Summary
In this chapter, we introduced the most common and valuable Windows event log files and how to analyze them, either from a live machine or offline by extracting and investigating the logs, using third-party tools. Finally, we provided an overview of this part of the book’s investigative approach and how to install the investigation lab.
In the next chapter, you will learn how to track and investigate Windows account usage and management activities.