PulseSecure

Author: Paul CABON CERT Cwatch Almond

description

Pulse Secure

paths

4 paths
paths use Windows environment syntax

collection commands

# PowerShell Artifact Collection Script
# Target: PulseSecure
# Run as Administrator

#Requires -RunAsAdministrator

$ErrorActionPreference = "SilentlyContinue"
$DestBase = "D:\Evidence"

# Function to handle artifact collection with robocopy
function Collect-Artifact {
    param (
        [string]$SourceDir,
        [string]$FolderName,
        [string]$FileMask = "*"
    )
    $FullDest = Join-Path -Path $DestBase -ChildPath $FolderName
    robocopy "$SourceDir" "$FullDest" "$FileMask" /E /COPY:DAT /R:0 /W:0 /NP /NFL /NDL /NJH /NJS | Out-Null
}

# 1. Pulse Secure logs in Programmes Files
Collect-Artifact -SourceDir "C:\Program Files (x86)\Pulse Secure\Logging" -FileMask "*" -FolderName "Pulse_Secure_logs_in_Programmes_Files"

# 2. Pulse Secure logs in ProgramData
Collect-Artifact -SourceDir "C:\ProgramData\Pulse Secure\Logging" -FileMask "*" -FolderName "Pulse_Secure_logs_in_ProgramData"

# 3. Pulse Secure setup logs
Collect-Artifact -SourceDir "C:\Users\*\AppData\Roaming\Pulse Secure\Setup Client" -FileMask "*.log" -FolderName "Pulse_Secure_setup_logs"

# 4. Pulse Secure PSAL logs
Collect-Artifact -SourceDir "C:\Users\*\AppData\Local\Pulse Secure\Logging" -FileMask "PulseClient.log" -FolderName "Pulse_Secure_PSAL_logs"

Write-Host "Collection complete!" -ForegroundColor Green

Save as .ps1 and run as Administrator. Use: powershell -ExecutionPolicy Bypass -File script.ps1

references

included in collections