Skip to content

Full Text Search

Full Text Search enables investigators to scan the contents and metadata of files on remote assets for specific keywords or regex patterns. Unlike traditional evidence collection that gathers predefined artifacts, Full Text Search allows targeted searches across document contents, configuration files, logs, and other text-based data—helping investigators quickly locate evidence of data exfiltration, policy violations, or indicators of compromise.

Full Text Search: Interactive Demo

  • Keyword Searching — Search for exact terms such as filenames, usernames, IP addresses, or sensitive data identifiers
  • Pattern Matching — Use regex patterns to find complex matches like credit card numbers, email addresses, or custom formats
  • Reusable Profiles — Save search configurations as profiles for consistent, repeatable investigations
  • File Type Filtering — Target specific file categories (documents, plain text, databases) to reduce noise
  • Cross-Platform Support — Search across Windows, macOS, and Linux assets simultaneously

Full Text Search can be initiated in two ways:

From anywhere in the Console, select Quick Start from the top navigation bar, then select Full Text Search.

Full Text Search: Accessing via Quick Start menu

Navigate to Assets, select one or more target assets, and choose Full Text Search from the bulk action bar.

Full Text Search: Initiating from the Assets bulk action bar

The Full Text Search wizard guides you through three steps: Asset Selection, Setup, and Customization.

Select the assets you want to search. Use filters or saved filters to narrow down your selection. Assets can be Windows, macOS, or Linux endpoints.

Full Text Search: Selecting target assets

Configure your search parameters:

FieldDescription
Task NameA descriptive name for this search task (auto-generated if left empty)
CaseAssociate the search with an existing case for centralized evidence management
Task Start TimeRun immediately or schedule for later
Full Text Search ProfileSelect an existing profile or create a new one

Full Text Search: Configuring task setup and selecting a profile

Each profile displays the number of keywords and file types it contains, helping you select the appropriate profile for your investigation.

Click + Add New Profile to create a reusable search configuration:

  1. Enter a Name for the profile
  2. Select the Organization
  3. Add Search Keywords — individual terms or regex patterns
  4. Select File Types to search within

Full Text Search: Creating a new profile with keywords and file types

Click + Add New to add search terms:

  • Add New Keyword — Enter an exact term to search for
  • Add New Pattern — Enter a regex pattern for complex matching

Full Text Search: Adding a keyword to the profile

AIR includes a library of pre-built regex patterns for common investigation scenarios. Click the Examples dropdown to select from ready-to-use patterns:

Example PatternDescription
API Key/Token PatternDetects common API key and token formats
Generic Credentials PatternFinds username and password combinations in files
WordPress Credentials PatternLocates WordPress-specific credential patterns
Credit Card Number Pattern (MasterCard)Identifies MasterCard number formats
AWS Access Key PatternDetects AWS access key identifiers (AKIA…)
AWS Secret Key PatternFinds AWS secret access keys
GitHub Personal Access Token PatternIdentifies GitHub PAT formats
Stripe API Key PatternDetects Stripe API key formats

For bulk keyword management, click Import Keywords (.csv) to upload a CSV file containing your search terms. This is useful when:

  • Migrating keyword lists from other tools
  • Maintaining centralized keyword repositories
  • Sharing standardized search terms across investigation teams

The CSV file should contain one keyword or pattern per row.

Expand Advanced Settings to configure additional parameters:

Full Text Search: Advanced settings with path exclusions

SettingDescription
Search InDefault search paths per operating system (Windows: %SYSTEMDRIVE%\Users\**, macOS: /Users/**, Linux: /home/**)
Excluded Path PatternsDirectories to skip during the search. Use the Examples dropdown for common exclusions
Max Result LimitMaximum number of results to return per asset (default: 1000)

Common exclusion patterns include:

  • C:\Program Files\** — Windows Program Files directory
  • C:\Program Files (x86)\** — Windows Program Files (x86) directory
  • Windows system directory
  • Entire C drive (for targeted user-folder searches)

Full Text Search supports regex patterns for advanced matching. Patterns must be added using the Add New Pattern option.

PatternMatchesUse Case
invoiceExact word “invoice”Find documents mentioning invoices
invoice|receipt”invoice” OR “receipt”Find financial documents
\d{3}-\d{2}-\d{4}123-45-6789US Social Security Numbers
\d{4}[- ]?\d{4}[- ]?\d{4}[- ]?\d{4}Credit card formatsPayment card numbers
[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}email@domain.comEmail addresses
(?:25[0-5]|2[0-4]\d|[01]?\d\d?)(?:\.(?:25[0-5]|2[0-4]\d|[01]?\d\d?)){3}192.168.1.1IPv4 addresses
password\s*[:=]\s*\S+password: secret123Hardcoded credentials
BEGIN\s+(RSA|DSA|EC)?\s*PRIVATE\s+KEYPrivate key headersExposed private keys
AKIA[0-9A-Z]{16}AWS Access Key formatAWS credentials
(?i)confidential|secret|restrictedCase-insensitive classification markersSensitive document labels

Once a Full Text Search task completes, results are available in the Investigation Hub:

  1. Navigate to Investigation Hub from the main menu
  2. Select the Case associated with your search task
  3. Locate the Full Text Search results in the case timeline

Results display:

  • File path — Location of the file containing the match
  • Match context — Surrounding text showing where the keyword or pattern was found
  • Asset information — Which endpoint contained the match

Begin with specific keywords or patterns targeting known indicators. If initial results are limited, gradually broaden your search criteria.

Limit searches to relevant file categories. Searching all 60 file types increases scan time—focus on document types most likely to contain your target data.

Create standardized profiles for common investigation scenarios:

  • PII Search — Social security numbers, credit cards, email addresses
  • Credential Hunting — Passwords, API keys, private keys
  • Data Exfiltration — Company-specific keywords, project names, client identifiers

Use excluded path patterns to skip operating system and application directories that rarely contain investigative value, improving search speed and reducing false positives.

Full Text Search can examine contents within 60 file type categories, organized into groups:

CategoryExamples
Text/Word ProcessingDOC, DOCX, TXT, RTF, ODT, PDF
Plain TextLOG, CFG, INI, XML, JSON, YAML
Database, Spreadsheet, FinanceXLS, XLSX, CSV, MDB, ACCDB

Expand the File Types section when creating a profile to view and select specific categories.