Skip to main content
info

This section is not relevant to SaaS deployments.

How to set up proxy access

/ Forensic Acquisition and Investigation supports the use of proxies for communication between the / Forensic Acquisition and Investigation platform and services external to the environment in which you have deployed the / Forensic Acquisition and Investigation platform. This can include:

  • Cross-cloud acquisitions
  • XDR-based acquisitions
  • Importing from a URL
  • System updates
  • Providing diagnostic information to / Forensic Acquisition and Investigation

/ Forensic Acquisition and Investigation supports proxy authentication using basic HTTP and server certificate TLS authentication.

Configure Proxy Access during installation

Please see the relevant deployment page, on how to configure proxy settings during installation by setting the proxy and proxy cert URL parameters.

Configure Proxy Access after installation

To configure proxy access go to Settings - Advanced

Specify the URL of the proxy. If the proxy requires a user ID and password, include these as part of the URL in the format http://user:password@hostname:port

If the proxy uses TLS, specify URL from which you can download the server certificate URL in the Proxy Cert URL field. If the server does not user TLS, leave this field blank.

To test these settings, click the Test proxy settings button.

Proxy Setting

warning

Settings will only be applied after the next system upgrade

Skipping SSL Verification in / Forensic Acquisition and Investigation Host Uploads

Some MITM Proxies will present an invalid certificate, and prevent / Forensic Acquisition and Investigation Host (and other import methods which utilise / Forensic Acquisition and Investigation Host such as XDR integrations and Kubernetes acquisitions) from uploading data to cloud storage.

To skip SSL verification in / Forensic Acquisition and Investigation Host uploads, check the box under Settings > Advanced > / Forensic Acquisition and Investigation Host (Skip SSL Verification): Proxy Setting