.
For example, if an artifact contains matches for two keywords (keyword1, keyword2), the Case
information will indicate a count of 1 for keyword1 and 0 for keyword2 since the artifact was
excluded by keyword1.
227
User Guide
Note: The date range filter only works for evidence that contains a UTC time stamp. Local
time behaves like a string rather than a time stamp, so artifacts with local times will not
appear in the results even if their time stamp matches the selected time period. To learn
more about the behavior of local and UTC time stamps, see Understanding sorting and fil-
tering for artifacts with local time stamps.
Features such as Magnet.AI and Media Categorization rely on the artifacts being created within
the Artifact explorer. Files such as Media could be missed by these features if they are not
within the filtered date range.
Applying a date range affects all evidence explorers and views with the exception of the File
system and Registry explorers.
As artifacts can have multiple date values, only one date value must be within the range to be
included. For example, an artifact can have a created date value outside of the date range, but if
it has a modified date value that is within the date range, it will be included. When applying a
date range you can also choose to exclude artifacts hits that do not include a time stamp.
228
User Guide
In addition to adding custom artifacts in AXIOM Process, you can find more artifacts by
enabling the Dynamic App Finder and configuring the Custom file types list to search for arti-
facts that aren't currently supported by AXIOM Process.
Custom artifacts can contain executable code and are run in an unsandboxed Python envir-
onment with administrator privileges. Running in an environment without restrictions gives cus-
tom artifacts a lot of power and flexibility, but you must ensure that the source from where you
obtain a custom artifact is trusted.
229
User Guide
AXIOM Process saves artifact definition templates to the AXIOM Process/plugins folder.
If an artifact is not available, there might be a problem with the artifact schema. Check the
log.txt file in the plugins folder for details.
When you've successfully loaded your custom artifacts in AXIOM Process, you can include
them in a search.
230
User Guide
EXAMINE EVIDENCE
To learn about examining evidence in AXIOM, select one of the topics below.
The default settings of AXIOM Examine may not work for every case. You can Adjust the
appearance of your case in AXIOM Examine and Customize AXIOM Examine settings across
cases.
To enhance your use of AXIOM Examine, you can Integrate external products and features with
AXIOM Examine, such as exporting directly to Magnet REVIEW or searching for hash matches
with Magnet Hash Sets Manager.
231
User Guide
By default, AXIOM prevents users from clicking on internet links that appear in an artifact's pre-
view card, in case these links are not secure or unauthorized. If you want you or other AXIOM
users on your computer to be able to access these links, you can Allow internet connection
from the Preview card.
Often, the evidence that you examine includes executable files or scripts (including those
embedded in other artifacts such as PDF files or documents). Please note that AXIOM Examine
never runs executable files or scripts contained in your evidence (whether examined from
AXIOM Examine or a portable case)—including if you try to open an executable file with an
external application.
In the explorers, you can continue to narrow down to important data by filtering, searching, and
categorizing evidence.
When you first open a case in AXIOM Examine, the case dashoard displays summary inform-
ation.
232
User Guide
l If you're interested in data from a particular evidence source, select it from the left
navigation window to review it on its own dashboard, as well as information such as a
unique device identifier and serial number.
l If you're interested in cloud-based evidence, select Insights from the left navigation
pane and, if cloud account credentials were recovered in the evidence, you can try to
Acquire more data from a cloud account.
To gain insight into your evidence using an artifacts-first approach, including viewing artifacts
on a world map or reading a user's chat threads, Browse and dig deeper into artifacts.
To learn how artifacts relate to each other or where files originated, Discover connections.
To view email evidence in a similar format as they would have appeared in the user's original
email application, View email evidence.
To view media evidence in a thumbnail view with features for categorization, blurring or hiding
explicit content, and stacking duplicate items, View media evidence in the Media explorer.
To view the file structure of the drive that data was acquired from, including unallocated space
and volume slack, as well as raw data such as SQLite, LevelDB, or binary data, Explore the file
system.
To view important information about system hardware, installed programs and settings, and
user profiles, View Windows registry data.
Files on macOS computers can contain a number of additional attributes associated with each
file on the file system. For evidence from macOS computers with APFS, you can view additional
233
User Guide
attributes from the spotlight database as well as extended attributes in the APFS metadata
card. View common attributes of interest in the Artifacts explorer and a full list of available
attributes in the File system explorer. For attributes that have binary information, see View raw
artifact data in Text and hex.
In the Artifacts explorer, you can also customize how evidence is displayed. There are also a
number of specialized artifact views that you can use to consolidate certain types of artifacts,
such as chat artifacts, media, or those with date/time or geolocation data.
To learn more about the artifacts that Magnet AXIOM can recover, see the Artifact Reference
Guide.
In the Artifacts explorer, in the left navigation pane, click Refined results and select a refined
result artifact.
Use the refined results artifact category as a starting point when browsing artifacts in your
case. AXIOM Process analyzes artifact evidence and extracts specific fragments that are com-
monly important in forensic examinations, then groups these fragments into themes that may
help you start your investigation. For example, AXIOM identifies Google Searches in various arti-
facts from an evidence source, then groups them under a refined result.
From a refined result, you can browse to the parent artifact by clicking the original artifact link
in Details.
To learn more about refined results, see the refined results section in the Artifact Reference
Guide.
234
User Guide
In the Artifacts explorer, above the top right corner of the Evidence table, in the view drop-
down list, select Conversation view.
Use conversation view to see messages as a back-and-forth dialog, in a format similar to the
application that the messages are from. Conversation view displays chat messages in chro-
nological order based on most recent chat activity.
Select a conversation to view all the individual chat messages included in that conversation, as
well as details such as number of participants, display names, number of messages, and more.
In the Artifacts explorer, above the top right corner of the Evidence table, in the view drop-
down list, select Histogram view.
Histogram view provides a graphical representation of all the results in your case for each type
of artifact. Use Histogram view to build a visual baseline for your case to compare with other
cases. This can help you build a profile of common investigation types and identify cases that
fall outside the norm. For example, if you’re able to build a baseline of the common artifacts
that are found in a case and then compare it with others, any variations that stand out might
warrant further analysis.
l Click Save as baseline to create a baseline .ini file for comparison with later cases.
l Click Load baseline to open a previous baseline histogram and display it alongside
the current case to identify discrepancies in the current case.
In the Artifacts explorer, above the top right corner of the Evidence table, in the view drop-
down list, select Thumbnail view.
235
User Guide
Use Thumbnail view to view and categorize the media evidence in your case. To learn more, see
Manually apply media categories to case evidence.
Tip: To view media evidence using thumbnails with more specialized features, build the
Media explorer instead. To learn more, see View media evidence in the Media explorer.
In the Artifacts explorer, above the top right corner of the Evidence table, in the view drop-
down list, select World map view.
World map view plots all artifacts that have geolocation data on a world map. You can view indi-
vidual plotted points or clusters which appear where a large number of plotted points exist.
World map view is useful if you have an idea of where an incident occurs and want to see if
there are other artifact results that coincide with that location.
If you have internet connection, world map view automatically connects to an online map
server. If you're working on a computer without internet access, you can Connect to an offline
map server.
l Click a pin to view basic details, including the date and time of the result.
l Click a pin and click View details to see the artifact details in a split screen below the
world map view.
l To switch back to a full-screen map, in the top-right corner of the map view, click the
expand icon ( ).
236
User Guide
For an artifact created from one or more files in the file system, view the original file system loc-
ations where the artifact comes from.
Note: Some artifacts might have more than one source link, which means that the artifact is
comprised of data from multiple locations.
When you click the source link, AXIOM Examine switches to the File system explorer. To learn
more about examining the raw data from the file system source, see Explore the file system
and View raw artifact data in Text and hex.
For artifacts that are created from the Windows registry, you can view the original registry keys
where the artifacts come from.
Note: Not all artifacts have associated registry data. Some artifacts might have more than
one location link, meaning that the artifact contains information from multiple registry loc-
ations.
When you click the location link, AXIOM Examine switches to the Registry explorer. To learn
more about examining the raw data at the registry source, see View Windows registry data and
View raw artifact data in Text and hex.
237
User Guide
Discover connections
The Connections explorer provides a visual representation of how artifact attributes in your
case are related. Set the focus on an attribute of interest, like a file name, and then
AXIOM Examine draws a map of connections that might otherwise be time-consuming or dif-
ficult to discover.
In AXIOM Examine, on the Tools menu, click Build connections. To view progress while con-
nections are building, in the status bar, click View details.
While connections are building, you can continue to examine your case. Once you've built con-
nections initially, AXIOM Examine refreshes the connections if you add new evidence.
In the Artifacts and File system explorers, under Details, a connections icon appears beside
the attributes that you can create connections maps for. You can view connections based on
different attributes of an artifact, such as hash, file name, sender, recipient, or source.
In the Details card of an artifact or file, click the connections icon . AXIOM Examine
switches to the Connections explorer and creates a map with the selected item as the primary
node. Use the connections map to learn how that attribute relates to other items in your case.
238
User Guide
The connections map includes a series of nodes (based on artifact attributes, which provide
data about the files themselves) and connectors, which indicate how files are related.
item Description
Primary node The anchor used to create connections. When you click the con-
(pink)
nections icon for a specific attribute, it becomes the primary node
when AXIOM Examine switches to the Connections explorer.
To make any node the primary node and center the map on it, double-
click a node.
Direct node (blue) An attribute with a direct connection to the primary node.
Selected node A direct node you've clicked on. The matching results refresh so you
(teal) only see artifacts that contain both attributes of the primary and selec-
ted node.
Indirect node A node that is directly related to a selected node, and indirectly related
(gray) to the primary node.
Connector A line that represents the type of connection between two nodes, such
as the movement of an artifact or the action a user has taken with a
file.
To help decide where to focus your examination, hover your mouse over a specific node's con-
nections to view them without redrawing the map.
On the Filters bar, apply one or more filters to the connections map to refine the visible evid-
ence.
239
User Guide
l Use the Evidence filter to limit which evidence sources to show connections for.
l Use the Connectors filter to indicate the specific types of connections that you want
to see.
l Use the Attributes filter to specify which artifact attributes to include.
Select a node to view all of the matching artifact results for the node as it relates back to the
primary node. For example, if the primary node is a file name, the matching results show all arti-
facts that contain the file name. To learn more about nodes, see Types of nodes and con-
nectors in a connections map.
Click the pop out icon beside the Connections drop-down list to maximize it on a separate mon-
itor.
Click and hold a node to save it as a point of reference. As you explore connections in the map,
click any node in the Saved nodes bar at the top of the map to return to that view.
If you want to include a map of connections in your report, you can print it to paper or PDF. A
printed map includes the primary node and any focus nodes.
240
User Guide
If you want to include a map of connections in your HTML report, you can save the connections
map as an HTML file.
In AXIOM Examine, use the Email explorer to view supported email evidence all in one place, in
a folder structure that mirrors the application where the data was recovered. In addition to the
emails themselves, you can also view related artifacts and artifact details.
You can see the build progress in the Email explorer or the status bar. While the Email explorer
is building, you can continue to browse through your case and add tags, comments, filters, and
profiles.
After you've built the Email explorer initially, AXIOM Examine prompts you to rebuild the Email
explorer if you add new evidence.
241
User Guide
1. In the Email explorer, right-click the emails or attachments that you want to tag.
2. Click Add / Remove tag.
3. Select the tag that you want to apply.
4. In the window that appears, select either the Tag the email and its attachments
together or Tag the email or attachment only option.
5. Click Continue.
After you apply a tag, the tag color appears beside the email artifact and, if applicable, next to
its attachments in the preview window. You can change your selection later in Allow the Email
explorer to tag email attachments.
Note: To help streamline investigations, this feature is unavailable for AXIOM Cyber users by
default. To use this feature, you must first Customize log collection and diagnostics.
Use the Media explorer to view, sort, and filter media evidence using criteria that are specific to
pictures and videos.
242
User Guide
The Media explorer stacks copies of the same picture or video that were found in different
source locations, so you only have to view each media item once.
If AXIOM Examine finds multiple artifacts from the same media file in one source location, you
can view related artifacts to see the details of each copy.
Note: The Stack media items by PhotoDNA hash option is available if you enabled Pho-
toDNA when you processed your case. Selecting this option will significantly increase the
time it takes to build the Media explorer index.
While the Media explorer is building, you can continue to examine your case. Once you've built
the Media explorer initially, AXIOM Examine refreshes the Media explorer if you add new evid-
ence.
In addition to the regular search and filter options in AXIOM Examine, use the left navigation bar
to filter media evidence. For example, if you know that certain evidence came from a particular
camera, you can filter on that camera's details.
Select as many filters as you wish, then click Apply filter to view only the applicable media res-
ults.
Use the Group by option to organize the evidence into groups such as file extension or created
date.
243
User Guide
Use the Sort by option to organize the evidence in ascending or descending order based on
attributes such as skin tone percentage.
Note: When you sort media evidence, any items without an applicable value will appear at the
end of the sorted list. For example, if you sort by created date, and there's a picture in your
case that date/time data couldn't be recovered for, it will appear at the end of the list.
l Scroll across a video thumbnail to view a preview of the video within the thumbnail.
l To view the video in a larger preview window, double-click the thumbnail and watch
the entire video or scroll across the preview to view the video's contents.
AXIOM Examine automatically saves your progress in the Media explorer. If you click away to
another explorer and then return to the Media explorer, you will return to the last media item
you selected and all your tags, filters, and settings will remain the way you left them.
Note: The media categories you add in the Media explorer don't appear in any other explorer.
On the Tools menu, click Manage media categories. In the Media categorization lists section,
you can do one of the following:
l Select an existing media categorization list from Project VIC or CAID. Select which
categories to enable, then click Okay.
l To use another person's list or one you've created outside of AXIOM, click Import list.
Select which categories to enable, then click Okay.
l To create your own list, click Add new list. Name and customize the list, then click
Okay.
244
User Guide
You can then categorize media in the Media explorer. To learn more, see Manually apply media
categories to case evidence.
In the Media explorer, click the stack icon on the bottom right corner of a thumbnail to view all
the items in the stack and a few basic details.
Expand the Tags and comments pane to apply tags and media categories. When you apply a
tag or media category to a stacked picture or video, it will also be applied to all items in the
stack.
When you group evidence in the Media explorer, only part of a stack might be applicable to a
certain group. The number of items in the stack that appear in a certain group will be visible on
the stack thumbnail.
For example, if you've grouped the evidence by date/time, and one item in the stack has a time
stamp on one day, and the other item in the stack has a time stamp on another day, a thumbnail
will appear in each day's group. Each thumbnail notifies you that "1 out of 2" items is visible in
that group.
By default, the Media explorer stacks artifacts by MD5 / SHA1 hash. In the Stack by drop-down
list, select one of the following options:
245
User Guide
l Select PhotoDNA if you selected the option to stack media by PhotoDNA. To learn
more about PhotoDNA, see Find matching and similar media using AI and hashes.
l Select None to turn off stacking so that all duplicate media items are visible.
In the Media explorer, when you click a media item, expand the Details pane. Under Related arti-
facts, do one of the following:
l Click an individual related artifact to filter on that artifact in the Artifacts explorer.
l Click View related artifacts to filter on all related artifacts in the Artifacts explorer.
Note: When you edit a thumbnail, you aren't changing the picture itself, and there is no dam-
age to the forensic integrity of the file. The changes you make to a thumbnail don't persist
after you close the picture preview window.
246
User Guide
While video editing capabilities are not currently available in AXIOM Examine, you can edit the
video's timelapse preview.
l If you know approximately when an event occurs and want to look at a user's online
activity during that time
l If you've identified an important piece of evidence and want to build a story around it
using results that occur before and after.
You can see the progress while timeline is building in the Timeline explorer or the status bar,
and continue to browse through your case. Once you've built the timeline initially,
AXIOM Examine refreshes the timeline if you add new evidence.
247
User Guide
Items that have multiple timestamps appear on the timeline once for each timestamp. To move
between timestamps for a single hit, click the < or > icons underneath the timeline graph where
the timestamps are listed, for example, < 1 of 3 timestamps >.
1. In AXIOM Examine, in the Timeline explorer, select and right-click items that you
want to export.
2. Click Create report / export.
248
User Guide
3. Next to the File path field, click Browse and select the location you want to save the
export. Click Select folder.
4. Click Create.
Timeline categories
In addition to the listing details for below the timeline graph, the timeline also labels each item
with one of the following categories.
Browser usage Evidence of the target using a browser or Browser last visit
navigating web related activity on the com- date/time
puter or phone.
Cache/cookies from
browsers
Deleted file Indicates that a file has been deleted. While Recycle Bin deletion
the file might not be accessible any more, date/time
there is a timed record representing its dele-
tion.
Device interaction Indicates the user or system interacted with IoT devices such as
an external device that was not the com- Google Home,
puter or phone being examined. Amazon Echo,
OnStar or other
cars, and more.
File download Indicates that a file was downloaded from Chrome download
an external source. activity
249
User Guide
Shellbags
LNK files
RDP activity
Physical location A timestamp placing the user or device at a iOS cached loc-
specific location at a given time based on ations
GPS coordinates or a physical address.
Significant locations
Facebook Wall
posts
Direct messages
250
User Guide
User event Evidence related to an event outside the sys- Calendar events
tem or user’s account usage. such as meetings or
birthdays
Note: Some artifacts might have more than one source link, which means that the artifact is
comprised of data from multiple locations.
251
User Guide
You can upload the hash of a file in your case to VirusTotal to help make informed decisions
about how to handle these files on your system. VirusTotal uses antivirus scanners and URL/-
domain blocklisting services to inspect files. For added security, AXIOM Examine only shares
the hash of the file, rather than the file itself. VirusTotal then compares this hash to its existing
records to check if the file has already been scanned for viruses.
If a file with a matching hash has already been uploaded to VirusTotal, a table will appear with
the results of the scan. If the file has not yet been uploaded, VirusTotal will open with an Item
not found screen.
Add files from the File system explorer to the Artifacts explorer
You can add files from the File system explorer to the Artifacts explorer. Looking at all of your
information in one explorer makes consolidating this information for reporting purposes easier.
252
User Guide
In the Artifacts explorer, you can see the new artifact in the Examiner defined group in Files.
1. In AXIOM Examine, in the File system explorer, click the Selected folder only drop-
down.
2. Select the All subfolders option.
Save databases
While a database is in use on a live system, it creates temporary files to store data. To properly
save this type of database to your computer, make sure that you save the temp files in addition
to the .db file. If you save only the .db file, the database appears to be empty when you open it
on your computer.
253
User Guide
The new artifact appears in the Artifacts explorer in the Examiner defined group. The Details for
the new artifact lists the size of the file, the name of the analyst who added the artifact to the
case, and the date that the artifact was added.
You can also create artifacts from registry data. To learn more, see Exploring the registry.
Note: The SQLite viewer only displays records that were live and active at the time of
acquisition. Although Magnet AXIOM can recover non-live records for supported artifacts,
they only appear in the Artifacts explorer, rather than the SQLite viewer.
When you examine a database in the SQLite viewer in the File system explorer, select the table
in the database that you want to view from the Select table drop-down.
254
User Guide
View BLOB (Binary Large Object) data by right-clicking the data and selecting one of the fol-
lowing options:
l To preview the BLOB data, click View as picture. In the previewer, you can zoom in on
the picture, rotate the picture, and more.
l To view the BLOB data in an external viewer, click Open with and select a viewer.
l To view BLOB data in a property list (plist) viewer, right-click the data and click View
as plist.
l To view BLOB data in a protobuf (protocol buffers) viewer, right-click the data and
click View as protobuf.
255
User Guide
Note: The LevelDB viewer only displays records that were live and active at the time of
acquisition. Although Magnet AXIOM can recover non-live records for supported artifacts,
they only appear in the Artifacts explorer, rather than the LevelDB viewer.
When you examine a database in the LevelDB viewer in the File system explorer, select the table
in the database that you want to view from the Select table drop-down.
The LevelDB viewer displays both the raw data and encoded data in separate columns. You can
also change the encoding of a column in the table by right-clicking the column header and
selecting a new encoding type.
View BLOB (Binary Large Object) data by right-clicking the data and selecting one of the fol-
lowing options:
l To preview the BLOB data, click View as picture. In the previewer, you can zoom in on
the picture, rotate the picture, and more.
256
User Guide
l To view the BLOB data in an external viewer, click Open with and select a viewer.
l To view BLOB data in a property list (plist) viewer, click View as plist.
Copy cell data or save BLOB image data by right-clicking the data and selecting Copy or Save
as.
Note: Not all artifacts have associated registry data. Some artifacts might have more than
one location link, meaning that the artifact contains information from multiple registry loc-
ations.
257
User Guide
l In the left navigation pane, you can find all the separate registry hives in the registry.
l Double-click a hive to view its keys (signified with folder icons).
l Expand a key to view its subkeys (signified with folder icons).
l If you’ve expanded multiple items and want to return to a more collapsed view, right-
click an item and select the option to Collapse the current item, Collapse all nested
items, or Collapse all items in tree.
l Each registry entry is a name/value pair. The possible types of data for a registry
value are: string, expandable string, integer, and binary.
l Registry entry information includes general information such as the registry key name
and type.
l If a registry entry's name is '(default)', the entry was not renamed by the user.
l If a registry entry's data is defined as '(value not set)', the registry entry was not
changed by the user.
l Evidence information includes source information and links to the hive file in the file
system. To learn more, see Explore the file system.
l Depending on the type of key value, you might also be able to see text and hex
data. To learn more, see View raw artifact data in Text and hex.
In AXIOM Examine: File system, Timeline, or Registry explorer > select item under Evidence
> under Details, find Text and hex > click Text or Hex
Use Text and hex to view the raw data associated with a file. This view allows you to verify the
results that AXIOM Examine produces and manually parse out any additional data that might
not be included in the details of an artifact.
258
User Guide
The default character encoding is unicode (US-ASCII), but you can select from many other char-
acter encoding types in the Encoding drop-down list.
1. In Text and hex view, click Go to and provide the offset you want to view.
2. On your keyboard, press Enter.
259
User Guide
AXIOM Examine automatically decodes the selection and displays the information under
Decode at the bottom of the Text and hex card.
1. In the text or hex viewer, select the data you want to view.
2. Right-click the selected data and click View as protobuf.
1. In Text and hex view, click and drag to select text or hex values.
2. Right-click and select Save selection or Copy selection.
3. If you chose to save the hex data, browse to the location where you want to save the
data.
4. Provide a file name (ending in .txt), and then click Save.
1. In Text and hex view, click and drag text or hex values to select them.
2. Right-click the selection and click Display as artifact.
260
User Guide
3. When the artifact has been created, click View artifact in the status bar to navigate
to it in the Artifacts explorer.
The new artifact appears in the Artifacts explorer in the Examiner defined group, and includes
the name of the user who created the artifact in Details.
You can also create artifacts from file snippets. To learn more, see Create artifacts using file
snippets.
261
User Guide
Create custom tags that are specific to your investigation and then apply those tags to evid-
ence in your case.
262
User Guide
Import tags
Import a list of tags to your case. Files must be .json or .txt format and each tag value must
appear on its own line.
Export tags
Export your list of tags to share with other examiners. You can export your list of tags to either
.json or .txt format.
After you've exported evidence for use in another Magnet Forensics tool, you can merge tags
and comments from that case back into your original case. To learn more, see Merge tags and
comments back into the original case.
Tag evidence
1. In AXIOM Examine, under Evidence, right-click the item or group of items that you
want to tag.
263
User Guide
Tip: You can also apply tags using shortcuts. To view and change the shortcuts for each tag,
click Tools > Manage tags.
Note: Tags automatically sync between artifacts and file system items, but some tags only
appear in the explorer where they are applied. To learn more about the behavior of tags
between explorers, log in to the Support Portal to read the article Tag syncing between
explorers in AXIOM Examine.
In the Email explorer, you can select individual emails or attachments and add tags or com-
ments. You can also enable AXIOM Examine to automatically tag emails and attachments
together.
1. In the Email explorer, right-click the emails or attachments that you want to tag.
2. Click Add / Remove tag.
3. Select the tag that you want to apply.
4. In the window that appears, select either the Tag the email and its attachments
together or Tag the email or attachment only option.
5. Click Continue.
After you apply a tag, the tag color appears beside the email artifact and, if applicable, next to
its attachments in the preview window. You can change your selection later in Allow the Email
explorer to tag email attachments.
264
User Guide
System tags
In addition to allowing you to Create a custom tag, AXIOM Examine includes a set of system
tags that you can use or customize.
Bookmark Spacebar
Evidence CTRL + 1
Of interest CTRL + 3
Exceptions CTRL + 4
Note: When a search completes, you can view a summary of any files that were not fully pro-
cessed due to artifact timeouts. These files are tagged in AXIOM Examine with the Excep-
tions system tag. The Exceptions system tag is not included in any exports or reports.
For example, you might create a profile called Target A to group the various user names and
phone numbers used by that person of interest. Then, you can filter evidence on the profile Tar-
get A to see activity related to that person.
265
User Guide
Create a profile
Import profiles
Import a list of profiles to your case. Files must be .json or .txt format and each profile value
must appear on its own line.
Export profiles
Export your list of profiles to share with other examiners. You can export your list of profiles to
either .json or .txt format.
266
User Guide
Apply a profile
When you apply a profile to a specific identifier or user account, AXIOM Examine also applies
that profile to every artifact in the case that has that exact identifier or user account.
1. In AXIOM Examine, in the Artifacts explorer, expand the Refined results group, and
click Identifiers or User Accounts.
2. Under Evidence, select the artifact or group of artifacts you want to apply a profile
to.
3. Expand Tags, comments & profiles, in the Profiles section, select the profile that
you want to associate the identifier or user account with.
267
User Guide
In AXIOM Examine, on the Filters bar, click Keyword lists and select the keywords or keyword
lists you want to filter on.
268
User Guide
your workstation, interacting with AXIOM Examine might become slower than normal while
keywords finish processing.
If you stop processing keywords while AXIOM Examine is adding results from the keyword
search to your case, only the partial results will be added to your case. After you stop pro-
cessing, AXIOM Examine will add the partial results to the search index and keyword list filter,
which might take some time.
AXIOM Examine filters on matching results and highlights matching text in Evidence and
Details.
Depending on the explorer where you use the search bar, AXIOM Examine searches the evid-
ence differently.
Artifacts, Media, and l Searches all fragments except for date and time fragments
Timeline explorers
l Searches content of media and documents
269
User Guide
AXIOM Examine filters on matching results and highlights matching text in Evidence and
Details.
A regular expression is a pattern that you define using a sequence of letters, numbers, and spe-
cial characters. AXIOM Process and AXIOM Examine support the .NET Framework syntax for
creating regular expressions. For more information about using regular expressions in AXIOM,
sign in to the support portal to read the following article: Add regular expressions to search in
Magnet AXIOM.
In the Artifacts explorer, in the left navigation pane, expand the Keyword snippets artifact cat-
egory and select a keyword to filter on the results.
To provide additional context, the keyword snippet includes the 50 bytes that appear before and
after the keyword. For more detailed information about a specific keyword result, click the
source link to go to the original file.
270
User Guide
Note: You can delete an entire keyword list, or a manually entered keyword. You cannot
delete an individual keyword from a keyword list. Additionally, any Keyword Snippets arti-
facts will not be deleted even if the associated keyword list is deleted.
271
User Guide
Magnet AXIOM considers files to be Items inaccessible by users if they can't be accessed
without the use of special recovery or carving tools. These files are recovered from the fol-
lowing locations:
Magnet AXIOM considers files to be Items accessible by users if they were recovered, either
through parsing or carving, from all other locations.
Note: The date and time filter only works for evidence that contains a UTC time stamp, rather
than a local time stamp. Because local time behaves like a string rather than a time stamp,
artifacts with local times will not appear in the results even if their time stamp matches the
selected time period. To learn more about the behavior of local and UTC time stamps, sign in
to the Support Portal to read the article Understanding sorting and filtering for artifacts with
local time stamps.
272
User Guide
View evidence within a specific range of dates and times such as before a date, on a specific
day of the week, in a custom time range, and more.
When you've found evidence relevant to your investigation, you can use the Relative date/time
filter to view evidence that might have occurred around the same time.
273
User Guide
Tip: You can optimize this filter by importing hash lists for files like standard operating sys-
tem icons and screen savers that are not relevant to your case. AXIOM Examine will ignore
these files so that they don't clutter your evidence. For more information, see Ignore non-rel-
evant files.
274
User Guide
In AXIOM Examine: In the Artifacts or File system explorer > Column view > Select an artifact,
artifact category, or folder from the left navigation pane.
Sort a column
To sort content in a column under Evidence, click the header of the column you want to sort.
Note: If you sort on a column that contains a string that begins with special characters (i.e.
not numbers or letters), you can find this evidence at the top or bottom of the column.
Search using multiple words or search terms and choose whether you want to see results for
all (an "AND" search) or any (an "OR" search) of the search terms. For each keyword you
275
User Guide
specify, you can choose to show only the items that include or exclude that word. You can fur-
ther specify if you want to search for the whole word only, match the case, and search for the
term if it appears near another word or set of characters.
To learn more about regex, sign in to the Support Portal to read the article Add regular expres-
sions to search in Magnet AXIOM.
Note: Filter sets can't be shared or imported to other AXIOM cases if they contain any filters
that include case-specific IDs. For example, if you filter on related artifacts from the Media
explorer, this filter set can't be shared with other cases because it relies on the Hit IDs of arti-
facts from the current case.
276
User Guide
277
User Guide
Note: To help streamline AXIOM Cyber investigations, Project VIC and CAID features are
unavailable by default. To use these features, you must first Customize log collection and dia-
gnostics.
278
User Guide
279
User Guide
l To change the name of a category, double-click the current name and provide a
new name. Click Update.
l To turn off a category you don't want to use, deselect it from the Enabled
column.
7. Optionally, select the default category you want to assign to all visible uncat-
egorized pictures.
8. Click Okay.
280
User Guide
Note: If you choose to mute videos, turning the sound on for a single video in the Preview
card does not affect this setting. All other videos remain muted by default.
281
User Guide
day). When you reach the time of day that you specify, AXIOM Examine will prompt you to stop
categorizing media.
You can set up Magnet.AI categorization when you create your case in AXIOM Process, or per-
form the categorization in an existing case in AXIOM Examine. To learn how to categorize
media using Magnet.AI, see Analyze pictures with Magnet.AI.
To find similar pictures, you need to build picture comparison when you create your case in
AXIOM Process, or in an existing case in AXIOM Examine. You can then find similar pictures in
AXIOM Examine. To learn how to build picture comparison and find similar pictures, see Build
picture comparison manually.
282
User Guide
When you create a case in AXIOM Process, add hash sets from your local database or your
organization's central database. You can also add hash sets to an existing case in
AXIOM Examine. AXIOM Process remembers your previous selections the next time you create
a new case or add evidence to an existing case.
In addition to finding matching pictures with identical hashes, PhotoDNA also uses fuzzy
matching to find similar pictures with slight modifications. A user may have modified a picture
by re-sizing, cropping, or drawing over it, by adding a watermark, or by changing the resolution.
Even with these changes, PhotoDNA can identify the picture as similar to the original picture.
PhotoDNA works by converting pictures into a black-and-white format, dividing them into
squares, and calculating a numerical value for each square. These values, which represent the
shading in each square, are the PhotoDNA signature or hash of a picture.
When categorizing media using Project VIC or another hash set, PhotoDNA will categorize
matches as non-pertinent only if there is a cryptographic hash match (MD5 or SHA1). Pho-
toDNA will not categorize media as non-pertinent for matches alone.
283
User Guide
Note: To help streamline AXIOM Cyber investigations, Project VIC and CAID features are
unavailable by default. To use these features, you must first Customize log collection and dia-
gnostics.
l Media explorer
l Artifacts explorer > Thumbnail view
l Select, import, or create a media categorization list. See Select and share media cat-
egorization lists
l Reduce your exposure to graphic content using reminder and media obfuscation
options. See Reduce exposure to illicit content.
284
User Guide
In addition to the above options, note the following AXIOM Examine features that can help your
investigation:
l While categorizing media, you can view your progress in the Media categorization pro-
gress bar.
l When you categorize a picture or video, AXIOM Examine automatically applies the
same media category to any other media items in the case with a matching MD5 or
SHA1 hash.
l The Media explorer includes helpful features such as stacking duplicate media and
viewing related artifacts. See View media evidence in the Media explorer.
Tip: After you apply a category for a media item, AXIOM Examine automatically selects the
next thumbnail so that you can continue to apply media categories to subsequent items.
285
User Guide
Tip: After you apply a category to all visible uncategorized media, AXIOM Examine auto-
matically displays the next set of uncategorized evidence so that you can continue to apply
media categories to subsequent items.
You can also add new media categorization hashes from your case to existing media hash sets
from your organization's Magnet Hash Sets Manager database. You or other members of your
organization can then access these updated hash sets. To learn more about the Magnet Hash
Sets Manager, see Find matching hashes using Magnet Hash Sets Manager.
The next time you create a case in AXIOM Process and search the evidence using hash sets,
the search will include the hashes that you've added.
286
User Guide
Note: If your administrator has protected a hash set in the Magnet Hash Sets Manager data-
base, a lock icon appears beside it. You can't update protected hash sets from
AXIOM Examine.
1. Click Process > Update hash set with new media categorizations.
2. In Step 1: Select a hash set to update, complete one of the following options:
l To add the hash list to an existing hash set, select the hash set you want to
update.
l To add the hash list to a new hash set, click Add new hash set. Provide a name
for the hash set and click Add.
3. In Step 2: Select the categories to update in the hash set, select the categories you
want to update in the hash set and click Update hash set.
4. When you've finished updating your hash sets, click Close.
AXIOM Examine: Select File > Create export / report > VICS
After you've categorized pictures and videos in your case, you can create a JSON export of the
reviewer graded media to share with Project VIC or CAID. If you have any media in your case
that has been precategorized by CAID but is missing from their database, you can help them fill
in these gaps by choosing the option to include attachments for media items that are missing
from the CAID database.
This option creates a .json file using the Project VIC specification. For more information about
Project VIC, see www.projectvic.org.
If you've enabled a pre-set media categorization country profile, the following categories are
included in the export by default:
287
User Guide
After you choose the category metadata you want to include, select the subset of categories
you want to include attachments for in the export.
l If you have any media in your case that has been categorized by CAID but is missing
from their database, help fill in these gaps by choosing the option to include these
missing attachments.
l You can optionally generate a new CaseID value so that the exported data appears as
a new case within the CAID database.
288
User Guide
AXIOM Process: Click Browse to case and select the case you want to add evidence to.
Tip: When you add new evidence to a case, make sure to provide Scan information in
AXIOM Process > Case details, so that you can keep track of the separate acquisition
instances in a case.
When you add new evidence in AXIOM Process, select your evidence search options the same
way that you would for any new case. To learn more, see Processing details
You can continue working in your case in AXIOM Examine while the evidence is being pro-
cessed. Click Load new results to view the evidence that has been processed so far. When pro-
cessing completes, click Okay.
Note: To help streamline investigations, this feature is unavailable for AXIOM Cyber users by
default. To use this feature, you must first Customize log collection and diagnostics.
To help protect children that are targeted by suspects using the internet, the Child Rescue Coali-
tion's Child Protection System (CPS) collects online data that tracks person-to-person activity
such as IP addresses, file hashes, person-to-person user GUIDs, and more.
You can add evidence from the CPS to your case by importing the .csv files into AXIOM. In
AXIOM Examine, click Process > Add CPS export file.
289
User Guide
1. In AXIOM Examine, on the Process menu, click Remove evidence from case.
2. Select the evidence source you want to remove and click Okay.
3. To confirm you want to remove the evidence, click Remove evidence source.
AXIOM Examine: Case dashboard > Insights > Potential cloud evidence leads > Select a
cloud account.
290
User Guide
1. Under Account details, select a password or token and click Acquire data from this
account.
2. In the window that appears, click Open AXIOM Process.
3. In AXIOM Process, follow the steps to access the account and acquire available
evidence.
If the authentication attempts are unsuccessful, AXIOM Process notifies you that you've
entered an incorrect password and does not proceed past the sign in screen. An unsuccessful
attempt can be due to one of the following reasons:
You can attempt to use another password / token, or you can attempt to acquire cloud evid-
ence using an alternative access method.
1. Under Access Methods, choose an alternative access method and click the link.
2. In the window that appears, click Open AXIOM Process.
3. In AXIOM Process, follow the steps to access the account and acquire available
evidence.
291
User Guide
EXPORT EVIDENCE
To learn about exporting evidence from AXIOM, select one of the topics below.
Below are some recommendations for how to prepare your evidence for exporting, and when to
use different export types depending on the audience or purpose of your export.
Before you create an export, consider the need to Add a tag or comment to evidence or Manu-
ally apply media categories to case evidence of interest so that it's easier to select only the
necessary items in your export.
Create an export
There are a few different methods you can use to create an export, depending on your needs:
292
User Guide
l To export a variety of items that you might have tagged or categorized, click File >
Create export / report to open the exporting wizard and make your selections.
l To export a subset of data that you've filtered down to, or a number of items that
you've selected, right-click your selection and click Create export / report. In the
exporting wizard, under Items to include, select Items in the current view or Selected
items only.
To learn more about which export type and options might be best for your investigation, see the
recommendations below.
Note: AXIOM Examine saves exports to your case folder, with a UTC time stamp. Depending
on the archive explorer you use to view the exported .zip file, the times of the artifacts might
be converted to your local time. You can use tools such as 7-Zip to convert the artifact times
back to what you see in AXIOM Examine.
If you are consistently creating a certain kind of export, and have a heavy workload, consider
using Streamline your exports using templates and column configurations to streamline your
exporting process.
If your case includes data that is confidential or non-relevant to the stakeholder that you're shar-
ing the export with, you can exclude that information. Add an appropriate tag to that content
and select the tag from the Items to exclude section in the exporting wizard.
l Stakeholders who are not technical, or not trained in digital forensics, need to invest-
igate the case.
l Stakeholders without an AXIOM license need to investigate the case.
293
User Guide
l You need further input from these stakeholders in the form of tags and comments on
a set of evidence in your case.
The portable case exports the evidence you select to a lightweight version of AXIOM Examine,
which includes the most necessary features for filtering, viewing, and tagging evidence. Port-
able cases don't include media categorization features, so we recommend categorizing media
before you create the technical case.
To learn more, see Use portable case to collaborate on cases with others.
l Choose an HTML report if you want to include search capabilities, attachments, or the
ability to view the export in a web browser.
l Choose a PDF report if you want to print the report, or prevent changes from being
made to the file's contents.
Choose the Magnet REVIEW option to upload evidence directly to your organization's Magnet
REVIEW cases, or, if you're working offline, to export data to a folder that can be ingested by
Magnet REVIEW. To learn more, see Export evidence for Magnet REVIEW.
If your organization uses another forensics tool, which you want to use to verify your evidence,
choose the XML export. You can then run this exported evidence through other forensics tools,
including those that are script-based.
294
User Guide
This option exports all the evidence you select to an .xml file, and, optionally, includes external
files in a separate attachments folder. For more information about the structure of the .xml file,
log in to the Support Portal to review the Sample XML output article.
If your organization uses another forensics tool and you want to share tags and comments with
another case in that third-party tool, use the exporting wizard to create a JSON export. This
export type includes selected evidence as well as any tags or comments you've added to that
evidence in AXIOM.
Note: To help streamline AXIOM Cyber investigations, Project VIC and CAID features are
unavailable by default. To use these features, you must first Customize log collection and dia-
gnostics.
After you've categorized pictures and videos in your case, you can create a JSON export of the
reviewer graded media to share with Project VIC or CAID. If you have any media in your case
that has been precategorized by CAID but is missing from their database, you can help them fill
in these gaps by choosing the option to include attachments for media items that are missing
from the CAID database.
This option creates a .json file using the Project VIC specification. For more information about
Project VIC, see www.projectvic.org.
If you've enabled a pre-set media categorization country profile, the following categories are
included in the export by default:
295
User Guide
After you choose the category metadata you want to include, select the subset of categories
you want to include attachments for in the export.
l If you have any media in your case that has been categorized by CAID but is missing
from their database, help fill in these gaps by choosing the option to include these
missing attachments.
l You can optionally generate a new CaseID value so that the exported data appears as
a new case within the CAID database.
Select the identifiers export to create a .json with all the identifiers you've noted in your case,
and share this information with other examiners or organizations.
The identifiers export requires you to provide your organization name and contact information,
so that if another organization gets a match on one of your identifiers, they can contact you to
request more information about your case.
Select the load file option to export data for use with eDiscovery platforms that support .dat
files, such as Relativity, which legal stakeholders can use to review your case.
Under Configure artifact details, you'll have the option to export the chat thread preview file for
each message.
296
User Guide
l If you want to include additional context for reviewers, and you don't have concerns
about further redaction after generating the load file, select the Include all selected
messages from the conversation in each native file option.
l If you're concerned about further redaction after generating the load file, select the
Only display a single message for each native file option.
Note: Any media embedded in chat messages will be included in the chat message previews.
If you want to include attachments for the emails you selected, as well as any parent and sib-
ling items if the items you selected are attachments themselves, select the Export selected
items and their attachments or parent items option. To learn more, log in to the Support Portal
to read the article Exporting attachments and parent items to load files.
In addition to a .dat file, the load file export also includes text files for every included document,
and native files for the following artifacts:
297
User Guide
Before you create an export, consider the need to Add a tag or comment to evidence or Manu-
ally apply media categories to case evidence of interest so that it's easier to select only the
necessary items in your export.
Create an export
There are a few different methods you can use to create an export, depending on your needs:
l To export a variety of items that you might have tagged or categorized, click File >
Create export / report to open the exporting wizard and make your selections.
l To export a subset of data that you've filtered down to, or a number of items that
you've selected, right-click your selection and click Create export / report. In the
exporting wizard, under Items to include, select Items in the current view or Selected
items only.
To learn more about which export type and options might be best for your investigation, see the
recommendations below.
Note: AXIOM Examine saves exports to your case folder, with a UTC time stamp. Depending
on the archive explorer you use to view the exported .zip file, the times of the artifacts might
be converted to your local time. You can use tools such as 7-Zip to convert the artifact times
back to what you see in AXIOM Examine.
298
User Guide
If you are consistently creating a certain kind of export, and have a heavy workload, consider
using Streamline your exports using templates and column configurations to streamline your
exporting process.
If your case includes data that is confidential or non-relevant to the stakeholder that you're shar-
ing the export with, you can exclude that information. Add an appropriate tag to that content
and select the tag from the Items to exclude section in the exporting wizard.
Export emails
If you want to export Microsoft Outlook emails or other emails supported by the email explorer,
use the PST export option. To learn more about viewing PST exports and understanding the
data in them, sign in to the Support Portal to read the article Understanding PST exports.
If you want to export emails and their attachments, consider using the HTML export option.
l To export chat threads that are in the language you use in AXIOM Examine, we recom-
mend using HTML, PDF, or XML.
l To export chat threads that are in another language besides the one you use in
AXIOM Examine, we recommend using Excel, HTML, or PDF. For more information,
see Export evidence that is in a different language.
When creating your export, you can choose to include only the chat messages you selected, or
include the full conversation history of any chat messages you selected.
299
User Guide
Note: To help streamline AXIOM Cyber investigations, Project VIC and CAID features are
unavailable by default. To use these features, you must first Customize log collection and dia-
gnostics.
After you've categorized pictures and videos in your case, you can create a JSON export of the
reviewer graded media to share with Project VIC or CAID. If you have any media in your case
that has been precategorized by CAID but is missing from their database, you can help them fill
in these gaps by choosing the option to include attachments for media items that are missing
from the CAID database.
This option creates a .json file using the Project VIC specification. For more information about
Project VIC, see www.projectvic.org.
If you've enabled a pre-set media categorization country profile, the following categories are
included in the export by default:
After you choose the category metadata you want to include, select the subset of categories
you want to include attachments for in the export.
300
User Guide
l If you have any media in your case that has been categorized by CAID but is missing
from their database, help fill in these gaps by choosing the option to include these
missing attachments.
l You can optionally generate a new CaseID value so that the exported data appears as
a new case within the CAID database.
In AXIOM Examine, you can categorize media. To learn more, see Search and categorize media.
To export this categorized media, as well as include the media items as attachments, use a
PDF or HTML export.
If your export includes sensitive content that has been categorized in illegal categories and you
want to blur it to protect the wellbeing of your stakeholders, use an HTML export. Under Con-
figure artifact details, select Include previews and file attachments and Blur previews for
items in illegal categories.
Tip: If you created an Excel report and the evidence contains content that appears on mul-
tiple lines, for example chat messages, turn on the wrap text feature in Microsoft Excel. (In
Excel, press CTRL + A. On the toolbar, click Wrap Text.)
301
User Guide
1. In AXIOM Examine, in the Timeline explorer, select and right-click items that you
want to export.
2. Click Create report / export.
3. Next to the File path field, click Browse and select the location you want to save the
export. Click Select folder.
4. Click Create.
Export connections
The Discover connections displays case data in a connections map. If connections are valuable
to your investigation, consider exporting the connections map directly and adding this to your
report, rather than just exporting the data from another explorer in a typical table form. You can
export connections to a PDF or HTML file.
If you want to include a map of connections in your report, you can print it to paper or PDF. A
printed map includes the primary node and any focus nodes.
If you want to include a map of connections in your HTML report, you can save the connections
map as an HTML file.
302
User Guide
Note: Currently, only memory dumps processed using Volatility allow memory artifacts to be
exported from AXIOM Examine.
You can use AXIOM Examine to export memory artifacts from your case to import into other
tools. You can choose to export files based on their type:
1. In AXIOM Examine, right-click the memory artifact you want to export, and then click
Export memory items.
2. In the Export memory items dialog, complete the following actions:
a. In Export details, provide the Folder name and File path that you want to
use.
b. In Items to include, select the memory items that you want to export.
3. Click Export.
Export metadata
If your organization uses another forensics tool and you want to share tags and comments with
another case in that third-party tool, use the exporting wizard to create a JSON export. This
export type includes selected evidence as well as any tags or comments you've added to that
evidence in AXIOM.
303
User Guide
In the File system explorer, you can export the metadata associated with files or folders to a
.csv file. By default, AXIOM Examine saves exported metadata to your case folder.
1. In AXIOM Examine, open the File system explorer and browse to the file or folder of
interest.
2. In Evidence, right-click the item you want to export metadata for. To select multiple
items, press CTRL and click the items. Then, right-click one of the highlighted items.
3. Click Export details.
4. Click Browse to location and select the location where you want to save the export.
Enter a file name.
5. Click Save file.
304
User Guide
1. In Text and hex view, click and drag to select text or hex values.
2. Right-click and select Save selection or Copy selection.
3. If you chose to save the hex data, browse to the location where you want to save the
data.
4. Provide a file name (ending in .txt), and then click Save.
To learn more about text and hex, see View raw artifact data in Text and hex.
305
User Guide
Click File > Upload case to Magnet REVIEW. In the exporting wizard, make sure the following
options are selected:
l Under Items to include > Select Magnet REVIEW export format, select REVIEW 2.0. By
default, all tags and comments in the case are included, but you can manually select
which ones to include under Select applied tags and comments.
l Under Customize formatting options, select the option that applies to your organ-
ization:
o If your organization has its own Magnet REVIEW server, select Upload to a cus-
tomer-hosted REVIEW server
o If your organization uses Magnet REVIEW in the centralized server, select
Upload to Magnet REVIEW SaaS. Then, click Sign in and provide your cre-
dentials.
Note: When you upload your case to Magnet REVIEW SaaS, the data will be
stored in a cloud server hosted by Magnet Forensics and based in the United
States.
l Under Provide additional information, provide a case number. The evidence will
upload to that case if it already exists, or it will automatically create a new case if that
case number doesn't yet exist.
306
User Guide
l Under Items to include > Select Magnet REVIEW export format, select REVIEW 2.0. By
default, all tags and comments in the case are included, but you can manually select
which ones to include under Select applied tags and comments.
l Under Customize formatting options, select Export the data to this computer.
l Under Preview and save, click Browse to provide a file location where AXIOM Examine
will save the export. Make sure the location you select has enough storage space for
the exported evidence.
AXIOM Examine creates a folder that contains the JSON export and associated attachments.
After the export finishes, you can upload evidence using the Magnet REVIEW CLI.
When you share a portable case with other stakeholders, they can explore the evidence, and
add their own comments, tags, media categorizations, and bookmarks. Stakeholders don't
need to have AXIOM Examine installed to review a portable case.
When they complete their reviews, you can merge their findings back into the original case.
307
User Guide
You can also Streamline your exports using templates and column configurations
1. In AXIOM Examine, right-click an artifact group or items that you want to include in
the portable case.
2. Click Create export / report.
3. Under Export / report format, select Portable case.
4. Follow the instructions to customize and create your portable case.
1. In AXIOM Examine, in the Timeline explorer, select and right-click items that you
want to export.
2. Click Create report / export.
3. Next to the File path field, click Browse and select the location you want to save the
export. Click Select folder.
4. Click Create.
308
User Guide
Note: You can't merge two portable cases together. The portable case must be merged with
the original case it was created from.
Note: Often, the evidence that you examine includes executable files or scripts (including
those embedded in other artifacts such as PDF files or documents). Please note that
AXIOM Examine never runs executable files or scripts contained in your evidence (whether
examined from AXIOM Examine or a portable case)—including if you try to open an execut-
able file with an external application.
When you've completed reviewing the evidence, you can send the send the portable case folder
back to the owner of the original case.
When you share a portable case with your stakeholders, make sure you provide them with the
entire export folder in a read/write format. To help users who haven't used Magnet AXIOM, a
PDF file called the Portable case quick start guide is automatically included with the portable
case.
309
User Guide
Comments Yes
Connections explorer No
Email explorer No
Hex decoder No
Locate source No
Keywords Yes
310
User Guide
Magnet.AI categorization No
Media explorer No
Merge case No
Profiles Yes
Registry explorer No
311
User Guide
types, columns, and format options that are the most useful for different types of invest-
igations. Using templates and column configurations, you can:
Note: Templates are not available for Identifiers, PST, and VICS export formats. These
formats are more streamlined, and don't require templates to save time.
l Under Items to include, select Use a template and select a template from the drop-
down list.
l Under Configure artifact details > Configure columns to include, select Specific
columns only and select a column configuration from the drop-down list.
Manage templates
When you create an export, you can save the settings for use in future exports of the same
format. The template saves your selected artifact types, column configuration, and formatting
options, if applicable.
In the exporting wizard, after you've made all the selections for your export, under Preview and
save, click Save settings to template.
312
User Guide
Edit a template
You can edit all user-created templates, but not system-created ones.
Tip: If you want to create a template using an existing template as the basis,
including a system-created template, you can Duplicate the template first, and
then edit the copy.
3. Follow the steps in the exporting wizard to make changes to the template.
4. Under Format options, click Save template.
5. To rename the template, under Template name, double-click the current name.
Enter a new name, then click Update.
Import a template
You can import another user's template to use for your own exports of the same format.
313
User Guide
Export a template
You can export a template so that other examiners can use it in their own exports.
When you create an export, you can create a new column configuration for use in future
exports. You can also configure the sort order (primary, secondary, or tertiary) of the column
names for each artifact. After you select a sort option, use the arrows next to the drop-down to
indicate the sort direction. By default, ascending order is used (up arrow).
314
User Guide
l To customize the sort order for a column name, from the Sort order drop-down,
and select a sorting method. Use the arrows to indicate ascending (▲ ) or des-
cending (▼ ) order.
4. Click Save and close.
You can edit all user-created column configurations, but not system-created ones.
Tip: If you want to create a column configuration using an existing one as the
basis, including a system-created one, you can Duplicate the column con-
figuration first, and then edit the copy.
3. Select an artifact from the left navigation menu. For each applicable artifact, you
can make the following changes:
l Select the columns you want to include or exclude.
l To reorder the columns, drag and drop the column names to your preferred
order.
l To customize the sort order for a column name, from the Sort order drop-down,
and select a sorting method. Use the arrows to indicate ascending (▲ ) or des-
cending (▼ ) order.
4. Click Save and close.
You can import another user's column configuration to use for your own exports.
315
User Guide
You can export a column configuration so that other examiners can use it in their own exports.
316
User Guide
In AXIOM Examine, you can merge a portable case into your case. Merging a portable case
allows you to import tags and comments (including those applied in the Timeline explorer),
media categorizations, and profiles that other stakeholders have added to the portable case,
and combine them with your own notes in the case.
Note: You can't merge two portable cases together. The portable case must be merged with
the original case it was created from.
317
User Guide
To learn more about exporting evidence for use in Magnet REVIEW, see Export evidence for
Magnet REVIEW.
Export tags and comments is only for evidence sources that were created in Magnet AXIOM.
If your case contains evidence sources from different forensic tools, Magnet REVIEW will
only export the tags and comments for Magnet AXIOM sources.
l Tags
o A reference list of all items that were tagged.
o A list of the tags included in the case.
l Comments
o A reference list of all items that have comments applied.
o All public comments for each item.
How tags and comments from Magnet REVIEW appear in AXIOM Examine
Magnet REVIEW exports all tag and comment content. However, you can refine what is impor-
ted into AXIOM Examine through the import process, including which tags or comments you
would like to include.
Tags imported into AXIOM Examine will not include the username that assigned the tag.
However, comments will include the username that created the comment as well as the date/-
time.
318
User Guide
319
User Guide
Image hashing
AXIOM Process can calculate a hash value for each evidence source that's being acquired as
an E01 or AFF4. This hash value acts like a digital fingerprint for the image, and you can use it
to verify that the file has not been tampered with. Hash verification information gets written to
the Case Information.txt and .xml files. You can include Image hash verification results in the
case dashboard's scan summary in AXIOM Examine. By default, creating hash values for
images is turned off.
If hash verification fails for an AFF4 logical image, the Case Information.txt file lists the files
that the verification fails on, but omits the actual hash values for the failed files. To see the
hash values for the failed files, refer to the Case Information.xml file.
When image hashing is enabled, hash verification information gets written to the Case Inform-
ation.txt and .xml files. You can also include the image hash verification results in the case
dashboard's scan summary in AXIOM Examine. Hash verification results are available for E01
and AFF4 images only.
320
User Guide
If your agency requires that you use AXIOM Process through a proxy server, you can still use
AXIOM Cloud to acquire users' accounts for the following platforms: Box.com, Dropbox, Face-
book, Google, Instagram, Lyft, Mega, Microsoft, and Lyft. When AXIOM Process detects a proxy
internet connection, it automatically connects to the server using the proxy settings on your
computer or prompts you to type your credentials for the server if applicable.
Note: AXIOM Process currently supports HTTP proxies and not SOCKS4/5 proxies.
321
User Guide
By default, AXIOM Process deduplicates artifact results in your case to help reduce the amount
of data you need to examine.
As part of the deduplication process, AXIOM Process looks at the essential information frag-
ments for each artifact and the source of the artifact (the source representing where the data is
found and is presented by the Source column in AXIOM Examine), and then assigns a unique
value to the artifact. When AXIOM Process encounters a duplicate of an existing unique value,
only the first artifact with a unique value is kept. Other artifacts with the identical unique value
are discarded as duplicates. For example, with pictures, the unique value is based on the hash
of picture. If two pictures are found with the same hash and source, they would be dedu-
plicated.
While parsed hits are always kept (they always have a different source), AXIOM Process will dis-
card duplicates of the hit with the same unique value that were recovered through carving
(carved hits will often be incomplete and contain only partial data).
322
User Guide
If an identical artifact is found in two different locations (i.e. the source is different),
AXIOM Process will not discard the artifact from one location. AXIOM Process treats each path
as a unique source, so the artifact will appear in both locations. For example, if an identical pic-
ture is discovered in two different places—a downloads folder and a temp folder—the artifact
wouldn't be discarded as a duplicate from one location.
For deleted files recovered from unallocated space, only the first artifact with a unique value is
kept. If the same artifacts are found in unallocated space on different drives, both artifacts are
kept because the sources are different.
For searches of NTFS and FAT file systems, AXIOM Process will automatically deduplicate res-
ults from unallocated space if they are covered by a range of space that's occupied by a known
deleted file. Only the deleted file hit with an existing $MFT record will be shown in
AXIOM Examine. If no $MFT record exists, the hit will be carved from unallocated space.
In AXIOM Process, you can manually set the number of cores that you want to use:
323
User Guide
Note: Adding additional cores does not improve performance in a linear way. The more cores
that your system has, the more work it is for RAM to keep each core busy with new instruc-
tions to process. As the number of cores increases, the returns on performance diminish.
Whereas increasing the number of cores from 4 to 8 will yield significant improvements,
increasing from 8 to 16 has a less noticeable effect. After 8 cores, the easiest way to
improve performance is by increasing clock speed.
l Make sure you have enough space to store the data. Each picture needs approx-
imately 8 KB of space to store the data that Magnet.AI produces.
l Store your case files on an SSD rather than a fixed or external drive. While
Magnet.AI can analyze pictures stored on fixed or external drives, performance will
not be as efficient.
l Use a computer with a GPU. When you build picture comparison using Magnet.AI, if
AXIOM Process detects a GPU on your computer with more than 126 MB of free
memory, it automatically attempts to use it. Using a GPU instead of a CPU can sig-
nificantly decrease the time it takes to build picture comparison.
For recommended system requirements, review the System requirements: Magnet AXIOM and
Optimize the performance of Magnet AXIOM articles in the Support Portal.
324
User Guide
When AXIOM Process or AXIOM Examine restarts, the additional features will be available. If
both AXIOM Process and AXIOM Examine are open when you change the setting, you must
restart both applications to use the additional features.
Integrate Magnet Hash Sets Manager with AXIOM Process or AXIOM Examine
You can Find matching hashes using Magnet Hash Sets Manager with AXIOM Process and
AXIOM Examine to upload and manage multiple hash sets in a single centralized database.
325
User Guide
You can specify the size of the image segments that you want AXIOM Process to create when
it acquires evidence from Android and drive images. Each option represents a different size
that reflects its storage capabilities. By default, image segmentation is turned off.
AXIOM Process can create hash values for each evidence source that it acquires. By default,
image hashing is turned off.
326
User Guide
AXIOM Process can create a hash value for acquired E01 images and compare it to the hash
value of the source image. This process verifies that the image has not been altered. Hash veri-
fication information gets written to the Case Information.txt and .xml files. By default, image
hash verification is turned off.
Compress images
You can compress the E01 images that AXIOM Process acquires. The Fast option provides
some compression in a reasonable amount of time. The Best option provides the best possible
compression, but can take much longer than the fast option. By default, image compression is
turned off.
While AXIOM Process acquires evidence from Android devices, it installs an agent application
onto the device to assist with recovering data. When the scan completes, AXIOM Process can
remove the agent application from the device. By default, the agent application is left on the
device.
327
User Guide
Sometimes, AXIOM Examine does not apply the correct encoding to an item, which causes
some characters to become difficult to read. You can choose to change the encoding for a
single item, a collection of items, or a whole artifact on a per-attribute basis.
1. In AXIOM Examine, in the Artifacts explorer, select the items you want to change
character encodings for.
2. Right-click the selected items and click Change encoding.
3. Select your desired encoding settings from the drop-down lists, and then click Okay.
You can revert your case view in AXIOM Examine back to what you see when you first open a
case. Resetting your case view forces AXIOM Examine to revert any viewing customizations
you set, such as collapsed or expanded information and applied filters.
Although you can use any explorer to browse the evidence in your case, by default,
AXIOM Examine opens the Case dashboard explorer. You can change your default explorer.
328
User Guide
By default, AXIOM Examine opens the Column view. You can change your default view.
Change the default explorer for the Relative date / time and Similar pictures filters
By default, when you apply the Relative date / time filter, AXIOM Examine displays the results in
the Timeline explorer. When you find similar pictures, AXIOM Examine automatically displays
the results in the Media explorer. You can change these settings to display the results in
another explorer, or choose the Current explorer option to display the filtered results in the
explorer where you begin the query.
When you save files from your case to a file / folder, you can set AXIOM Examine to export
them in a flat structure with all files in a single folder or maintain the folder structure of the
329
User Guide
original evidence source. Choose to maintain the original folder structure if your investigation
requires that you preserve all time stamps and file locations.
You can allow users to connect to the internet using links in the Preview card. By default, this
option is turned off to prevent users from attempting to navigate to websites that might not be
secure, or that they might not be authorized to access.
When you view videos in the Media explorer, you can hover your mouse over a thumbnail to
scroll through a preview of the video.
When you view media in the Artifacts explorer in thumbnail view, you can hover your mouse
over a thumbnail to view a larger preview.
330
User Guide
When you tag email evidence in the Email explorer, AXIOM Examine can automatically tag
emails and attachments together.
By default, AXIOM Examine runs in light mode. You can switch to dark mode to reduce eye
strain when you spend long periods of time examining evidence.
Changing the display language for AXIOM Process also changes the display language for
AXIOM Examine (and the other way around).
331
User Guide
You can select a time zone to use as the default time zone in your cases.
1. In AXIOM Examine, on the Tools menu, click Manage date / time format.
2. In the Time zone drop-down list, click the time zone you want to default to.
3. Select Set this time zone as the default for all cases.
4. Click Okay.
Some explorers in AXIOM Examine require you to build them in each case. You can also adjust
your settings so that AXIOM Examine automatically builds them after your case has been pro-
cessed.
Turn on Software rendering mode to reduce crashes with an outdated GPU or video driver
By default, AXIOM Examine runs in Hardware rendering mode. When AXIOM Examine detects a
crash related to rendering, it will automatically turn on Software rendering mode to avoid a sim-
ilar crash. We don't recommend running AXIOM Examine in Software rendering mode long-
term. Make sure that you update your drivers and Windows to the latest versions. After com-
pleting these updates, turn off Software rendering mode.
For more information about Software rendering mode, log in to the Customer Portal to read the
following article: Running AXIOM Examine in Software rendering mode.
332
User Guide
By default, the features of AXIOM Cyber are optimized to best support and streamline enter-
prise investigations. You can turn on additional features related to media grading and cat-
egorization.
When AXIOM Process or AXIOM Examine restarts, the additional features will be available. If
both AXIOM Process and AXIOM Examine are open when you change the setting, you must
restart both applications to use the additional features.
Configure Find matching hashes using Magnet Hash Sets Manager to synchronize hash sets
across each workstation running AXIOM.
333
User Guide
Configure the Magnet Prague beta to search for matching identifiers in your team's cases. To
learn more about Magnet Prague, log in to the Support Portal to read the article Search for iden-
tifier matches in AXIOM using Magnet Prague.
Tip: If you are connecting to Magnet Prague on the same computer where you
installed it, the default settings are:
l Server address: 127.0.0.01
l Port number: 18443
Configure AXIOM Examine to be able to upload evidence directly from your case to Magnet
REVIEW. You only need to do this configuration once for each instance of Magnet AXIOM.
334
User Guide
If you're working on a computer without internet access, you can connect to an offline map
server that your organization has set up.
Note: To learn more and troubleshoot connection issues, sign in to the Support Portal to view
the article Connecting to an offline map server.
335
User Guide
For more information about the types of issues that may occur, their impact, and what actions
investigators can take to further investigate the reported exceptions, sign in to the Support
Portal to read the following article: AXIOM Process scan exceptions.
Note: The source.log file will be overwritten if you add new evidence to an existing case. If
you want to preserve the results of the previous scan, rename the source.log (for example:
scan1.log), or save a copy of the source.log to a folder that is different to the case folder.
336
User Guide
KEYBOARD SHORTCUTS IN
AXIOM EXAMINE
Keyboard shortcuts allow you to complete actions by using a key or a combination of keys
instead of your mouse.
CTRL + C Copy
CTRL + V Paste
CTRL + X Cut
SPACEBAR Click a button, select a check box, select an option or apply the
Bookmark tag (depending on active user interface control)
337
User Guide
PLUS SIGN (+) Set all visible uncategorized pictures in Thumbnail view to a
media category you choose
ALT + Number Switch between explorers. View the number that corresponds
to each explorer in the explorer drop-down list.
ALT + SHIFT + Number Switch between views (for example, Conversation view,
Column view, and so on). View the number that corresponds to
each view in the view drop-down list.
ALT + Down arrow Expand or collapse Tags, profiles & media categories Tags,
comments & profiles
338
User Guide
Only recent versions support incremental updates. If you're running a version that is more than
six months old, you must download the entire update from the Customer Portal.
1. In AXIOM Process or AXIOM Examine, on the Help menu, click Check for updates.
2. Copy the download link from the Check for updates window.
3. On a computer that is connected to the internet, open a web browser and paste the
link into the address bar.
4. Download the .zip file.
5. Copy the .zip file to a storage device such as a USB key.
6. Connect the USB key to the offline computer and extract the contents of the .zip file.
7. Double-click the installer and follow the instructions in the setup wizard.
339
User Guide
340
User Guide
LEARN MORE
Before you set up AXIOM Process and run your first scan, watch some of these videos to get a
better understanding of the tools and workflow.
Discover how to use AXIOM Process to acquire and analyze all of your evidence in a single
stage by queuing up multiple sources such as computers and smartphones. Select the artifacts
you want to search for and customize the options you want to include.
WATCH
341
User Guide
Learn how to navigate through evidence using the File system and Registry explorers. You will
also learn about key features and methods to search in the Artifacts explorer.
WATCH
Source linking between the Artifacts, File system, and Registry explorers
With the added functionality of the Artifact, File system, and Registry explorers, source linking
provides you a way to quickly navigate between these views without having to click through
large file and folder structures. Source linking saves you time and helps you verify the artifacts
and dig deeper into the raw data.
WATCH
342
User Guide
This video shows the various ways you can view evidence. Learn how to use the Chat threading,
Classic, Column, Histogram, Row, Thumbnail, Timeline, and World Map views to present data in
a way that makes sense to your examination.
WATCH
Learn how you can use filter stacking to narrow the amount of data you need to analyze and
minimize the scope of your investigation.
WATCH
343
User Guide
You can customize your exports directly in AXIOM Examine to cut down on any editing you
have to do on the exports after you generate them. You can also use tags and comments to
organize and explain your findings to all of your stakeholders.
WATCH
Often there are many people involved in an investigation who you need to share your findings
with. Portable case enables you to share your data with other stakeholders such as lawyers or
investigators who can work with you by adding their own tags, comments, and profiles to assist
with the investigation. You can also merge their data back into the main case.
WATCH
344
User Guide
Information in this document is subject to change without notice. The software described in
this document is furnished under a license agreement or nondisclosure agreement. The soft-
ware may be used or copied only in accordance with the terms of those agreements. No part of
this publication may be reproduced, stored in a retrieval system, or transmitted in any form or
any means electronic or mechanical, including photocopying and recording for any purpose
other than the purchaser's personal use without the written permission of Magnet Forensics.
Magnet Forensics
1 (519) 342-0195
345