Forensics, in terms of Information Technology, typically relates to the extraction of legal evidence from computer systems to support legal events. Forensics involves identifying, preserving, recovering, analyzing, and presenting collected data from a computer environment. Forensics is also a required component for many sensitive computing environments looking to leverage VDI solutions.
To understand how forensics is impacted by VDI, it’s first important to understand where user-authored or user-manipulated data may reside.
The primary locations for user-authored or user-manipulated data are as follows: