Microsoft Forensics

Looking for:
Forensic Artifact

Program Execution

Prefetch, ShimCache, AmCache, UserAssist, SRUM

File Opening

Shortcut files, Jump Lists, ShellBags, Prefetch, OpenSaveMRU

File Knowledge

WordWheelQuery, Last Visited MRU, Shortcut Files, Recycle Bin, Types Paths

Event Logs

User Logons, RDP Activity, RunAs events, Process Tracking, PowerShell Logs

Browser Usage

History, Cookies, Cache, Session Restore, TypedURLs

Forensics locations:

Use magnet to check if a disk is encrypted (edd.exe - https://www.magnetforensics.com/resources/encrypted-disk-detector/)

Main forensics artifacts:

To get the custom Triage extract using CyLR (https://github.com/orlikoski/CyLR) use:

CyLR.exe -c config.txt

CyLR config file:

Last updated