Replies: 3 comments 11 replies
-
You can set up a server monitoring artifact to view all completed collections - you can see an example of such a thing here https://docs.velociraptor.app/artifact_references/pages/elastic.flows.upload/ which actually uploads the data. You can also see all the initiated collections and hunt in the audit log (and forward it to another system or maybe slack or discord in real time). All audit events are sent on this artifact https://docs.velociraptor.app/artifact_references/pages/server.audit.logs/ so you can monitor it with |
Beta Was this translation helpful? Give feedback.
-
So I mean the OS system administrators of the endpoint machines running Velociraptor clients - not the Velociraptor administrators. Even if forwarding to Elastic was set up, there would need some way to ensure they only have visibility to the data from their endpoints. |
Beta Was this translation helpful? Give feedback.
-
For some more context here is an example of a concern sysadmins have. There may be something running on their endpoint that shells out and puts sensitive information on the command line and I have done a quick implementation djoreilly@2ede58e |
Beta Was this translation helpful? Give feedback.
-
Sometimes system admins need to know what is being collected by Velociraptor on their endpoints. They would like to be able to verify that no sensitive data is being sent to the server. Maybe a client side option that would write the VQL responses to JSON files.
Beta Was this translation helpful? Give feedback.
All reactions