Quantcast
Channel: Magnet Forensics
Viewing all articles
Browse latest Browse all 1190

Remotely Collect Data from Linux

$
0
0

While Windows dominates desktop and server OS market share, Linux is not to be overlooked, especially when it comes to servers. And typically, the type of data that resides on Linux servers is highly sensitive or confidential information—intellectual property, personally identifiable information, customer information, credentials, and more—all of which are the targets of cyberattacks.

And consider workforces are now spread out all over the world. Employees are working from home, “devices” are virtual and they’re in the cloud, offices and networks are geographically dispersed. The need to remotely collect data from target endpoints has never been greater.

Linux Remote Acquisition

Magnet AXIOM Cyber supports the remote collection of data from Windows, macOS, and Linux operating systems. For Linux remote acquisition specifically, AXIOM Cyber supports remote collection of target endpoints (desktop devices and servers) running Linux. Supported Linux distributions include:

  • RedHat Linux 8
  • CentOS 8
  • Amazon Linux 2
  • Ubuntu
https://youtu.be/Hob7bWTcAbc

Linux Targeted Locations

To speed up remote acquisitions, only collect the data that you need by choosing preconfigured, targeted locations that leverages Linux artifacts supported by AXIOM Cyber. Or if you’d rather build your own custom targeted locations, you can do that too!

Looking for a handy reference on Linux artifacts and where to find them? We’ve got you covered: download the Linux Targeted Locations Quick Reference Guide today.

If you haven’t tried AXIOM Cyber and would like to try it for yourself, request a trial today.

The post Remotely Collect Data from Linux appeared first on Magnet Forensics.


Viewing all articles
Browse latest Browse all 1190

Trending Articles