Endpoint investigation is a core part of modern SOC operations, but too often it involves jumping between tools, re-running collections, or manually tracking down output.

At SOCFORTRESS, we've continued improving CoPilot with a focus on making Velociraptor-driven investigations more practical and efficient for day-to-day use.

Get Started with CoPilot: https://github.com/socfortress/CoPilot

What's Changed in CoPilot

Recent updates to the Velociraptor integration inside CoPilot introduce more flexibility and better handling of investigation artifacts.

Artifact Parameters in CoPilot

CoPilot now allows analysts to define Velociraptor artifact parameters directly within the UI.

None

Artifact parameters are automatically populated with Velociraptor defaults, but analysts can adjust them as needed before execution. This removes the need to switch tools or manually modify artifacts while still maintaining control over how collections run.

Improved Artifact Collection Engine

Artifact results are no longer limited to on-screen output.

Every artifact run is now automatically uploaded to a per-agent data store, including:

  • Artifact results
  • Collection metadata
  • Execution logs
  • Supporting files generated during the run

This creates a persistent record of investigation activity that can be reviewed, downloaded, or archived as needed.

None

Remote File Collection from Endpoints

CoPilot now supports remote file collection using Velociraptor's file collection capabilities.

None

Analysts can specify file paths directly in CoPilot and retrieve files from both Windows and Linux endpoints. Collected files are uploaded alongside artifact results and packaged in a downloadable archive.

This makes it easier to pull samples for additional analysis, such as sandboxing or malware review, without relying on manual access or external tooling.

Built Into Alert Investigations

These capabilities are also available directly from alerts.

From an alert, analysts can:

  • Run Velociraptor artifacts against the affected endpoint
  • Collect files related to the alert
  • Access artifact results and uploads from the data store

This keeps investigation steps centralized within the alert workflow and reduces context switching during triage.

SOC Operations

These improvements streamline common investigation tasks by:

  • Reducing manual steps during artifact execution
  • Keeping results and collected files organized per endpoint
  • Making it easier to revisit historical investigation data
  • Supporting faster, more consistent analyst workflows

The focus is on improving operational efficiency without adding complexity.

Need Help?

The functionality discussed in this post, and so much more, are available via the SOCFortress platform. Let SOCFortress help you and your team keep your infrastructure secure.

Website: https://www.socfortress.co/

Contact Us: https://www.socfortress.co/contact_form.html

None