Skip to content

Compare

The Compare feature enables proactive forensics through baseline analysis, allowing investigators to focus on forensic evidence from the earliest stages of an investigation. Using a patent-pending approach, it identifies and highlights forensic artifacts—added, modified, or deleted—between asset snapshots.

This analysis, completed in just 5 seconds, enhances security by addressing vulnerabilities before they can be exploited, without disrupting ongoing operations. The Compare feature supports both standard and offline acquisitions, providing detailed metadata to help investigators comprehensively understand potential security risks.
Compare analysis is performed directly on the Console, eliminating the need for direct access to assets.

The scope of baseline analysis is strategically based on areas commonly abused by attackers. These include:

macOSLinuxWindows
AutoLoadedProcsSystemSystem
ChromeExtensionsCronJobsNetworkAdapters
DiskEncryptionsDNSResolversHosts
ETCHostsHostsAutorunsServices
ETCProtocolsIPRoutesAutorunsRegistry
ETCServicesIPTablesAutorunsScheduledTasks
GatekeeperAppsKernelModulesAutorunsStartupFolder
InstalledAppsMountsInstalledApplications
KextInfoNetworkInterfacesDrivers
LaunchdOverridesSystemArtifactsFirewallRules
SipStatusUsers
SysExtInfo
  1. Select the Asset for analysis.

  2. Initiate Compare Task:

    • Navigate to ‘Compare’ under Asset Actions.

    Compare: Initiating Compare Analysis under Asset Actions

  3. Specify the Acquisitions to Compare

    • Specify two acquisitions to compare or create a new baseline by clicking “Acquire Baseline”.

    Compare: Selecting Acquisitions to Compare

  4. Review the Results

    • Once the task is complete, review the results DRONE report.

    Compare: Reviewing Results

    • Explore the fine-grained details on the property level.

    Compare: Explore items Added, Changed, Deleted

  5. Integrate with Investigations:

    • Leverage the insights gained from the comparison analysis to compare and inform ongoing digital investigations.

By incorporating Baseline Analysis with Compare into the DFIR process, you empower your team with a proactive and efficient approach to identifying and mitigating potential security risks. This feature is a valuable asset in maintaining a robust cybersecurity posture.