Configure, schedule and control scans on up to 25,000 end points per instance. ASGARD Management Center also features an IOC management as well as many response functions.
ASGARD Management Center is the perfect incident response platform. It not only lets you execute enterprise wide THOR scans. It also provides an easy to use interface for execution of complex response playbooks on up to one million endpoints – all from a single console.
ASGARD ships as hardened virtual appliance and features agents for Microsoft Windows, Linux, AIX, and MacOS.
Its rich API facilitates interoperation with SOAR frameworks, sandboxes, antivirus systems, SIEM systems, CMDBs, IPS devices – or in other words: with literally any security device you may have in place.
Single System Live Forensics
Evaluating SIEM or EDR events can be a tedious task. Analysts often have to decide whether to check off a warning or order a full forensic analysis. ASGARD allows you to run a live forensics scan on any connected endpoint, providing a deeper analysis, saving analysts time and costs.
Continuous Compromise Assessment
Compromise assessments provide an in-depth analysis including anomalies, suspicious elements and sometimes malicious activity. But this thorough analysis comes at a price: time and effort. In combination with the baselining features of our Analysis Cockpit, we limit the effort of every subsequent compromise assessment to a minimum.
A single ASGARD Management Center can control up to 25,000 endpoints – providing central scan control and response functions with a single click on all connected endpoints.
With Master ASGARD it is possible to control multiple ASGARD Management Centers – thus providing central management for more than one million endpoints in a single console. This also allows for multi-tenant architectures in which individual ASGARDs remain dedicated to one tenant while all ASGARDs share central scan control through Master ASGARD.
Built-in Response Playbooks
The built-in and easy to execute response and information gathering playbooks can be executed on single systems, groups of systems and also large scale on all connected endpoints.
The built-in response playbooks include:
- Memory collection
- File collection
- Registry collection
- Remote console (full cmd / shell)
Custom Response Playbooks
Our custom response playbooks help you orchestrate your specific responses. Prepare your individual response playbook with up to 16 consecutive steps.
A typical response playbook may look like this:
- Step 1: Quarantine endpoint on network level
- Step 2: Upload forensic toolset to endpoint
- Step 3: Execute forensic tools and generate output package
- Step 4: Download output package to ASGARD
- Step 5: Remove toolset and output package from endpoint
The ASGARD API facilitates integration with SOAR frameworks, SIEM systems, IOC feeds/providers (e.g. MISP, ….) and literally any piece of security infrastructure you have in place.
Typical use cases may include:
- Trigger THOR scan on system that caused alerts in IPS, SIEM, antivirus console, etc.
- Collect forensic evidence on endpoints
- Synchronize ASGARD assets with CMDB
- Drop suspicious samples into sandbox
Hard- and Soft Appliance
The hardened, Linux-based ASGARD appliance is a powerful, solid and scalable response platform with agents for Windows, Linux and macOS. It either ships as soft appliance or 1U hard appliance. All scale up to 25,000 endpoints. Together with the Master ASGARD appliance this gives you the ability to control more than one million endpoints from one console.
Automated Sandbox Analysis
ASGARD Management Center provides various options to collect suspicious files and drop them into the sandbox of your choice. Just start your scans with the Bifrost-option and all files that exceed a given score will be dropped into the sandbox seamlessly – or just navigate to the respective asset and start the “collect evidence playbook” for the file you want to send to the sandbox.
Optimized Analysis and Baselining
ASGARD Analysis Cockpit gives you full visibility on all your IOC matches, logs and sandbox reports. It allows you to set baselines and points you to security relevant changes in your environment.
This short demo shows how easy it is to launch a scan with custom IOCs from a connected MISP.
In the example we select all events with the keyword “Emotet”, add them to a new rule set and use that rule set in a new Group Scan with THOR.
This example shows some of the Remote Console features. You get a full console on the remote system. On Windows you can even run PowerShell to run more complex scripts. On Linux systems you get a local shell. All remote sessions get recorded and can be replayed in an integrated player.