Using InstaQuery to analyze artifact data
InstaQuery is an
Opticsfeature that allows you to analyze artifact data to discover indicators of compromise and to determine their prevalence on your organization’s devices. The results of a query will not tell you about how or when an artifact was used, but they will indicate whether an artifact has ever been observed in a forensically significant way that can signal a threat to your organization’s devices and data.
InstaQuery allows you to interrogate a set of devices about a specific type of forensic artifact, and allows you to determine whether an artifact exists on devices and how common that artifact is.
After you install and enable the
Opticsagent on a device, the agent collects artifacts and stores them in the
Opticsagent 2.x and earlier, the database is stored locally on the device. With
Opticsagent 3.0 and later, the agent automatically uploads and stores data in the
Opticscloud database. When you create a query, forensically significant data is retrieved from the
Opticsdatabase. You can view and explore the results in the management console.
For devices with
Opticsagent 2.x and earlier, a query can complete successfully only when a device is online. For devices with agent 3.0 and later, the device does not need to be online because the query will use the latest data available in the
A single query will display and retain a maximum of 10,000 results. The results of a query are retained for 60 days.
Note the following details about specific artifacts that you can query:
You can query specific files that were created, modified, or deleted after the
Opticsagent was installed on the device.
Opticsfocuses on files that can be used to execute content (for example, executable files,
Microsoft Officedocuments, PDFs, and so on).
You can perform queries against both IPv4 and IPv6 destination IP addresses.
Opticsdiscards private, non-routable, multicast, link-local, and loopback network traffic.
All processes are indexed in the
Opticsdatabase, with the following restrictions:
Opticsmonitors only persistence points and file deletion points. They are areas typically exploited by malware.