Identifying uninstalled software using Event Logs with Osforensics
Windows Event Logs are a detailed record of system, security, and application notifications and messages stored by the Windows operating system. These logs are invaluable for troubleshooting, monitoring system health, and analyzing security incidents.
Here's an overview of the main types of Windows Event Logs:
Application Logs: These contain events logged by applications or programs. For example, a database application might record errors and significant operations here.
Security Logs: These log security-related events, such as login attempts, resource access, and system changes. They are crucial for auditing and monitoring security-related activities.
System Logs: These contain events logged by Windows system components. For example, drivers and services will log events here when they encounter issues or perform significant actions.
Setup Logs: These are used for logging events related to the installation of applications or system components.
Forwarded Events: These are events collected from remote computers and stored locally.
Windows Event Logs are stored at the following path: C:\Windows\System32\winevt\Logs
Osforensics V7 can be used to help identify uninstalled software. Open the Event Log Viewer from the Start screen in OSF…
Like many other actions and events recorded within the Windows Event Logs you can analyze these logs for records of uninstalled software.
You will first need to run a scan to search for any Event Logs that are located on a forensic image file or connected drive. Once complete, navigate to the Application event logs
อ่านเพิ่มเติม :
หมายเหตุ:เนื้อหาในเว็บไซต์นี้มีขึ้นเพื่อวัตถุประสงค์ในการให้ข้อมูลและเพื่อการศึกษาเท่านั้น
* หากมีข้อมูลข้อผิดพลาดประการใด ขออภัยมา ณ ที่นี้ด้วย รบกวนแจ้ง Admin เพื่อแก้ไขต่อไป
ขอบคุณครับ
#WindowsForensic #ComputerForensics #dfir #forensics #digitalforensics #computerforensic #investigation #cybercrime #fraud
No comments:
Post a Comment