Skip to content

Evidence Acquisition Data Flow in AIR

This article explains the end-to-end evidence acquisition data flow in AIR, covering how evidence moves from asset collection through to the Investigation Hub. Understanding this flow helps administrators plan network configurations, storage capacity, and firewall rules for their self-hosted deployments.

The evidence acquisition data flow involves four main components:

ComponentRole
AIR ConsoleCentral management server that creates tasks, coordinates Responders, and hosts the Investigation Hub
ResponderLightweight agent installed on assets that executes acquisition tasks and collects evidence
Evidence RepositoryRemote storage destination (SMB, SFTP, FTPS, AWS S3, Azure Blob, or GCS) for collected evidence
DRONEAutomated analysis engine that processes collected evidence and generates findings

An investigator creates an acquisition task through the AIR Console. The task definition includes:

  • Target assets — one or more assets with an installed Responder
  • Acquisition profile — defines which evidence types to collect (e.g., Quick, Full, Compromise Assessment, or a custom profile)
  • Policy — determines where evidence is stored (local or Evidence Repository), resource limits (CPU, bandwidth, disk), and compression/encryption settings
  • DRONE analysis — whether to enable automated analysis during or after collection

The Console distributes the task to each target asset’s Responder:

  • Primary channel (TCP 443): Responders maintain a persistent connection to the Console on port 443 (or 8443 if configured) and poll for new task assignments.
  • Real-time push (TCP 4222): For immediate task delivery, the Console pushes task notifications to Responders via NATS on port 4222. This ensures assets receive tasks without waiting for the next polling interval.
  • Relay Server: In segmented network environments, a Relay Server acts as an intermediary between Responders and the Console, forwarding task assignments and evidence metadata across network boundaries.

Once the Responder receives the task, it executes the acquisition on the asset:

  1. The Responder parses the task details and acquisition profile to determine which evidence types to collect.
  2. Evidence is collected from the asset’s file system, memory, network state, event logs, applications, and other sources as defined by the profile.
  3. Collected data is organized into a directory structure under the Cases folder on the asset.
  4. SHA-256 hashes are generated for all collected files to maintain chain of custody integrity.
  5. Evidence is packaged into a compressed archive (.zip) containing a .ppc (Protected Package Container) file.
  6. If encryption is enabled in the policy, the archive is encrypted with AES-256.
  7. An RFC 3161 timestamp certificate is obtained from a Trusted Timestamp Authority (TSA) to cryptographically prove the exact time of collection.

After collection, evidence is transferred according to the storage destination configured in the policy:

Evidence remains on the asset in the Cases folder. The default paths are:

PlatformDefault Path
WindowsC:\Binalyze\AIR\Cases
Linux/opt/binalyze/air/Cases
macOS/opt/binalyze/air/Cases

Investigators can retrieve evidence using interACT or any remote management tool.

Evidence is uploaded directly from the asset to the Evidence Repository. The upload does not route through the AIR Console. The supported repository types are:

Repository TypeDefault Port
SMB445
SFTP22
FTPS21
AWS S3443 (HTTPS)
Azure Blob Storage443 (HTTPS)
Google Cloud Storage443 (HTTPS)

After a successful upload, evidence is removed from the asset’s local storage.

When Direct Collection is enabled in the policy, the Responder streams evidence directly to the Evidence Repository during collection, minimizing local disk usage. Approximately 100 MB of temporary data is stored in the Cases folder during the upload process and is automatically deleted upon completion.

If DRONE is enabled for the task, automated analysis runs against the collected evidence:

  • Responder-side analysis: DRONE analyzers execute on the asset during or immediately after evidence collection. This includes live-asset analyzers such as the MITRE ATT&CK Analyzer, which scans running processes and filesystem locations.
  • Server-side analysis: DRONE processors run on the AIR Console against the stored evidence (PPC files). This mode does not require a live connection to the asset and can be triggered at any time after collection, including for imported off-network evidence.

DRONE classifies each finding with a severity level — High, Medium, Low, or Matched — based on its analysis pipelines, YARA rules, Sigma rules, and keyword logic.

All collected evidence and DRONE findings are presented in the Investigation Hub, which serves as the unified workspace for investigation:

  • Parsed evidence is displayed in a structured, human-readable format.
  • DRONE findings are prioritized by severity to accelerate triage.
  • Hash values for all collected files are available for export.
  • RFC 3161 timestamp certificates can be downloaded to verify chain of custody.
  • Evidence can be browsed using File Explorer (for assets with local storage) or Repository Explorer (for Evidence Repositories).

The following table summarizes the key network communication paths involved in the acquisition data flow:

SourceDestinationPortPurpose
ResponderConsoleTCP 443Task polling, status reporting, metadata
ConsoleResponderTCP 4222Real-time task push (NATS)
ResponderEvidence RepositoryVaries by typeDirect evidence upload
ConsoleEvidence RepositoryVaries by typeFile Explorer / Repository Explorer access
UserConsoleTCP 443 / 8443Web UI access, task creation, Investigation Hub
ConsoleTSA ServerTCP 443RFC 3161 timestamp requests

Key Considerations for Self-Hosted Deployments

Section titled “Key Considerations for Self-Hosted Deployments”
  • Storage planning: Estimate storage capacity based on the number of assets, acquisition frequency, and the evidence types collected. Full acquisition profiles generate significantly more data than Quick profiles.
  • Network bandwidth: Evidence uploads from assets to Evidence Repositories can be bandwidth-intensive, especially during large-scale acquisitions. Use the bandwidth limit setting in Policies to control upload rates.
  • Firewall rules: Ensure that assets can reach both the Console (TCP 443 and 4222) and the Evidence Repository (on the relevant protocol port). The Console must also access the Evidence Repository for File Explorer functionality.
  • DRONE resource usage: Server-side DRONE analysis runs on the Console and may increase CPU and memory usage during processing. Plan Console hardware capacity accordingly.