Skip to Content
Windows Security Monitoring
book

Windows Security Monitoring

by Andrei Miroshnikov
April 2018
Intermediate to advanced
648 pages
14h 51m
English
Wiley
Content preview from Windows Security Monitoring

CHAPTER 13Filesystem and Removable Storage

This chapter is probably one of the most interesting chapters in the book, because it answers some of the most common questions asked during incident investigation procedures:

  • Who deleted the file?
  • Who created the file?
  • How was this file accessed—using which tool or application?
  • When was this file deleted?
  • Who changed this file?
  • and so on

Some of these questions are easy to answer, but some of them are not. In this chapter you will find information about monitoring recommendations for most common scenarios related to the local drive and removable storage filesystem objects.

Windows Filesystem

Currently the most common Windows filesystem is the New Technology File System (NTFS). You can still find the File Allocation Table 32 (FAT32) filesystem, most likely on some USB drives or legacy operating systems, like Windows 98, for example.

The FAT32 filesystem was developed as an extension and replacement of the older FAT16 filesystem to overcome some FAT16 filesystem limitations, such as maximum file size limitations, and to improve other characteristics.

FAT16 was first introduced in November 1987, with FAT32 coming in 1996. Table 13-1 compares some of the characteristics of these two filesystems.

Table 13-1: FAT16 Compared to FAT32

LIMIT FAT16 FAT32
Max. volume size 4 GB (64KB clusters) 16 TB (4KB sectors)
Max. file size 4 GB 4 GB
Max. number of files 65,460 (32KB clusters) 268,173,300 (32KB clusters)
Max. filename ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Mastering Windows Security and Hardening

Mastering Windows Security and Hardening

Mark Dunkerley, Matt Tumbarello
Cyber Security and Network Security

Cyber Security and Network Security

Sabyasachi Pramanik, Debabrata Samanta, M. Vinay, Abhijit Guha

Publisher Resources

ISBN: 9781119390640Purchase book