Endpoint Forensic Evidence Collection
After an incident has occurred, in accordance with an efficient incident response plan, it becomes essential to initiate the steps of incident verification and analysis. These steps cannot be effectively carried out in the absence of forensic evidence collected from the cybersecurity controls already in place or forensic data gathered from the endpoint under suspicion. While cybersecurity controls themselves already provide some valuable insights, forensic evidence acquisition is still required to dive deeper into incident details and get the full picture of malicious activities. It is important to note that the artifacts to be collected may vary depending on the host’s Operating System (OS), its version (desktop or server), its architecture, and so on.
We will cover the various methods for collecting forensic evidence from Windows OS endpoints as part of the incident verification and analysis steps mentioned earlier. We will also discuss...