Showing results for 
Search instead for 
Did you mean: 

Custom Collectors - Anyone writing any?

We are evaluating the value add of Active Response, so far we can see some value, but are wanting to know of others experiences and thoughts. Granted it is still 1.x, but the EDR (EDTR) market is growing rapidly.  My goal is to empower my Incident Responders to be able to search the environment on the fly for suspect IOC's.

  • Who clicked the link in the phishing email?
  • Who opened the attachment in the phishing email?
  • Which systems have file by SHA1?
  • Provide me a drive mapping?
  • Gather select files from endpoint (securely)

I know some of these are unrealistic at this time, but was curious if anyone who owns, or is performing an evaluation has crafted any custom collectors ad are willing to share.

Are the moderators planning on supporting a community section dedicated to custom collectors?

More McAfee Tools to Help You
  • Subscription Service Notification (SNS)
  • How-to: Endpoint Removal Tool
  • Support: Endpoint Security
  • eSupport: Policy Orchestrator
  • Community Help Hub

      New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.

    • Find Forum FAQs
    • Learn How to Earn Badges
    • Ask for Help
    Go to Community Help

    Join the Community

      Thousands of customers use the McAfee Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership:

    • Get helpful solutions from McAfee experts.
    • Stay connected to product conversations that matter to you.
    • Participate in product groups led by McAfee employees.
    Join the Community
    Join the Community