Management Center

ASGARD Management Center is the perfect incident response platform. It not only lets you execute enterprise wide THOR scans. It also provides an easy to use interface for execution of complex response playbooks on up to one million endpoints – all from a single console.

ASGARD ships as hardened virtual appliance and features agents for Microsoft Windows, Linux, AIX, and MacOS.

Its rich API facilitates interoperation with SOAR frameworks, sandboxes, antivirus systems, SIEM systems, CMDBs, IPS devices – or in other words: with literally any security device you may have in place.

Single System Live Forensics

Evaluating SIEM or EDR events can be a tedious task. Analysts often have to decide whether to check off a warning or order a full forensic analysis. ASGARD allows you to run a live forensics scan on any connected endpoint, providing a deeper analysis, saving analysts time and costs. 


In today’s fast-paced threat landscape, we get numerous indicators of compromise (IOCs) from public reports, official entities, partners or sharing groups. ASGARD allwos you to quickly check end systems for a set of custom IOCs. It features MISP integration with a neat interface and supports manual STIX v2 imports.

Continuous Compromise Assessment

Compromise assessments provide an in-depth analysis including anomalies, suspicious elements and sometimes malicious activity. But this thorough analysis comes at a price: time and effort. In combination with the baselining features of our Analysis Cockpit, we limit the effort of every subsequent compromise assessment to a minimum. 


A single ASGARD Management Center can control up to 25,000 endpoints – providing central scan control and response functions with a single click on all connected endpoints.

With Master ASGARD it is possible to control multiple ASGARD Management Centers – thus providing central management for more than one million endpoints in a single console. This also allows for multi-tenant architectures in which individual ASGARDs remain dedicated to one tenant while all ASGARDs share central scan control through Master ASGARD.

Built-in Response Playbooks

The built-in and easy to execute response and information gathering playbooks can be executed on single systems, groups of systems and also large scale on all connected endpoints.

The built-in response playbooks include:

  • Memory collection
  • File collection
  • Registry collection
  • Quarantine
  • Remote console (full cmd / shell) 

Custom Response Playbooks

Our custom response playbooks help you orchestrate your specific responses. Prepare your individual response playbook with up to 16 consecutive steps.

A typical response playbook may look like this:

  • Step 1: Quarantine endpoint on network level
  • Step 2: Upload forensic toolset to endpoint
  • Step 3: Execute forensic tools and generate output package
  • Step 4: Download output package to ASGARD
  • Step 5: Remove toolset and output package from endpoint

Powerful API

The ASGARD API facilitates integration with SOAR frameworks, SIEM systems, IOC feeds/providers (e.g. MISP, ….) and literally any piece of security infrastructure you have in place.

Typical use cases may include:

  • Trigger THOR scan on system that caused alerts in IPS, SIEM, antivirus console, etc.
  • Collect forensic evidence on endpoints
  • Synchronize ASGARD assets with CMDB
  • Drop suspicious samples into sandbox

Hard- and Softappliance

The hardened, Linux-based ASGARD appliance is a powerful, solid and scalable response platform with agents for Windows, Linux and macOS. It either ships as soft appliance or 1U hard appliance. All scale up to 25,000 endpoints. Together with the Master ASGARD appliance this gives you the ability to control more than one million endpoints from one console.

Automated Sandbox Analysis

ASGARD Management Center provides various options to collect suspicious files and drop them into the sandbox of your choice. Just start your scans with the Bifrost-option and all files that exceed a given score will be dropped into the sandbox seamlessly – or just navigate to the respective asset and start the “collect evidence playbook” for the file you want to send to the sandbox.

Optimized Analysis and Baselining

ASGARD Analysis Cockpit gives you full visibility on all your IOC matches, logs and sandbox reports. It allows you to set baselines and points you to security relevant changes in your environment.

Learn More

Feature Highlights

MISP Integration

This short demo shows how easy it is to launch a scan with custom IOCs from a connected MISP.

In the example we select all events with the keyword “Emotet”, add them to a new rule set and use that rule set in a new Group Scan with THOR.

Remote Console

This example shows some of the Remote Console features. You get a full console on the remote system. On Windows you can even run PowerShell to run more complex scripts. On Linux systems you get a local shell. All remote sessions get recorded and can be replayed in an integrated player. 

ASGARD 2.11 Release

We are glad to announce a new ASGARD Management Center (AMC) release with exciting new features and improvements.Sigma LogWatcher LogWatcher is a new service that applies Sigma rules to Windows Eventlog entries. It uses the big public Sigma rule base and has access to...

The ASGARD manual is now online

The ASGARD manual is available in an online version. So far documentations have been provided as PDF file. From version 2.4 of ASGARD onwards, we publish the documentation on an online form. You can find the most recent version here. 

End-of-Life ASGARD v1 and Master ASGARD v1

Nextron announces the end-of-sale and end-of-life dates for the ASGARD version 1 and Master ASGARD version 1. The last day to order the affected product(s) is May 31, 2020. Customers with active service contracts will continue to receive support as shown until June...

Upcoming ASGARD Version 2

The last five months we've been working on a shiny new version of our ASGARD platform that overcomes previous limitations and includes exciting new features. ASGARD 2 is a completely rewritten management platform, featuring a new interface, load balancing options, a...

THOR Integration into Microsoft Defender ATP

Why Integrate THOR into Microsoft Defender ATP While Microsoft Defender ATP fully plays off its strength in detecting live attacks, suspicious process starts and network connections, THOR shines as a live forensic scanner that scans the local filesystem, registry,...
WordPress Cookie Plugin by Real Cookie Banner