Use the data collection functions to collect forensic information from a remote Microsoft Windows or Linux machine and use it for your incident response processes. When you execute these collection functions, BlueApp for LevelBlue Forensics and Response retrieves and ingests data for analysis in USM Anywhere. It produces an for each completed function and you can review the information on the Events page. See Viewing Forensics and Response Events and Alarms for more information about accessing these events. Some of the most common functions are available as a singular query action. See the following table for details. For other functions, you can use the Launch Query action to specify the parameters and execute the function for an asset.
Important: These functions require that the target assets have assigned credentials that are suitable for system-level access to the host. See Configuring the BlueApp for LevelBlue Forensics and Response for more information.
System FunctionOperating SystemCollected DataActions
Get System InfoWindowsInformation about the target system, including the operating system version, network interfaces, and hotfixes.

To execute this function using the Launch Query action, specify getSystemInfo as the Query parameter.
Basic Forensic Info

Moderate Forensic Info

Full Forensic Info
Get UsersWindows and LinuxA list of the local accounts in the target system, including privileges and the last login time.

To execute this function using the Launch Query action, specify getUsers as the Query parameter.
Basic Forensic Info

Moderate Forensic Info

Full Forensic Info
Get Running ServicesWindows and Linux (non-RHEL)A list of all currently running services on the target system.

To execute this function using the Launch Query action, specify getRunningServices as the Query parameter.
Basic Forensic Info

Moderate Forensic Info

Full Forensic Info
Get Running Services RedHatLinux (RHEL only)A list of all currently running services on the target system.

To execute this function using the Launch Query action, specify getRunningServices.rhel as the Query parameter.
Get ServicesWindowsA list of all services on the target system.

To execute this function using the Launch Query action, specify getServices as the Query parameter.
Moderate Forensic Info

Full Forensic Info
Get SMB SessionsWindowsInformation about the Server Message Block sessions that are currently established on the target system.

To execute this function using the Launch Query action, specify getSMBSessions as the Query parameter.
Basic Forensic Info

Moderate Forensic Info

Full Forensic Info
Get TCP Listening PortsWindows and LinuxA list of the listening TCP ports on the target system.

To execute this function using the Launch Query action, specify getTCPListeningPorts as the Query parameter.
Basic Forensic Info

Moderate Forensic Info

Full Forensic Info
Get UDP Listening PortsWindows and LinuxA list of the listening UDP ports on the target system.

To execute this function using the Launch Query action, specify getUDPListeningPorts as the Query parameter.
Basic Forensic Info

Moderate Forensic Info

Full Forensic Info
Get Established ConnectionsWindows and LinuxA list of the opened connections on the target system, including information about the port and the address.

To execute this function using the Launch Query action, specify getEstablishedConnections as the Query parameter.
Basic Forensic Info

Moderate Forensic Info

Full Forensic Info
Get Installed ApplicationsWindowsA list of the applications installed on the target system.

To execute this function using the Launch Query action, specify getInstalledApplications as the Query parameter.
Basic Forensic Info

Moderate Forensic Info

Full Forensic Info
Get Logged On UsersWindowsA list of the user accounts that are currently logged in to the target system.

To execute this function using the Launch Query action, specify getLoggedOnUsers as the Query parameter.
Basic Forensic Info

Moderate Forensic Info

Full Forensic Info
Get Network ConfigurationWindowsA list of the active network interfaces on the target system and their properties, including IP addresses and information.

To execute this function using the Launch Query action, specify getNetConfig as the Query parameter.
Moderate Forensic Info

Full Forensic Info
Get AntivirusWindowsInformation about antivirus tools installed on the target system, including the status.

To execute this function using the Launch Query action, specify getAntivirus as the Query parameter.
Moderate Forensic Info

Full Forensic Info
Get Start Up ItemsWindowsAn enumerated list of autorun artifacts on the target system that may be used by legitimate programs or malware to achieve persistence.

To execute this function using the Launch Query action, specify getStartUpItems as the Query parameter.
Moderate Forensic Info
Get All Start Up ItemsWindowsA complete, enumerated list of autorun artifacts on the target system that may be used by legitimate programs or malware to achieve persistence.

To execute this function using the Launch Query action, specify getStartUpItemsAll as the Query parameter.
Full Forensic Info
Get ProcessesWindows and LinuxA list of processes running on the target system.

To execute this function using the Launch Query action, specify getProcesses as the Query parameter.
Basic Forensic Info
Get Processes With HashesWindowsA list of processes running on the target system, along with the associated hash.

To execute this function using the Launch Query action, specify getProcessesWithHashes as the Query parameter.
Moderate Forensic Info

Full Forensic Info
Get SharesWindowsA list of the shared folders on the target system.

To execute this function using the Launch Query action, specify getShares as the Query parameter.
Moderate Forensic Info

Full Forensic Info
Get Mapped DrivesWindowsA list of the mapped drives on the target system.

To execute this function using the Launch Query action, specify getMappedDrives as the Query parameter.
Moderate Forensic Info

Full Forensic Info
Get Scheduled TasksWindows and LinuxA list of the scheduled tasks on the target system (malware often creates scheduled tasks to maintain persistence).

To execute this function using the Launch Query action, specify getScheduledTasks as the Query parameter.
Moderate Forensic Info

Full Forensic Info
Get Scheduled JobsWindowsA list of the scheduled jobs on the target system (malware often creates scheduled jobs to maintain persistence).

To execute this function using the Launch Query action, specify getScheduledJobs as the Query parameter.
Moderate Forensic Info

Full Forensic Info
Get Installed HotfixesWindowsA list of the hotfixes installed on the target system.

To execute this function using the Launch Query action, specify getInstalledHotfixes as the Query parameter.
Moderate Forensic Info

Full Forensic Info
Get Recent USB DrivesWindowsA list of the USB devices recently used on the target system.

To execute this function using the Launch Query action, specify getRecentUSBDrives as the Query parameter.
Moderate Forensic Info

Full Forensic Info
Get Shadow CopiesWindowsA list of shadow copies on the target system.

Shadow copies are used to perform manual or automatic backup copies or snapshots of computer files or volumes.

To execute this function using the Launch Query action, specify getShadowCopies as the Query parameter.
Moderate Forensic Info

Full Forensic Info
Get Restore PointsWindowsA list of the restore points available on the target system.

To execute this function using the Launch Query action, specify getRestorePoints as the Query parameter.
Moderate Forensic Info

Full Forensic Info
Get Prefetch FilesWindowsA list of the prefetch files on the target system.

Windows creates a prefetch file when an application runs from a particular location for the very first time.

To execute this function using the Launch Query action, specify getPrefetchFiles as the Query parameter.
Moderate Forensic Info

Full Forensic Info
Get DNS CacheWindowsA list of the contents of the DNS client cache on the target system.

To execute this function using the Launch Query action, specify getDNSCache as the Query parameter.
Moderate Forensic Info

Full Forensic Info
Get Failed DNSWindowsA list of the 50 most recent DNS resolutions that failed on the target system.

To execute this function using the Launch Query action, specify getFailedDNS as the Query parameter.
Moderate Forensic Info

Full Forensic Info
Get EventLog InfoWindowsA list of all the event log sources on the target system, including the size and last modification time.

To execute this function using the Launch Query action, specify getEventLogInfo as the Query parameter.
Moderate Forensic Info

Full Forensic Info
Get Firewall ConfigWindowsThe firewall configuration on the target system.

To execute this function using the Launch Query action, specify getFirewallConfig as the Query parameter.
Moderate Forensic Info

Full Forensic Info
Get Audit PolicyWindowsThe local audit policy information on the target system.

To execute this function using the Launch Query action, specify getAuditPolicy as the Query parameter.
Moderate Forensic Info

Full Forensic Info
Get IE HistoryWindowsThe history from Internet Explorer on the target system, including a list of recently visited web sites.

To execute this function using the Launch Query action, specify getIEHistory as the Query parameter.
Moderate Forensic Info

Full Forensic Info
Get Typed URLsWindowsA list of the most recent URLs typed by the user in Internet Explorer on the target system.

To execute this function using the Launch Query action, specify getTypedURLs as the Query parameter.
Moderate Forensic Info

Full Forensic Info
Get Event Tracing for Windows (ETW) SessionsWindowsA list of the running Microsoft Event Tracing for Windows (ETW) sessions on the target system.

To execute this function using the Launch Query action, specify getETWSessions as the Query parameter.
Moderate Forensic Info

Full Forensic Info
Get Windows Defender InformationWindowsInformation about Windows Defender on the target system.

To execute this function using the Launch Query action, specify getWindowsDefenderStatus as the Query parameter.
Moderate Forensic Info

Full Forensic Info
Get DriversWindowsA list of drivers on the target system, including the location, hash, and digital signature.

To execute this function using the Launch Query action, specify getDrivers as the Query parameter.
Full Forensic Info
Get Recently Created FilesWindowsA list of files created on the target system within the last 24 hours.

To execute this function using Launch Query action, specify getRecentlyCreatedFiles as the Query parameter.
Full Forensic Info
Get Recent DLLsWindowsA list of DLLs created on the target system within the last 24 hours.

To execute this function using the Launch Query action, specify getRecentDLLs as the Query parameter.
Full Forensic Info
Get Recent LinksWindowsA list of the link files created on the target system within the last seven days.

To execute this function using the Launch Query action, specify getRecentLinks as the Query parameter.
Full Forensic Info
Get Recent ExecutablesWindowsA list of executable files created on the target system within the last 24 hours.

To execute this function using the Launch Query action, specify getRecentExecutables as the Query parameter.
Full Forensic Info
Get Compressed FilesWindowsA list of the compressed files created on the target system within the last seven days.

To execute this function using the Launch Query action, specify getCompressedFiles as the Query parameter.
Full Forensic Info
Get Encrypted FilesWindowsA list of the encrypted files created on the target system within the last seven days.

To execute this function using the Launch Query action, specify getEncryptedFiles as the Query parameter.
Full Forensic Info
Get DownloadsWindowsA list of the downloaded files created on the target system.

To execute this function using the Launch Query action, specify getDownloads as the Query parameter.
Full Forensic Info
Get Windows Defender DetectionsWindowsInformation about threats on the target system detected by Windows Defender.

To execute this function using the Launch Query action, specify getWindowsDefenderDetections as the Query parameter.
Full Forensic Info