Microsoft Forensics
Looking for:
Forensic Artifact
Program Execution
Prefetch, ShimCache, AmCache, UserAssist, SRUM
File Opening
Shortcut files, Jump Lists, ShellBags, Prefetch, OpenSaveMRU
File Knowledge
WordWheelQuery, Last Visited MRU, Shortcut Files, Recycle Bin, Types Paths
Event Logs
User Logons, RDP Activity, RunAs events, Process Tracking, PowerShell Logs
Browser Usage
History, Cookies, Cache, Session Restore, TypedURLs
Forensics locations:
Object
Location
Cookies
Hibernation File
Page File
Memory Dump
Use magnet to check if a disk is encrypted (edd.exe - https://www.magnetforensics.com/resources/encrypted-disk-detector/)
Main forensics artifacts:
To get the custom Triage extract using CyLR (https://github.com/orlikoski/CyLR) use:
CyLR.exe -c config.txt
CyLR config file:
Last updated