dfirhub

McAfee_ePO

Author: Doug Metz

description

McAfee ePO Log Files

paths

5 paths
AntivirusMcAfee ePO Logs
C:\ProgramData\McAfee\Endpoint Security\Logs\
AntivirusMcAfee ePO Apache Logs
C:\Program Files (x86)\McAfee\ePolicy Orchestrator\Apache2\Logs
AntivirusMcAfee ePO DB Events
C:\Program Files (x86)\McAfee\ePolicy Orchestrator\DB\Events
AntivirusMcAfee ePO DB Debug Events
C:\Program Files (x86)\McAfee\ePolicy Orchestrator\DB\Events\Debug
AntivirusMcAfee ePO Server Logs
C:\Program Files (x86)\McAfee\ePolicy Orchestrator\Server\Logs
paths use Windows environment syntax

collection commands

# PowerShell Artifact Collection Script
# Target: McAfee_ePO
# Run as Administrator

#Requires -RunAsAdministrator

$ErrorActionPreference = "SilentlyContinue"
$DestBase = "D:\Evidence"

# Function to handle directory creation and copying
function Collect-Artifact {
    param (
        [string]$SourcePath,
        [string]$FolderName
    )
    $FullDest = Join-Path -Path $DestBase -ChildPath $FolderName
    if (-not (Test-Path -Path $FullDest)) {
        New-Item -ItemType Directory -Path $FullDest -Force | Out-Null
    }
    Copy-Item -Path $SourcePath -Destination $FullDest -Recurse -Force
}

# 1. McAfee ePO Logs
Collect-Artifact -SourcePath "C:\ProgramData\McAfee\Endpoint Security\Logs\\*" -FolderName "McAfee_ePO_Logs"

# 2. McAfee ePO Apache Logs
Collect-Artifact -SourcePath "C:\Program Files (x86)\McAfee\ePolicy Orchestrator\Apache2\Logs\*" -FolderName "McAfee_ePO_Apache_Logs"

# 3. McAfee ePO DB Events
Collect-Artifact -SourcePath "C:\Program Files (x86)\McAfee\ePolicy Orchestrator\DB\Events\*" -FolderName "McAfee_ePO_DB_Events"

# 4. McAfee ePO DB Debug Events
Collect-Artifact -SourcePath "C:\Program Files (x86)\McAfee\ePolicy Orchestrator\DB\Events\Debug\*" -FolderName "McAfee_ePO_DB_Debug_Events"

# 5. McAfee ePO Server Logs
Collect-Artifact -SourcePath "C:\Program Files (x86)\McAfee\ePolicy Orchestrator\Server\Logs\*" -FolderName "McAfee_ePO_Server_Logs"

Write-Host "Collection complete!" -ForegroundColor Green

Save as .ps1 and run as Administrator. Use: powershell -ExecutionPolicy Bypass -File script.ps1

included in collections