Skip to content

Responder Exception Rules for EPP and EDR

Allow-listing is required for XDR Forensics responders to run acquisition tools, write temporary artifacts, and access protected areas of the file system. Without explicit exclusions in your Endpoint Protection Platform (EPP), Endpoint Detection and Response (EDR), or antivirus solution, these routine activities can trigger false positives and interrupt evidence collection.

Use the tables below to add the recommended folder and binary exclusions for each supported operating system. Choose the entries that match your deployment to keep responders running without false positives.

  • C:\Program Files\Cisco\Forensics\AIR\
  • C:\ProgramData\.cisco-forensics
  • C:\Program Files\Cisco\Forensics\AIR\AIR.exe
  • C:\Program Files\Cisco\Forensics\AIR\DRONE.exe
  • C:\Program Files\Cisco\Forensics\AIR\Tactical.exe
  • C:\ProgramData\.cisco-forensics\WATCHDOG.exe
  • C:\Program Files\Cisco\Forensics\AIR\utils\curl.exe
  • C:\Program Files\Cisco\Forensics\AIR\utils\osqueryi.exe
  • /opt/cisco/forensics/air/
  • /usr/share/.cisco-forensics/
  • /opt/cisco/forensics/air/air
  • /opt/cisco/forensics/air/drone
  • /opt/cisco/forensics/air/tactical
  • /opt/cisco/forensics/air/utils/osqueryi
  • /opt/cisco/forensics/air/utils/curl
  • /usr/share/.cisco-forensics/watchdog
  • /opt/cisco/forensics/air/
  • /usr/local/share/.cisco-forensics/
  • /opt/cisco/forensics/air/air
  • /opt/cisco/forensics/air/drone
  • /opt/cisco/forensics/air/tactical
  • /opt/cisco/forensics/air/utils/osqueryi
  • /opt/cisco/forensics/air/utils/curl
  • /usr/share/.cisco-forensics/watchdog