June 2016
Beginner to intermediate
322 pages
6h 18m
English
When event logs are analyzed, the most common approach is to export logs and then review them on the forensics workstation. There are a few reasons for such an approach. Often, we need to analyze a few event logs (for example, System, Security, and Application) from several workstations and Domain Controller. So, it is very convenient to have all event log files in one place. Also, many forensics tools not enough good work with event logs.
There are two main approaches to export event logs:
Both of them have their own set of features; let's see what they are.
While working with live systems, remember that event log files are always used, which creates some additional challenges. One way ...