FTK Ug PDF
FTK Ug PDF
FTK Ug PDF
(FTK)
User Guide
| 1
AccessData
Legal and Company Information
Legal Information
©2018 AccessData Group, Inc. All rights reserved. No part of this publication may be reproduced, photocopied,
stored on a retrieval system, or transmitted without the express written consent of the publisher.
AccessData Group, Inc. makes no representations or warranties with respect to the contents or use of this
documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any
particular purpose. Further, AccessData Group, Inc. reserves the right to revise this publication and to make
changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes.
Further, AccessData Group, Inc. makes no representations or warranties with respect to any software, and
specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose.
Further, AccessData Group, Inc. reserves the right to make changes to any and all parts of AccessData
software, at any time, without any obligation to notify any person or entity of such changes.
You may not export or re-export this product in violation of any applicable laws or regulations including, without
limitation, U.S. export regulations or the laws of the country in which you reside.
AccessData Group, Inc.
588 West 400 South Suite 350
Lindon, UT 84042
USA
LawDrop® Summation®
| 2
A trademark symbol (®, ™, etc.) denotes an AccessData Group, Inc. trademark. With few exceptions, and
unless otherwise notated, all third-party product names are spelled and capitalized the same way the owner
spells and capitalizes its product name. Third-party trademarks and copyrights are the property of the trademark
and copyright holders. AccessData claims no responsibility for the function or performance of third-party
products.
AFF® and AFFLIB® Copyright® 2005, 2006, 2007, 2008 Simson L. Garfinkel and Basis Technology
Corp. All rights reserved.
Copyright © 2005 - 2009 Ayende Rahien
FreeBSD ® Copyright 1992-2011. The FreeBSD Project.
BSD License:
Copyright (c) 2009-2011, Andriy Syrov. All rights reserved. Redistribution and use in source and binary
forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer; Redistributions in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials provided with the
distribution; Neither the name of Andriy Syrov nor the names of its contributors may be used to endorse
or promote products derived from this software without specific prior written permission. THIS
SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
WordNet License:
This license is available as the file LICENSE in any downloaded version of WordNet.
WordNet 3.0 license: (Download)
WordNet Release 3.0 This software and database is being provided to you, the LICENSEE, by Princeton
University under the following license. By obtaining, using and/or copying this software and database,
you agree that you have read, understood, and will comply with these terms and conditions.: Permission
to use, copy, modify and distribute this software and database and its documentation for any purpose and
without fee or royalty is hereby granted, provided that you agree to comply with the following copyright
notice and statements, including the disclaimer, and that the same appear on ALL copies of the software,
database and documentation, including modifications that you make for internal use or for distribution.
WordNet 3.0 Copyright 2006 by Princeton University. All rights reserved. THIS SOFTWARE AND
DATABASE IS PROVIDED "AS IS" AND PRINCETON UNIVERSITY MAKES NO REPRESENTATIONS
OR WARRANTIES, EXPRESS OR IMPLIED. BY WAY OF EXAMPLE, BUT NOT LIMITATION,
PRINCETON UNIVERSITY MAKES NO REPRESENTATIONS OR WARRANTIES OF MERCHANT-
ABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF THE LICENSED
SOFTWARE, DATABASE OR DOCUMENTATION WILL NOT INFRINGE ANY THIRD PARTY PATENTS,
COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS. The name of Princeton University or Princeton
may not be used in advertising or publicity pertaining to distribution of the software and/or database.
Title to copyright in this software, database and any associated documentation shall at all times remain
with Princeton University and LICENSEE agrees to preserve same.
XMLmind XSL-FO Converter Professional Edition Developer License Agreement:
Distribution
Licensee may not distribute with the Application any component of the Software other than the binary
class library (xfc.jar) for the JavaTM version and the Dynamic Link Library file (xfc.dll) for the .NET
version.
Licensee shall include the following copyright notice: "XMLmind XSL-FO Converter Copyright © 2002-
| 3
2009 Pixware SARL", with every copy of the Application. This copyright notice may be placed together
with Licensee's own copyright notices, or in any reasonably visible location in the packaging or
documentation of the Application.
Licensee may use, distribute, license and sell the Application without additional fees due to Licensor,
subject to all the conditions of this License Agreement.
"Amazon Web Services", "AWS" "AWS Aurora" "AWS Relational Database Service" are trademarks of
Amazon.com, Inc. or its affiliates in the United States and/or other countries and is used with permission
https://aws.amazon.com/aispl/trademark-guidelines/.
Apache(r), Apache Cassandra and the flame logo is a registered trademark of the Apache Software
Foundation in the United States and/or other countries. No endorsement by the Apache Software
Foundation is implied by the use of these marks.
Company Information
Documentation Conventions
In AccessData documentation, a number of text variations are used to indicate meanings or actions. For
example, a greater-than symbol (>) is used to separate actions within a step. Where an entry must be typed in
using the keyboard, the variable data is set apart using [variable_data] format. Steps that require the user to
click on a button or icon are indicated by Bolded text. This Italic font indicates a label or non-interactive item in
the user interface.
A trademark symbol (®, ™, etc.) denotes an AccessData Group, Inc. trademark. Unless otherwise notated, all
third-party product names are spelled and capitalized the same way the owner spells and capitalizes its product
name. Third-party trademarks and copyrights are the property of the trademark and copyright holders.
AccessData claims no responsibility for the function or performance of third-party products.
Registration
The AccessData product registration is done at AccessData after a purchase is made, and before the product is
shipped. The licenses are bound to either a USB security device, or a Virtual CmStick, according to your
purchase.
Subscriptions
AccessData provides a one-year licensing subscription with all new product purchases. The subscription allows
you to access technical support, and to download and install the latest releases for your licensed products during
the active license period.
Following the initial licensing period, a subscription renewal is required annually for continued support and for
updating your products. You can renew your subscriptions through your AccessData Sales Representative.
Use License Manager to view your current registration information, to check for product updates and to
download the latest product versions, where they are available for download. You can also visit our web site,
For more information, see Managing Licenses in your product manual or on the AccessData website.
| 4
AccessData Contact Information
Your AccessData Sales Representative is your main contact with AccessData. Also, listed below are the general
AccessData telephone number and mailing address, and telephone numbers for contacting individual
departments
Technical Support
Technical support is available on all currently licensed AccessData solutions.
You can contact AccessData Customer and Technical Support in the following ways:
You can access the Chat, Knowledge Base, Discussion Boards, White Papers and more through the
AccessData Support Portal:
https://support.accessdata.com
E-Mail Support:
Telephone:
Americas/Asia-Pacific:
| 5
Support Hours: Mon-Fri, 7:00 AM – 6:00 PM (MST), except corporate holidays.
Documentation
Please email AccessData regarding any typos, inaccuracies, or other problems you find with the documentation:
[email protected]
Professional Services
The AccessData Professional Services staff comes with a varied and extensive background in digital
investigations including law enforcement, counter-intelligence, and corporate security. Their collective
experience in working with both government and commercial entities, as well as in providing expert testimony,
enables them to provide a full range of computer forensic and eDiscovery services.
At this time, Professional Services provides support for sales, installation, training, and utilization of Summation,
eDiscovery, FTK, FTK Pro, Enterprise, and Lab. They can help you resolve any questions or problems you may
have regarding these solutions.
| 6
Table of Contents
AccessData
Legal and Company Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
AccessData Legal Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Company Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Table of Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Table of Contents | 7
Creating Databases for Individual Cases . . . . . . . . . . . . . . . . . . . . . . . . . 40
Managing KFF Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Recovering and Deleting Processing Jobs . . . . . . . . . . . . . . . . . . . . . . . . 41
Restoring an Image to a Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Adding New Users to a Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Managing Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
About Assigning Roles to Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
About Additional Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
About Predefined Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Assigning Initial Database-level Roles to Users . . . . . . . . . . . . . . . . . . . 46
Assigning Additional Case-level Roles to Users . . . . . . . . . . . . . . . . . . . 46
Adding New Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Modifying Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Email Notifications for Case-Level Permissions . . . . . . . . . . . . . . . . . . . . . 48
Assigning Users Shared Label Visibility . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Setting Additional Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Choosing a Temporary File Path . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Providing a Network Security Device Location . . . . . . . . . . . . . . . . . . . . 49
Setting Theme Preferences for the Visualization Add on . . . . . . . . . . . . . . 49
Setting Agent Conifguration Settings . . . . . . . . . . . . . . . . . . . . . . . . . 50
Optimizing the Case Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Configuring KFF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Managing Global Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Managing Shared Custom Carvers . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Managing Custom Identifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Managing Columns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Managing File Extension Maps . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Managing Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Table of Contents | 8
Configuring Case Indexing Options . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Data Carving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Running Optical Character Recognition (OCR) . . . . . . . . . . . . . . . . . . . 82
Using Explicit Image Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Including Registry Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Send Email Alert on Job Completion . . . . . . . . . . . . . . . . . . . . . . . . . 85
Custom File Identification Options. . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Creating Custom File Identifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Configuring Evidence Refinement (Advanced) Options . . . . . . . . . . . . . . . 87
Refining Evidence by File Status/Type . . . . . . . . . . . . . . . . . . . . . . . . 88
Selecting Index Refinement (Advanced) Options . . . . . . . . . . . . . . . . . . 89
Selecting Lab/eDiscovery Options . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Adding Evidence to a New Case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Working with Volume Shadow Copies . . . . . . . . . . . . . . . . . . . . . . . . 94
Converting a Case from Version 2.2 or Newer . . . . . . . . . . . . . . . . . . . . . 94
Table of Contents | 9
Recovering Processing Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Table of Contents | 10
Using Tab Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
How Global Filters and Tab Filters can work Together . . . . . . . . . . . . . . 146
Using Filters with Category Containers . . . . . . . . . . . . . . . . . . . . . . . 146
Using Filters with Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Viewing the Filters that you have Applied . . . . . . . . . . . . . . . . . . . . . 147
Using Filtering with Searches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Adding a Search Filter to Live Searches . . . . . . . . . . . . . . . . . . . . . . 148
Adding a Search Filter to Index Searches . . . . . . . . . . . . . . . . . . . . . 148
Using Compound Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Applying Compound Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Using Custom Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
About Nested Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Creating a Custom Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Copying Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Editing a Custom Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Sharing, Importing, and Exporting Filters . . . . . . . . . . . . . . . . . . . . . . . . 152
Sharing Custom Filters Between Cases . . . . . . . . . . . . . . . . . . . . . . 152
Importing Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Exporting Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Types of Predefined Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Filtering Data Prior to Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Using the Persons of Interest Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Creating a List of Communication Participants. . . . . . . . . . . . . . . . . . . 158
Creating a Rule within People Finder . . . . . . . . . . . . . . . . . . . . . . . . 159
Searching for Data within People Finder . . . . . . . . . . . . . . . . . . . . . . 159
Creating a Communication Filter within People Finder . . . . . . . . . . . . . . 159
Fields Searched when using Persons of Interest . . . . . . . . . . . . . . . . . 160
Table of Contents | 11
Recovering Unknown Passwords of Encrypted Files. . . . . . . . . . . . . . . . . 172
About Recovering Passwords using the PRTK/DNA Integrated Tool with Examiner
172
Recovering Passwords using the PRTK/DNA Integrated Tool . . . . . . . . . . 172
Decrypting Other Encryption Types . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Decrypting EFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Decrypting Microsoft Office Digital Rights Management (DRM) Protected Files 175
Decrypting Dropbox DBX Files . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
Decrypting Lotus Notes Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Decrypting S/MIME Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Decrypting Dell Encryption Files (Dell Data Protection | Encryption Server) . . 178
Decrypting Bitlocker Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Decrypting Safeguard Utimaco Files . . . . . . . . . . . . . . . . . . . . . . . . 181
Decrypting SafeBoot Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Decrypting SecureDoc WinMagic AES Files . . . . . . . . . . . . . . . . . . . . 183
Decrypting Guardian Edge Files . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Decrypting an Image Encrypted With
PGP® WDE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Viewing Decrypted Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Table of Contents | 12
About Cerberus Stage 2 Static Analysis. . . . . . . . . . . . . . . . . . . . . . . . . 208
About Cerberus Stage 2 Report Data . . . . . . . . . . . . . . . . . . . . . . . . 208
Cerberus Stage 2 Function Call Data . . . . . . . . . . . . . . . . . . . . . . . . 209
File Access Call Categories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
Networking Functionality Call Categories . . . . . . . . . . . . . . . . . . . . . 212
Process Manipulation Call Categories . . . . . . . . . . . . . . . . . . . . . . . 214
Security Access Call Categories . . . . . . . . . . . . . . . . . . . . . . . . . . 215
Windows Registry Call Categories . . . . . . . . . . . . . . . . . . . . . . . . . 215
Surveillance Call Categories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
Uses Cryptography Call Categories . . . . . . . . . . . . . . . . . . . . . . . . . 216
Low-level Access Call Categories . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Loads a driver Call Categories . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Subverts API Call Categories . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
Chapter 16: Getting Started with KFF (Known File Filter) . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Introducing KFF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
About the KFF Server and Geolocation. . . . . . . . . . . . . . . . . . . . . . . 226
About KFF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
Introduction to the KFF Architecture . . . . . . . . . . . . . . . . . . . . . . . . 227
Components of KFF Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
How KFF Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
About KFF Data Formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
Installing the KFF Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
About Installing the KFF Server . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
About KFF Server Versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Process for Installing KFF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
Downloading the Latest KFF Installation Files . . . . . . . . . . . . . . . . . . . 232
Determining Where to Install the KFF Server . . . . . . . . . . . . . . . . . . . 233
Installing the KFF Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
Configuring the Location of the KFF Server . . . . . . . . . . . . . . . . . . . . . . 237
Configuring the KFF Server Location on AD Lab and AD Enterprise . . . . . . 237
Configuring the KFF Server Location on Summation or eDiscovery . . . . . . . 238
Manually Configuring Remote Setting for Cassandra . . . . . . . . . . . . . . . 239
Migrating Legacy KFF Data from Previous Versions . . . . . . . . . . . . . . . . . 240
Migrating Legacy KFF Data from versions 5.6 - 6.2 to 6.4 . . . . . . . . . . . . 240
Migrating Legacy KFF Data from versions 5.5 and earlier . . . . . . . . . . . . 241
Table of Contents | 13
Importing KFF Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
About Importing KFF Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
Using the KFF Import Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
Using the KFF Import Utility versions 6.3 and later . . . . . . . . . . . . . . . . 245
Importing Pre-defined KFF Data Libraries . . . . . . . . . . . . . . . . . . . . . 247
Uninstalling KFF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
Installing KFF Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
KFF Library Reference Information . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
About KFF Pre-Defined Hash Libraries . . . . . . . . . . . . . . . . . . . . . . . 254
What has Changed in Version 6.3 and Later . . . . . . . . . . . . . . . . . . . . . . 256
What Changed in Version 6.3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
What Changed in FTK and Lab Version 6.4 . . . . . . . . . . . . . . . . . . . . 257
What Changed in March of 2018 . . . . . . . . . . . . . . . . . . . . . . . . . . 257
What Changed in Enterprise Version 6.5 . . . . . . . . . . . . . . . . . . . . . . 258
What Changed in Version 7.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
Table of Contents | 14
About PhotoDNA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
About Project VIC and KFF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
Overview of Using Project VIC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
Downloading Project VIC Hash Data . . . . . . . . . . . . . . . . . . . . . . . . . . 277
Installing and Configuring the KFF Server . . . . . . . . . . . . . . . . . . . . . . . 277
Importing Project VIC Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
Creating a Case and Enabling Project VIC . . . . . . . . . . . . . . . . . . . . . . . 279
Enabling and Configuring Project VIC . . . . . . . . . . . . . . . . . . . . . . . 279
Viewing Project VIC Results in the Examiner . . . . . . . . . . . . . . . . . . . . . 280
Using the Overview Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
Using the Project VIC and PhotoDNA Information Columns . . . . . . . . . . . 280
Using the Graphics Tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Using the Video Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Bookmarking Files to Export to Project VIC . . . . . . . . . . . . . . . . . . . . . . 282
Exporting Bookmarked Files to Project VIC . . . . . . . . . . . . . . . . . . . . . . 283
Table of Contents | 15
Processing and Displaying Evidence Counts . . . . . . . . . . . . . . . . . . . 318
Disabling the Calculation and Display of the Total Logical Size . . . . . . . . . 319
Table of Contents | 16
Viewing IIS Log File Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
Viewing Registry Timeline Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345
Viewing Log2Timeline CSV File Data . . . . . . . . . . . . . . . . . . . . . . . . . . 347
Identifying Document Languages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350
Examining Internet Artifact Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
About Extensible Storage Engine (ESE) Databases . . . . . . . . . . . . . . . 353
About Expanding Google Chrome, Firefox, and IE 9 Data . . . . . . . . . . . . 354
About Expanding Data from Internet Explorer (IE) Version 10 or Later . . . . . 355
Expanding Internet Artifact Data . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
Viewing Internet Artifact Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358
Examining Mobile Phone Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359
About Expanding Mobile Phone Data . . . . . . . . . . . . . . . . . . . . . . . . 360
Viewing Mobile Phone Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
Standard Messaging Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
Working with Cellebrite UFDR Images . . . . . . . . . . . . . . . . . . . . . . . 367
Working with iOS Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
Working with Facebook Messenger (Android) . . . . . . . . . . . . . . . . . . . 368
Mobile Chat Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
Android Parsers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
Android Phone Contacts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
Android Calendar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
Android Call Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
Android SMS/MMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
Support for Gmail on Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
Support for Kik Files on Android . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
Support for Google Hangouts on Android . . . . . . . . . . . . . . . . . . . . . 377
Python Scripting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
Viewing Data in Volume Shadow Copies . . . . . . . . . . . . . . . . . . . . . . . . 381
Viewing Microsoft Office and Adobe Metadata . . . . . . . . . . . . . . . . . . . . 381
About Windows 8 and 10 Keyword Searches . . . . . . . . . . . . . . . . . . . . . 382
Parsing Data Using Belkasoft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
Belkasoft Parsers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
SQLite Query Builder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386
Expanding Unsupported SQLite Databases . . . . . . . . . . . . . . . . . . . . 386
Creating Queries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386
Viewing SQLite Database Schema Information . . . . . . . . . . . . . . . . . . 387
Table of Contents | 17
Viewing Bookmark Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395
Creating a Timeline Bookmark Report . . . . . . . . . . . . . . . . . . . . . . . 395
Using the Bookmarks Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395
Bookmarking Selected Text . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396
Bookmarking Video Thumbnails . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396
Adding a Video Thumbnail to a New or Existing Bookmark . . . . . . . . . . . 396
Adding to an Existing Bookmark . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397
Creating Email or Email Attachment Bookmarks . . . . . . . . . . . . . . . . . . . 398
Adding Email and Email Attachments to Existing Bookmarks . . . . . . . . . . . 398
Moving a Bookmark . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
Copying a Bookmark . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
Deleting a Bookmark . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
Deleting Files from a Bookmark . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
Table of Contents | 18
Documenting Search Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424
Using Copy Special to Document Search Results . . . . . . . . . . . . . . . . . . 425
Bookmarking Search Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426
Table of Contents | 19
Using the Email Details List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
About the Detailed Visualization Time Line . . . . . . . . . . . . . . . . . . . . . . . 463
Using the Detailed Visualization Time Line . . . . . . . . . . . . . . . . . . . . . . . 464
Understanding How Data is Represented in the Detailed Time Line . . . . . . 464
About Time Bands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
Modifying the Time Line Using Time Bands and Zoom . . . . . . . . . . . . . . 467
Understanding How Grouping Works in the Detailed Visualization Time Line . 467
Visualizing Internet Browser History Data . . . . . . . . . . . . . . . . . . . . . . . 469
Visualizing Other Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
Table of Contents | 20
The Tab Layout Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490
Moving View Panels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
Creating Custom Tabs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493
Managing Columns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494
Customizing File List Columns. . . . . . . . . . . . . . . . . . . . . . . . . . . . 494
Creating User-Defined Custom Columns for the File List view . . . . . . . . . . 495
Deleting Custom Columns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497
Navigating the Available Column Groups. . . . . . . . . . . . . . . . . . . . . . 497
Table of Contents | 21
User Application Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 526
Chapter 38: Supported File Systems and Drive Image Formats . . . . . . . . . . . . . . . . . . . . 527
File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527
Whole Disk Encrypted Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 528
Hard Disk Image Formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 528
CD and DVD Image Formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529
Table of Contents | 22
Configure Database Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . 552
Share the Backup Destination Folder . . . . . . . . . . . . . . . . . . . . . . . . 553
Test the New Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553
Table of Contents | 23
Part 1
This part contains introductory information about AccessData® Forensic Toolkit® (FTK®)and contains the
following chapters:
AccessData® Forensic Toolkit® (FTK®) lets you do thorough computer forensic examinations. It includes
powerful file filtering and search functionality, and access to remote systems on your network.
AccessData forensic investigation software tools help law enforcement officials, corporate security, and IT
professionals access and evaluate the evidentiary value of files, folders, and computers.
This chapter includes the following topics
Acquisition
Acquisition involves identifying relevant evidence, securing the evidence, and creating and storing a
forensic image of it.
About Acquiring Digital Evidence (page 26)
Analysis
Analysis involves creating a case and processing the evidence with tools to properly investigate the
evidence.
About Examining Digital Evidence (page 28)
Presentation
Presentation involves creating a case report that documents and synthesizes the investigation.
About Presenting Evidence (page 30)
Management
Management involves maintenance tasks such as backing up, archiving, detaching, attaching, restoring,
and deleting cases and evidence.
About Managing Cases and Evidence (page 28)
When digital evidence is acquired, forensic examiners create clones of the digital evidence to prevent any
possibility of the digital evidence being changed or modified in any way. This acquired duplication is called a
forensic image. If there is question to the authenticity of the evidence, the image can be compared to the original
source data to prove or to disprove its reliability.
To create a forensic image, the data must be acquired in such a way that ensures that no changes are made to
the original data or to the cloned data. The acquired data must be an exact “bit-by-bit” duplication of the source
data. You can use AccessData’s Imager tool to acquire exact duplicates of digital evidence.
Preserving the evidence is accomplished both in the method of acquisition and the storage of the acquired data.
Creating an exact replica of the original source is critical in forensic investigations. Keeping that replica safe from
any source of corruption or unauthorized access involves both physical and electronic security. Once a case is
created and the evidence is added to it, the case becomes just as critical. Acquired 001, E01, S01, and AD1
images can be encrypted using AD Encryption.
Static evidence
The data that is imaged before it is added to a case is known as static evidence because it stays the
same. Images can be stored and remain available to the case at all times because the image is an exact
replica of evidence data in a file format.
Live evidence
Live evidence can be data that is acquired from a machine while it is running. It is often saved to an
image as it is acquired. Sometimes, this is necessary in a field acquisition. Other times, it can be an
original drive or other electronic data source that is attached to the investigation computer.
Local live evidence
An example of local live evidence is an original drive or other electronic data source that is attached
to the investigation computer. It can also be data acquired from a device on a remote computer while
the device is mounted to the system as Read/Write. All connections to the evidence should be made
through a hardware write-blocking device. Live evidence that is attached to the investigation
computer must remain connected throughout the entire investigation. It is best to create an image of
any evidence source outside of your network, rather than risk having the source removed during the
course of the investigation.
Remote live evidence
Another type of live evidence is data acquired directly from machines that are connected to your
corporate network. This live evidence is referred to as remote evidence. The process of adding it to
your case for investigation is known as Remote Data Acquisition. To aquire remote live evdidence,
you must use AccessData Enterprise.
You should use a write-blocking device when using software acquisition tools. Some operating systems, such as
Windows, make changes to the drive data as it reads the data to be imaged.
You can process static evidence, and acquire live data from local network machines for processing. You can also
view and preview evidence on remote drives, including CDs and DVDs.
See Working with Static Evidence on page 116.
After you have completed installation and created a case, you can add evidence for analysis. Evidence can
include images of hard drives, floppy drives, CDs and DVDs, portable media such as USB drives, and/or live
(un-imaged) data from any common electronic source.
The data can be hashed and indexed. You can run searches in the index for specific words like names and email
addresses, or you can run live searches.
You can use the Known File Filter (KFF) library to categorize specific information during evidence analysis. The
KFF lets you automatically assign files a status of Alert, Ignore, or Disregard.
Back up of a case requires the same amount of drive space as the case itself. This is an important consideration
when planning your network resources for investigations.
Some of the case management features include: Archive, Archive and Detach, and Attach. These features give
you control over your cases.
The Overview tab lets you narrow your search to look through specific document types, or to look for
items by status or file extension.
The Graphics tab lets you quickly scan through thumbnails of the graphics in the case.
The Email tab lets you view emails and attachments.
As you find items of interest, you can do the following
Indexing is the process of creating an index with a searchable list of the words or strings of characters in a case.
The index instantaneously provides results. However, it is sometimes necessary to use a live search to find
things not contained in the index.
Hashing a file or files refers to the process of using an algorithm to generate a unique value based on a file’s
contents. Hash values are used to verify file integrity and identify duplicate and known files. Known files can be
standard system files that can be ignored in the investigation or they can be files known to contain illicit or
dangerous materials. Ignore and alert statuses provide the investigator with valuable information at a glance.
Three hash functions are available: Message Digest 5 (MD5), Secure Hash Algorithms 1 (SHA-1), and Secure
Hash Algorithms 256 (SHA-256).
Typically, individual file hashes (each file is hashed as it is indexed and added to a case) compare the results
with a known database of hashes, such as the KFF. However, you can also hash multiple files or a disk image to
verify that the working copy is identical to the original.
Introducing AccessData® Forensic Toolkit® (FTK®) What You Can Do With the Examiner | 29
Files which contain other files, such as ZIP, CAB, and email files with attachments are called container files.
When KFF identifies a container file as either ignorable or alert, the component files are not extracted. If
extraction is desired, the files must be manually extracted and added to the case.
About Searching
You can conduct live searches or index searches of acquired images.
A live search is a bit-by-bit comparison of the entire evidence set with the search term and takes slightly more
time than an Index search. Live searches allow you to search non-alphanumeric characters and to perform
pattern searches, such as regular expressions and hex values.
AccessData products use dtSearch, one of the leading search tools available, in the index search engine.
dtSearch can quickly search gigabytes of text.
About Bookmarking
As important data is identified from the evidence in the case, bookmarking that data enables you to quickly find
and refer to it, add to it, and attach related files, even files that are not processed into the case. These files are
called “supplementary files.” Bookmarks can be included in reports at any stage of the investigation and
analysis.
Use the report wizard to create and modify reports. A report can include bookmarks (information selected during
the examination), customized graphic references, and selected file listings. Selected files, such as bookmarked
files and graphics, can be exported to make them available with the report. The report can be generated in
several file formats, including HTML and PDF and can be generated in multiple formats simultaneously.
Introducing AccessData® Forensic Toolkit® (FTK®) What You Can Do With the Examiner | 30
About Cloud Based and Virtualization Support
Virtualization Support
AccessData will support its products in a virtual environment running on supported operating systems and
environments by both the Vendor/manufacturer and AccessData.
For information, see the Release Notes.
Introducing AccessData® Forensic Toolkit® (FTK®) What You Can Do With the Examiner | 31
Chapter 2
Getting Started with the User Interface
You can use two primary interfaces to work with cases and evidence:
Case Manager
Examiner
The Examiner
Administrating Forensic
Toolkit® (FTK®)
This part contains information about administrating and configuring Forensic Toolkit® (FTK®) and contains the
following chapters:
This chapter includes topics that discuss administration tasks that you can do within the Case Manager
interface.
See Initializing the Database and Creating an Application Administrator Account on page 36.
See Changing Your Password on page 37.
See Recovering a Password on page 37.
See Setting Database Preferences on page 39.
See Managing Database Sessions on page 39.
See Optimizing the Database for Large Cases on page 39.
See Creating Databases for Individual Cases on page 40.
See Managing KFF Settings on page 40.
See Recovering and Deleting Processing Jobs on page 41.
See Restoring an Image to a Disk on page 41.
See Adding New Users to a Database on page 42.
See About Assigning Roles to Users on page 42.
See Email Notifications for Case-Level Permissions on page 48.
See Assigning Users Shared Label Visibility on page 48.
See Setting Additional Preferences on page 49.
See Managing Global Features on page 50.
Important: It is strongly recommended to configure antivirus to exclude the database (PostgreSQL, MS SQL) AD
temp, source images/loose files, and case folders for performance and data integrity.
The first time you launch the application, you specify the database to use. The application then creates the
database schema which is required before any case data can be loaded into the database. You will be prompted
to give the location of the database. This option allows a non-local database to be specified even if a local
database is present.
After initializing the database, you are prompted to create an Application Administrator account. This account
lets you create other user accounts and perform other administrative tasks.
FTK Application Administration Initializing the Database and Creating an Application Administrator Account | 36
Changing Your Password
Once logged into the system, you can change your password.
Recovering a Password
You can recover an Administrator database password using a Password Reset File. Only the Administrator
logged into the program can create the reset file and only the Administrator that created the reset file can use the
file to reset the password. Before recovering your Administrator password, you will create a Password Reset
File. Once you reset a password, the Password Reset File you used is no longer valid.
When creating a user with the Application Administration role and assigning a new password
When changing the password for a user with the Application Administration role
Accessing the Create Password Reset File option in the Administer Users dialog.
Note: Any Password Reset Files that have already been used to reset passwords are no longer valid and will
not work. Password Reset Files from other users or other databases also will not work. Only the
Password Reset File that you created previously with your User Name and Password will work.
The database can be configured to optimize the handling of large cases. Specifically it may decrease the
processing time for large cases. However, if you choose to optimize the database, it will require additional disk
resources on the database host computer.
To improve performance, when you create new cases in FTK 6.0 or newer, a new database is created for each
new case.
In addition to improved performance, if you configured the database location to be in the case folder, the
database files are located under the case folder. This allows you to easily back up a case at the folder level as
the case data and the database for the case are all under one case folder.
For example, if you create a case called Investigation, select the In the case folder option for the database
location, and want to find the database files for that case, you could go to your FTK Cases folder (this is the file
you listed as the case folder directory), click on the Investigation folder (this is the individual case folder), and
open the DB folder, which contains all the database files for this case. If the In the case folder option is not
selected, the database will be found in the appropriate Case folder located within the main MS SQL or
PostgreSQL database files.
Important: Previous to FTK 6.0, all database files were stored within the main database and must be accessed
through either the MS SQL or PostgreSQL database folder.
This feature is enabled by default.
This functionality is also found in the Examiner main window under Manage > KFF.
The functionality is the same regardless of how you launch KFF Admin.
This shows the KFF Server Type and Server Address. You can test communication with the KFF Server.
For infomration about configuring a KFF Server, see Getting Started with KFF (Known File Filter) (page 225).
Field Description
User Name Enter the name that the user is known as in program logs and other system
information.
Full Name Enter the full name of the user as it is to appear on case reports.
Password Enter and verify a password for this user.
Email Address Enter a valid email address; this will be used for any notifications.
Role Assign rights to the selected user name using roles. The default roles are:
Application Administrator: Can perform all types of tasks, including add-
ing and managing users.
Case/Project Administrator: Can perform all of the tasks an Application
Administrator can perform, with the exception of creating and managing
users.
Case Reviewer: Cannot create cases; can only process cases.
Managing Roles
A role is a user group with a specific set of permissions to perform defined investigative tasks. The Administrator
can add new roles, modify existing roles, and view a role’s permissions.
Roles that apply to all cases in a database are granted from the Database > Administer Users dialog.
Roles that apply to a specific case are granted from the Case > Assign Users dialog.
The permissions that are applied through roles are cumulative, meaning that if you apply more than one, the
greatest amount of rights and permissions become available.
When you assign roles that apply globally across the database, you cannot reduce the rights on a case-by-case
basis.
AccessData recommends that when you first create a user account, save the account and close the dialog
without setting a role. Then click Case > Assign Users to assign roles on a case-by-case basis. You can also
About Permissions
Permissions are like user rights on a network. They define what types of information and which machines a user
in a specific role can access, and what tasks can be performed by users with that Role.
Differences Between the Case Administrator and Application Administrator Roles in the
Examiner
Default Case Administrator and Application Administrator Role Comparison (In the Examiner)
Export to Image x x
Reports x x
Timeline Report x x
Evidence Add/Remove x x
Additional Analysis x x
Filter New x x
On x x
Import x x
Tab Filter x x
Disk Viewer x x
Disconnect Agents x x
Execute SQL x
Manage KFF x x
PhotoDNA x x
Modifying Roles
You can modify a role to meet your needs.
Note: Be sure to view all pages of the Rights field. Use the drop down menu to toggle between pages.
Important: A functional email address must be associated with each user being added to the case or the
notification will not be sent.
Note: The Restore Optimization option in Additional Analysis will not appear if Database Optimization was set
in the New Case Wizard to be performed following processing, or if it has been performed already on the
current case from either place.
Configuring KFF
To use the Known File Filter feature (KFF), you must configure a KFF Server.
In this dialog, you specify the type of KFF Server and its location.
For information on configuring the KFF Server, see Getting Started with KFF (Known File Filter) (page 225).
After the KFF server has been configured, you can click Test Server to test the communication with the KFF
Server.
The Application Administrators manage all Shared features. It is a good practice to set these up to the extent you
are able, before you create your first case. Of course, new ones can be added at any time and copied to existing
cases. Shared features can be created within cases by both Application and Case Administrators, and Shared
(added to the global list).
Since each Shared feature has been documented to some extent in other chapters of the User Guide, only the
parts of the features that apply specifically to Application Administrators are explained here. Cross-references
are added to provide quick access to more complete information.
There are no default carvers listed in the Manage Shared Custom Carvers dialog. It contains only custom-
designed carvers that are shared.
Case Management
This part contains information about managing cases. It contains the following chapters:
Introducing FTK Case Management (page 109)
Creating and Configuring New Cases (page 56)
Managing Case Data (page 95)
Working with Evidence Image Files (page 103)
Working with Static Evidence (page 116)
Working with Live Evidence (page 139)
Filtering Data to Locate Evidence (page 141)
Working with Labels (page 161)
Decrypting Files (page 165)
Exporting Data from the Examiner (page 186)
Getting Started with KFF (Known File Filter) (page 225)
About Cerberus Malware Analysis (page 201)
Running Cerberus Malware Analysis (page 219)
Case Management | 55
Chapter 4
Creating and Configuring New Cases
This chapter explains how to create a new case and configure the case options. If you have cases that were
created in version 2.2 or later, you can convert them to the latest version.
Note: If you attempt to open a case you have not been assigned to, you will receive a message saying, “You
have not been assigned to work on this case.” This is because you must be authenticated to open the
case.
This feature requires an add-on license for iSubmit. Please see your sales representative for details.
A key will need to be created before you can connect to the iSubmit database.
Note: The version of AccessData software must match the current version you are using. For example FTK 6.3
and 6.3.1 will both use 6.3.
Note: You will need to put the iSubmit key in the registry for this to work.
Note: If the case folder directory is not shared, an error occurs during case creation.
8. (Optional) In the Database Directory field you can specify a location for where to store database
directory files. You can check the In the case folder option to save the database directory in the case
folder. If you do not specify these options, the database directory is saved to the default location of the
database.
Note: The location that you specify for Database Directory is relative to your database computer. If you
intend to specify a location that is on a different computer than your database, for example in a
multi-box scenario, then you must enter a network path.
Important: If using a UNC path for the case folder, and selecting the In the case folder option for the
database directory, and if the database process isn't running as a network user, it will not be able to
access the UNC path and will therefore fail to create the database files.
9. Configure the default processing options for the case by either using a processing profile or using
custom settings.
See Configuring Detailed Options for a Case on page 59.
10. If you wish to open the case as soon as it is created, mark Open the case.
11. Click OK to create the new case.
The following are some examples of how your data can be processed:
When you create a case (Detailed Options) -- these become the default options for the case.
See Evidence Processing Options (page 67)
When you add evidence to an existing case (Refinement Options) -- you can either use or override the
case defaults.
See Configuring Evidence Refinement (Advanced) Options (page 87)
When you perform an Additional Analysis on a case.
See Using Additional Analysis (page 128)
Each processing option that you enable increases the time that it take to process the evidence. Depending on
your situation, you may want to select more or fewer options.
For example, in one scenario, you may want to process the evidence as quickly as possible. In this case, you
can use a pre-defined “Field Mode” that deselects almost all processing options and therefore takes the shortest
Creating and Configuring New Cases Configuring Detailed Options for a Case | 59
amount of time. After the initial processing, you can perform an Additional Analysis and enable additional
processing options.
In another scenario, you may want to take the time to categorize and index files during the initial processing, so
you can enable those options. This will take a significant amount of time for a large evidence set.
There is a Pause button available in the Data Processing Status window for situations where you need to
interrupt evidence processing. Once you are ready to continue, select the Resume option.
You configure the default processing options for a case in one of the following ways:
Note: One factor that may influence which processing options to select is your schedule. If you disable
indexing, it shortens case processing time. The case administrator can return at a later time and index the
case if needed. The fastest way to create a case and add evidence is to use Field Mode.
Creating and Configuring New Cases Configuring Detailed Options for a Case | 60
Using Processing Profiles
For example, you may need to focus on certain types of data in a case, such as images and videos. In this
example, you can create a processing profile that enables the following processing options:
KFF
Each time you create this kind of case, you can use a profile with these options set as default and you won't
need to manually specify them again.
Processing profiles are used at the case level. Specifically, when you create a case, you can select a processing
profile from a drop-down list as the default processing options for that case. Any time that you add evidence to
that case, the profile's setting will be the default "Refinement Options". This saves you time by not having to
reconfigure processing options each time you add evidence to the case. However, when you add evidence to a
case, you can modify the processing options for that evidence set. The profile is simply a set of default settings
for the case.
Processing profiles are stored in the database. It is important to note that the profile itself does not get saved
with the case but only the processing options that are in the profile.
Forensic processing (these were the Factory Defaults in version 4.x and earlier)
eDiscovery processing
Summation processing
Basic assessment
Fieldmode
See About Pre-configured Processing Profiles on page 62.
When you create a case, you can use one of the pre-configured profiles or create/select a custom profile. If you
create a custom profile, you can save it with a unique name so that you can re-use it in a different case.
Creating and Configuring New Cases Configuring Detailed Options for a Case | 61
You can choose which profiles populate in the five one-click processing profile buttons for ease of use. The pre-
configured profile options and your other custom profiles will still be available in the drop down menu.
You can also edit, delete, import, or export custom processing profiles.
You can also set custom processing options for a case without saving them to a profile.
This list of processing options is the same as the Factory Defaults in version 4.x.
For a description of processing options, see Evidence Processing Options (page 67)
Creating and Configuring New Cases Configuring Detailed Options for a Case | 62
eDiscovery The eDiscovery profile allows the processed evidence to be easily imported into AD eDiscovery.
processing
These options include:
MD5 Hash
Flag Duplicate Files
Expand Compound Files
File Signature Analysis
dtSearch Text Index
Document Content Analysis
Don’t Expand Embedded Graphics
Include Message Headers
Do not include document metadata in filtered text
Enable Advanced De-duplication Analysis
Propagate Email Attributes
Create Email Threads
Cluster Analysis
Include Extended Information in the Index
Summation The Summation profile allows the processed evidence to be easily imported into AD Summation.
processing
These options include:
Flag Duplicate Files
Expand Compound Files
File Signature Analysis
Flag Bad Extensions
dtSearch Text Index
Create Thumbnails for Graphics
Generate Common Video File
Document Content Analysis
Entity Extraction (Doc. Content)
Don’t Expand Embedded Graphics
Include Message Headers
Do not include document metadata in filtered text
Enable Advanced De-duplication Analysis
Propagate Email Attributes
Create Email Threads
Cluster Analysis
Include Extended Information in the Index
Enable ‘Standard Viewer’
Basic This profile includes the following processing options:
assessment Expand Compound Files
Include Deleted Files
Include File Slack
Include Free Space
Include Message Headers
Field mode FTK Field Mode disables the standard processing options when processing evidence. This speeds
up processing. You can then re-enable processing options through Additional Analysis.
The Job Processing screen always shows 0 for Queued when Field Mode is enabled, because
items move directly from Active Tasks to Completed.
Creating and Configuring New Cases Configuring Detailed Options for a Case | 63
Creating a Custom Processing Profile
You can create a processing profile by selecting a set of processing options and then saving them as a profile.
Creating and Configuring New Cases Configuring Detailed Options for a Case | 64
Managing Processing Profiles
You can do the following to manage processing profiles.
Edit You can edit an existing custom profile. You cannot edit the five pre-configured profiles.
To edit a profile, you select an existing profile, make the desired changes, save the profile, and
confirm that you want to replace the existing profile.
Set as Default You can set a processing profile as the global default. Whenever you create a new case, the
default profile is listed. If a profile not associated with a button has been set as the default,
none of the buttons will appear greyed out and the default profile name will appear in the
Profiles drop down.
If you delete a custom profile that has been selected as the default, the profile is deleted and
the Forensic processing profile becomes the default.
Lock/Unlock You can lock a profile so that others cannot edit or delete it. Any pre-defined profiles cannot
be unlocked.
Export You can export a custom profile so that you can archive it or use it on a different computer. The
exported settings are saved in xml format.
Import You can import a profile that has been previously exported.
Creating and Configuring New Cases Configuring Detailed Options for a Case | 65
3. Once you have selected a position, click Save.
The new option will now be shown on the selected button. The profile option formerly in that position will
no longer be associated with a button, but will still be shown in the Profile drop down list.
Creating and Configuring New Cases Configuring Detailed Options for a Case | 66
Evidence Processing Options
The following table outlines the Evidence Processing options.
Process Description
MD5 Hash Creates a digital fingerprint using the Message Digest 5 algorithm, based on the
contents of the file. This fingerprint can be used to verify file integrity and to
identify duplicate files.
SHA-1 Hash Creates a digital fingerprint using the Secure Hash Algorithm-1, based on the
contents of the file. This fingerprint can be used to verify file integrity and to
identify duplicate files.
SHA-256 Hash Creates a digital fingerprint using the Secure Hash Algorithm-256, based on the
contents of the file. This fingerprint can be used to verify file integrity and to
identify duplicate files. SHA-256 is a hash function computed with 32-bit words,
giving it a longer digest than SHA-1.
Flag Duplicate Files Identifies files that are found more than once in the evidence. This is done by
comparing file hashes.
KFF Enables the Known File Filter (KFF) that lets you identify either known
insignificant files that you can ignore or known illicit or dangerous files that you
want to be alerted to.
When you enable KFF, you must select a KFF Template to use. You can select
an existing KFF Template from the drop-down menu or click ... to create a new
one.
See Using the Known File Filter (KFF) on page 259.
Expand Compound Files Automatically opens and processes the contents of compound files such as ZIP,
email, and OLE files.
See Expanding Compound Files on page 70.
The option File Signature Analysis is not forced to be selected. This lets you
initially see the contents of compound files without necessarily having to process
them. Processing can be done later, if it is deemed necessary or beneficial to the
case by selecting File Signature Analysis.
Include Deleted Files Checked by default. Un-check to exclude deleted files from the case.
File Signature Analysis Analyzes files to indicate whether their headers or signatures match their
extensions. This option must be selected if you choose Registry Summary
Reports.
Flag Bad Extensions Identifies files whose types do not match their extensions, based on the file
header information. This option forces the File Signature Analysis option to be
checked.
Process Description
dtSearch® Text Index Stores the words from evidence in an index for quick retrieval. Additional space
requirement is approximately 25% of the space required for all evidence in the
case.
Click Indexing Options for extensive options for indexing the contents of the
case.
Generated text that is the result of a formula in a document or spreadsheet is
indexed, and can be filtered.
Generate Common When you process the evidence in your case, you can choose to create a
Video File common video type for videos in your case. These common video types are not
the actual video files from the evidence, but a copied conversion of the media
that is generated and saved as an MP4 file that can be previewed on the video
tab.
See Examining Videos on page 333.
HTML File Listing Creates an HTML version of the File Listing in the case folder.
CSV File Listing The File Listing Database is now created in CSV format instead of an MDB file
and can be added to Microsoft Access.
Data Carve Carves data immediately after pre-processing. Click Carving Options, then
select the file types to carve. Uses file signatures to identify deleted files
contained in the evidence. All available file types are selected by default.
For more information on Data Carving, see Data Carving (page 78).
Meta Carve Carves deleted directory entries and other metadata. The deleted directory
entries often lead to data and file fragments that can prove useful to the case,
that could not be found otherwise.
Optical Character Scans graphics files for text and converts graphics-text into actual text. That text
Recognition (OCR) can then be indexed, searched and treated as any other text in the case.
For more detailed information regarding OCR settings and options, see Running
Optical Character Recognition (OCR) (page 82).
Explicit Image Detection Click EID Options to specify the EID threshold for suspected explicit material
found in the case.
See Evaluating Explicit Material on page 330.
EID is an add-on feature. Contact your sales representative for more information.
Process Description
Registry Reports Creates Registry Summary Reports (RSR) from case content automatically. Click
RSR Directory to specify the location of the RSR Templates. When creating a
report, click the RSR option in the Report Wizard to include the RSR reports
requested here. RSR requires that File Signature Analysis also be selected. If
you try to select RSR first, an error will pop up to remind you to mark File
Signature Analysis before selecting RSR.
Include Deleted Files Enabled by default; to force exclusion of deleted files, unmark this check box.
Send Email Alert on Job Opens a text box that allows you to specify an email address where job
Completion completion alerts will be sent.
Decrypt Dell Encryption See Decrypting Dell Encryption Files (Dell Data Protection | Encryption Server)
Files on page 178.
If you select to decrypt Dell Encryption files, the File Signature Analysis option
will automatically be selected as well.
Process Internet Processes internet browser history files so that you can see them in the detailed
Browser History for visualization timeline.
Visualization See Visualizing Internet Browser History Data on page 469.
Perform Automatic Disabled by default. Attempts to decrypt files using a list of passwords that you
Decryption provide
See About Decrypting Files on page 165.
Language Identification Disabled by default. Analyzes the first two pages of every document to identify
the languages contained within. The user will be able to filter by a Language field
within review and determine who needs to review which documents based on the
language contained within the document.
See Identifying Document Languages on page 350.
Document Content Disabled by default. Analyzes the content and groups it according to topic in the
Analysis Overview tab. When selected, the DCA Options button is also activated and
opens the Document Content Analysis Options.
See Analyzing Document Content on page 435.
Entity Extraction Disabled by default. Identifies and extracts specific types of data in your
(Document Content) evidence. You can select to process one or all of the following types of entity
data:
Credit Card Numbers
Phone Numbers
Social Security Numbers
In the Examiner, under the Document Content node in the Overview tab, you can
view the extracted data.
See Using Entity Extraction on page 435.
Process Description
Generate System Extracts data and populates the System Information tab.
Information See Viewing System Information on page 427.
If you expand data, you will have files that are generated when the data was processed and was not part of the
original data. There are tools to help you identify generated data.
See Filtering the Compound File Expansion Options List on page 74.
Important: If you expand data, you will have files that are generated when the data was processed and were not
part of the original data. There are tools to help you identify generated data.
See Examining Miscellaneous Evidence on page 339.
See Identifying Processing-Generated Data on page 340.
See Relating Generated Files to Original Files on page 340.
If you have labeled or hashed a family of files, then later choose to expand a compound file type that is
contained within that label or family, the newly expanded files do not inherit the labeling from the parent,
and the family hashes are not automatically regenerated.
Many Lotus Notes emails, *.NSF, are being placed in the wrong folders in the Examiner.
This is a known issue wherein Lotus Notes routinely deletes the collection indexes. Lotus Notes client
has the ability to rebuild the collections from the formulas, but Examiner cannot. So if Lotus Notes data is
acquired shortly after the collections have been cleared, then the Examiner does not know where to put
the emails. These emails are all placed in a folder named "[other1]."
To work around: Open the NSF file in the Lotus Notes client, and then close (you may need to save), then
acquire the data and process it. The emails will all be in the right folder because the view collections are
recreated.
Compound file types such as AOL, Blackberry IPD Backup, EMFSpool, EXIF, MSG, PST, RAR, and ZIP
can be selected individually for expansion. This feature is available from the Case Manager new case
wizard, or from the Add Evidence or Additional Analysis dialogs.
Only the file types selected are expanded. For example, if you select ZIP, and a RAR file is found within
the ZIP file, the RAR is not expanded.
All This is the full list of supported Compound File Expansion Options.
All Communications This option includes all supported file types that are used for communication.
All Mobile This option includes all supported file types found on any mobile device.
Android This option includes all supported file types found on Android devices.
Browsers This option includes all supported file types used within a browser.
iOS This option includes all supported file types found on Apple devices.
Windows This option includes all supported file types used within a Windows system.
Selecting the Cancel button will erase all changes and the default options will populate if the dialog is re-opened.
Indexing a Case
All evidence should be indexed to aid in searches. Index evidence when it is added to the case by checking the
dtSearch Text Index box on the Evidence Processing Options dialog, or index after the fact by clicking and
specifying indexing options.
Scheduling is another factor in determining which process to select. Time restraints may not allow for all tasks to
be performed initially. For example, if you disable indexing, it shortens the time needed to process a case. You
can return at a later time and index the case if needed.
Note: Search terms for pre-processing options support only ASCII characters.
Option Description
Letters Specifies the letters and numbers to index. Specifies Original, Lowercase,
Uppercase, and Unaccented. Choose Add or Remove to customize the list.
You may need to add characters to this list for specific index searches to function
properly. For example, you may want to do an index search for
‘[email protected]’. By default, the @ symbol is treated as a space and is not
indexed.
See Spaces on page 77.
To have the @ symbol included in the index, you would need to do two things:
Remove the @ from the Spaces list.
Add the @ to the Letters list.
Noise Words A list of words to be considered “noise” and ignored during indexing. Choose Add
or Remove to customize the list.
Hyphens Specifies which characters are to be treated as hyphens. You can add standard
keyboard characters, or control characters. You can remove items as well.
Hyphen Treatment Specifies how hyphens are to be treated in the index. Options are:
Ignore
Hyphens will be treated as if they never existed. For example, the term “coun-
ter-culture” would be indexed as “counterculture.”
Hyphen
Hyphens will be treated literally. For example, the term “counter-culture”
would be indexed as “counter-culture.”
Space
Hyphens will be replaced by a non-breaking space. For example the term
“counter-culture” would be indexed as two separate entries in the index being
“counter” and “culture.”
All
Terms with hyphens will be indexed using all three hyphen treatments. For
example the term “counter-culture” will be indexed as “counterculture”, “coun-
ter-culture”, and as two separate entries in the index being “counter” and “cul-
ture.”
Option Description
Spaces Specifies which special characters should be treated as spaces. Remove
characters from this list to have them indexed as any other text. Choose Add or
Remove to customize the list.
You may need to remove characters from this list for specific index searches to
function properly. For example, you may want to do an index search for
‘[email protected]’. By default, the @ symbol is treated as a space and is not
indexed.
To have the @ symbol included in the index, you would need to do two things:
Remove the @ from the Spaces list.
Add the @ to the Letters list.
Ignore Specifies which control characters or other characters to ignore. Choose Add or
Remove to customize the list.
Max Word Length Allows you to set a maximum word length to be indexed.
Index Binary Files Specify how binary files will be indexed. Options are:
Index all
Skip
Index all (Unicode)
Presumed Date Format If date recognition is enabled, specify how ambiguous dates should be formatted
For Ambiguous Dates when encountered during indexing. Options are:
MM/DD/YY
DD/MM/YY
YY/MM/DD
Set Max Memory Allows you to set a maximum size for the index.
Auto-Commit Interval Allows you to specify an Auto-Commit Interval while indexing the case. When the
(MB) index reaches the specified size, the indexed data is saved to the index. The size
resets, and indexing continues until it reaches the maximum size, and saves
again, and so forth.
Note: The Indexing Options dialog does not support some Turkish characters.
Data Carving
Data carving is the process of looking for data on media that was deleted or lost from the file system. Often this
is done by identifying file headers and/or footers, and then “carving out” the blocks between these two
boundaries.
AccessData provides several specific pre-defined carvers that you can select when adding evidence to a case.
In addition, Custom Carvers allow you to create specific carvers to meet your exact needs.
Data carving can be selected in the New Case Wizard as explained below, or from within the Examiner. In
addition, because Custom Carvers are now a Shared feature, they can be accessed through the Manage menu.
These are explained below.
Pre-defined Carvers
The following pre-defined carvers are available. Some carvers are enabled by default.
Pre-defined Carvers
Carver Enabled by default?
AOL bag files Yes
BMP files Yes
EMF files Yes
GIF files Yes
HTML files Yes
JPEG files Yes
LNK files Yes
OLE files (MS Office) Yes
PDF files Yes
PNG files Yes
TIFF files Yes
ZIP files Yes
AIM Chat Logs No
EML No
Facebook Status Updates No
Facebook Chat No
Facebook Email Artifact No
Facebook Mail Snippets No
Facebook Fragment No
Gmail Email Message No
Gmail Parsed Email No
Google Talk Chats No
When you are in the New Case Wizard in Detailed Options > Evidence Processing, click Data Carve >
Carving Options to open the dialog shown below.
If you already have a case open with evidence added and processed, click the following:
Evidence > Additional Analysis > Data Carve > Carving Options
Standard Data Carving gives you a limited choice of which file types to carve.
Note: It may help to be aware of the duplicate files and the number of times they appear in an evidence
set to determine intent.
4. Depending on the file type highlighted, the Selected Carver Options may change. Define the optional
limiting factors to be applied to each file:
Define the minimum byte file size for the selected type.
Define the minimum pixel height for graphic files.
Define the minimum pixel width for graphic files
5. Mark the box, Exclude KFF Ignorable files if needed.
6. If you want to define Custom Carvers, click Custom Carvers. (Custom Carvers are explained in the
next section.) When you are done with Custom Carvers, click Close.
7. In the Carving Options dialog, click OK.
Custom Carvers
The Custom Carvers dialog allows you to create your own data carvers in addition to the built-in carvers. Custom
Carvers can be created and shared from within a case, or from the Case Manager.
Application Administrators have the necessary permissions to access the Manage Shared Carvers dialog. Case
Administrators can manage the Custom Carvers in the cases they administer. Case Reviewers are not allowed
to manage Custom Carvers.
Shared Custom Carvers are automatically available globally; but can be copied to a case when needed. Carvers
created within a case are automatically available to the case, but can be shared and thus made available
globally.
To access Manage Custom Carvers dialogs, click Manage > Carvers > Manage Custom Carvers (or Manage
Shared Carvers if you are an Application Administrator).
The Manage Shared Custom Carvers and Manage Custom Carvers dialogs are very similar. The difference is
whether you can copy the carvers to a case or make the carvers shared.
The Custom Carvers dialog allows you to define carving options for specific file types or information beyond
what is built-in. Once defined, these carving options files can be Shared with the database as well as exported
and imported for use in other cases. The original, local copy, remains in the case where it was created, for local
management.
Note: When adding signatures to a carver, the Signature is case sensitive check box is used when
carving for signatures that can be both upper or lower case. For example, <HTML> and <html>
are both acceptable headers for HTML files, but each of these would have a different signature in
hex, so therefore they are case sensitive.
The objects and files carved from default file types are automatically added to the case, and can be
searched, bookmarked, and organized along with the existing files.
However, custom carved data items are not added to the case until they are processed, and they
may not sort properly in the File List view. They are added to the bottom of the list, or at the top
for a Z-to-A search, regardless of the filename.
You can view the graphic files in the File Content View when it is selected in the File List View. The Natural tab
shows the graphic in its original form. The Filtered tab shows the OCR text that was added to the index.
OCR is only a helpful tool for the investigator to locate images from index searches. OCR results should
not be considered evidence without further review.
OCR can have inconsistent results. OCR engines by nature have error rates. This means that it is
possible to have results that differ between processing jobs on the same machine with the same piece of
evidence.
Some large images can cause OCR to take a very long time to complete. Under some circumstances,
they may not generate any output.
Graphical images that have no text or pictures with unaligned text can generate bad output.
OCR is best on typewritten text that is cleanly scanned or similarly generated. All other picture files can
generate unreliable output that can vary from run to run.
Options Description
File Types Lets you specify which file types to include in the OCR process during case
processing. For PDF files, you can also control the maximum filtered text size
for which to run OCR against.
Filtering Options Lets you specify a range in file size to include in the OCR process. You can
also specify whether or not to only run OCR against black and white, and
grayscale. The Restrict File Size option is selected by default. By default, OCR
file generation is restricted to files larger than 5K. If you do not want to limit the
size of OCR files, you must disable this option.
Options Description
1-100% The OCR confidence % score for a document that had a successful OCR
process; the higher the score, the higher the confidence.
No Score Available (2) The OCR results are from a previous version.
Minimal Confidence (1) The OCR extraction is not in a supported language or is not clear.
No Text Found (0) The OCR process did not identify any text to extract.
OCR Skipped (-1) The OCR process was skipped due to some condition.
OCR Extraction Error (-2) The OCR process failed for that file.
Blank The file does not need the OCR process; for example, a .DOC file or email.
Note: For data that is upgraded from a previous version, if a file has been previously processed with OCR, it will
show a value of 2. You can use the Additional Analysis tool, found in the Evidence menu, to re-OCR the
document and you will get the new OCR confidence score.
Profile
Name Level Description
X-DFT Default This is the most generally accurate. It is always selected.
(XS1)
X-FST Fast (XTB) This is the fastest. It scores a folder by the number of files it contains that meet
the criteria for a high likelihood of explicit material.
It is built on a different technology than X-DFT and does not use “regular” DNAs.
It is designed for very high volumes, or real-time page scoring. Its purpose is to
quickly reduce, or filter, the volume of data to a meaningful set.
X-ZFN Less False This is a profile similar to X-FST but with more features and with fewer false
Negatives negatives than X-DFT.
(XT2) You can apply this filter after initial processing to all evidence, or to only the
folders that score highly using the X-FST option. Check-mark or highlight those
folders to isolate them for Additional Analysis.
In Additional Analysis, File Signature Analysis must be selected for EID options to
work correctly.
5. When the profile is selected, click OK to return to the Evidence Processing dialog and complete your
selections.
AccessData recommends that you run Fast (X-FST) for folder scoring, and then follow with Less False
Negatives (X-ZFN) on high-scoring folders to achieve the fastest, most accurate results.
After you select EID in Evidence Processing or Additional Analysis, and the processing is complete, you must
select or modify a filter to include the EID related columns in the File List View.
To generate Registry Summary Reports and make them available for the case report
1. Ensure that File Signature Analysis is marked.
2. Mark Registry Reports.
3. Click RSR Directory.
4. Browse to the location where your RSR templates are stored.
5. Click OK.
Custom Identifiers provide a way for you to create and manage identifiers, and categorize the resulting files into
any part of the category tree on the Overview tab. You can select from an existing category, or create a new one
to fit your needs.
You can define identifiers using header information expected at a specific offset inside a file, as is now the case,
but in addition, you can categorize files based on extension.
Note: PDF files are now identified through the PDF file system and will no longer be identified through Custom
File Identification.
Parameter Description
Name The value of this field defines the name of the sub-category that will appear below the
selected Overview Tree category and the category column.
Category The general file category to which all files with a matching file signature should be
associated.
Offset The decimal offset of where the unique signature (see Value) can be found within the file
given that the beginning of the file is offset 0.
Note: The Offset must be in decimal format. The Value must be in hexadecimal bytes. Otherwise, you will see
the following error: Hex strings in the Offset field cause an exception error.
The following table describes the parameters for Custom Extension Mappings
Parameter Description
Name The value of this field defines the name of the sub-category that will
appear below the selected Overview Tree category and the category
column.
Category The general file category to which all files with a matching file
signature should be associated.
Extensions: Any file extension that should be associated to the selected Category.
Note: You must use at least one offset:value pair (hence the [...]+), and use zero or more OR-ed
offset:value pairs (the [...]*). All of the offset:value conditions in an OR-ed group are OR-ed
together, then all of those groups are AND-ed together.
Many factors can affect which processes to select. For example, if you have specific information otherwise
available, you may not need to perform a full text index. Or, if it is known that compression or encryption are not
used, an entropy test may not be needed.
Important: After data is excluded from an evidence item in a case, the same evidence cannot be added back
into the case to include the previously excluded evidence. If data that was previously excluded is
found necessary, the user must remove the related evidence item from the case, and then add the
evidence again, using options that will include the desired data.
Options Description
Include File Slack Mark to include file slack space in which evidence may be found.
Include Free Space Mark to include unallocated space in which evidence may be found.
Include KFF Ignorable (Recommended) Mark to include files flagged as ignorable in the KFF for
Files analysis.
Include OLE Streams and Mark to include Object Linked and Embedded (OLE) data streams, and Office
Office 2007 package 2007 (DOCX, and XLSX) file contents that are layered, linked, or embedded.
contents
Only add items to the case Applies selected criteria from both File Status and File Types tabs to the
that match both File Status refinement. Will not add items that do not meet all criteria from both pages.
and File Type criteria If this option is not checked, and if you set a File Status, such as From Email >
Include Only, then only the File Status value will be used and the File Type will
be ignored.
Exclusion Description
Refine Evidence To refine evidence by file date:
by File Date
1. Check Created, Last Modified, and/or Last Accessed.
2. In the two date fields for each date type selected, enter beginning and
ending date ranges.
Note: AccessData strongly recommends that you use the default index settings.
To refine an index
1. Within the Detailed Options dialog of the New Case wizard, click Index Refinement (Advanced) in the
left pane.
The Index Refinement (Advanced) menu is organized into two dialog tabs:
Refine Index by File Status/Type
Refine Index by File Date/Size
2. Click the corresponding tab to access each dialog.
3. Define the refinements you want for the current evidence item.
4. Click Reset to reset the menu to the default settings.
5. Click OK when you are satisfied with the selections you have made.
Options Description
Include File Slack Mark to include free space between the end of the file footer, and the end of a
sector, in which evidence may be found.
Include Free Space Mark to include both allocated (partitioned) and unallocated (unpartitioned)
space in which evidence may be found.
Include KFF Ignorable Mark to include files flagged as ignorable in the KFF for analysis.
Files
Include Message Headers Marked by default. Includes the headers of messages in filtered text. Unmark
this option to exclude message headers from filtered text.
Do not include document Not marked by default. This option lets you turn off the collection of internal
metadata in filtered text metadata properties for the indexed filtered text. The fields for these metadata
properties are still populated to allow for field level review, but the you will no
longer see information such as Author, Title, Keywords, Comments, etc in the
Filtered text panel of the review screen. If you use an export utility such as ECA
or eDiscovery and include the filtered text file with the export, you will also not
see this metadata in the exported file.
Include OLE Streams Includes Object Linked or Embedded (OLE) data streams that are part of files
that meet the other criteria.
From Email Specifies the way to treat email files. Options are:
Ignore status
Include only
Exclude
Include OLE Streams Includes Object Linked or Embedded (OLE) files found within the evidence.
Only add items to the Index Applies selected criteria from both File Status and File Types tabs to the
that match both File Status refinement. Will not add items that do not meet all criteria from both pages.
and File Type criteria
Exclusion Description
Refine Index by File Date To refine index content by file date:
1. Select Created, Last Modified, or Last Accessed.
2. In the date fields, enter beginning and ending dates within which to
include files.
AD Lab and eDiscovery have additional options available for advanced de-duplication analysis.
De-duplication is separated by email items and non-email items. Within each group, the available options can be
applied by case or by Custodian.
Note: This option is not enabled by default when using the eDiscovery Default processing profile.
The following table provides more information regarding each option and its description.
Option Description
Enable Advanced De-duplication Analysis
Email Items De-duplication Scope
Choose whether you want this de-duplication process to be applied at the Case
level, or at the Custodian level.
Case Level
People (Custodian) Level
Option Description
De-duplication Options
For each item type you check, AD Lab eliminates duplicates from the case as it
processes through the collected evidence. Uncheck an item type to keep all
duplicate instances in your case.
Available item types
Email To
Email From
Email CC
Email BCC
Email Subject
Email Submit Time
Email Delivery Time
Email Attachment Time
Email Attachment Count
Email Hash
Body Only
Body and Attachments
Choose whether you want this de-duplication process to be applied to the entire
case or at the custodian level.
Case Level
People (Custodian) Level
De-duplication Option
There is only one option available for non-email items; either you are going to de-
duplicate just the actual files, or if unmarked, you will de-duplicate actual files only,
or all files, including children, zipped, OLE, and carved files.
Propagate Email When an email has attachments or OLE items, marking this option causes the
Attributes email’s attributes to be copied and applied to all “child” files of the email “parent.”
Cluster Analysis Invokes the extended analysis of documents to determine related, near duplicates,
and email threads.
See Viewing Data in Volume Shadow Copies on page 381.
Configure the details by clicking NDA Options.
Cluster Analysis This lets you specify the options for Cluster Analysis.
Options You can specify which document types to process:
Documents
Presentations
Spreadsheets
Email
You can also specify the similarity threshold, which determines the level of similarity
required for documents to be considered related or near duplicates.
Option Description
Include Extended If you create a case in FTK and are going to review it in Summation or eDiscovery,
Information in the select this option to make the index data fully compatible with Summation/
Index eDiscovery.
Enable ‘Standard If you create a case in FTK and are going to review it in Summation or eDiscovery,
Viewer’ select this option to automatically create a set of SWF files for all document files
found during processing. These SWF files will be used as the default file rather
than the original file when annotating and redacting within the case and will be
created during processing for any file 1 MB or larger. Smaller files will be created
on-the-fly when selected in Review.
When opened in the Standard Viewer in eDiscovery or Summation, the converted
SWF file is displayed by default, rather than the original file. This enables users to
work on a file without first having to manually create a SWF file.
Note: This option is disabled by default, and when enabled, slows processing
speeds.
The AccessData website works best using Microsoft Windows Explorer. You will be required to create a
username and password if you have not done so in the past. If you have used this website previously, you will
need to verify your email address. The website normally remembers the rest of the information you enter.
For instructions on converting cases, see the Migrating Cases document located at
http://www.accessdata.com/support/product-downloads/ftk-download-page
Case backup can also be used when migrating or moving cases from one database type to another. For
example, if you have created cases using 4.1 in an Oracle database and you want to upgrade to 5.0.x and
migrate the case(s) to a PostgreSQL database. Another example is if you have created cases using 5.0.x in an
Oracle database and you want to move the case(s) to the same version that is running a PostgreSQL database.
When you back up a case, the case information and database files (but not evidence) are copied to the selected
destination folder. AccessData recommends that you store copies of your drive images and other evidence
separate from the backed-up case.
Important: Case Administrators back up cases and must maintain and protect the library of backups against
unauthorized restoration, because the user who restores an archive becomes that case’s
administrator.
Note: Backup files are not compressed. A backed-up case requires the same amount of space as that case’s
database table space and the case folder together.
Starting in 4.2, all backups are performed using the database independent format rather than a native format.
The database independent format facilitates migrating and moving cases to a different database application or
version. You can perform a backup using a native format using the dbcontrol utility. For more information, contact
AccessData Technical Support.
Important: Do not perform a backup of a case while any data in that case is being processed.
To back up a case
1. In the Case Manager window, select the case to back up. You can use Shift + Click, or Ctrl + Click to
select multiple cases to backup.
2. Do one of the following:
Click Case > Backup > Backup.
Right-click on the case in the Cases list, and click Backup.
3. In the field labeled Backup folder, enter a destination path for the backup files.
Important: Choose a folder that does not already exist. The backup will be saved as a folder, and when
restoring a backup, point to this folder (not the files it contains) in order to restore the case.
4. (Option) Use database independent format.
All backups are performed using the database independent format. You cannot change this option.
Each case you back up should have its own backup folder to ensure all data is kept together and
cannot be overwritten by another case backup. In addition, AccessData recommends that backups
be stored on a separate drive or system from the case, to reduce space consumption and to reduce
the risk of total loss in the case of catastrophic failure (drive crash, etc.).
The absolute path of the case folder is recorded. When restoring a case, the default path is the
original path. You can choose the default path, or enter a different path for the case restore.
Note: You will need to have the port number, case ID, and backup path before you begin the database-only
backup process.
The Archive and Detach function copies that case’s database table space file to the case folder, then deletes it
from the database. This prevents two people from making changes to the same case at the same time,
preserving the integrity of the case, and the work that has been done on it. Look for filename DB fn. Archive
keeps up to four backups, DB f0, DB f1, DB f2, and DB f3.
To archive a case
1. In the Case Manager, select the case to archive.
2. Click Case > Backup > Archive.
3. A prompt asks if you want to use an intermediate folder.
The processing status dialog appears, showing the progress of the archive. When the archive
completes, close the dialog.
Note: The cases folder is no longer placed in a default path; instead it is user-defined.
The Archive and Detach function copies that case’s database table space file to the case folder, then deletes it
from the database. This prevents two people from making changes to the same case at the same time,
preserving the integrity of the case, and the work that has been done on it.
Note: The cases folder is no longer placed in a default path; instead it is user-defined.
3. Find and open the sub-folder for the archive (DB fn).
You may view the file names as well as Date Modified, Type, and Size.
The Attach feature copies that case’s database table space file into the database on the local machine.
Note: The database must be compatible and must contain the AccessData schema.
Note: Do not use the Restore... function to attach an archive (instead use Attach...).
To restore a case
1. Open the Case Manager window.
2. Do either of these:
Click Case > Restore > Restore.
Right-click on the Case Manager case list, and click Restore > Restore.
3. Browse to and select the backup folder to be restored.
4. (Optional) Select Specify the location of the DB files and browse to the path to store the database
files for this case.
4a. Select In the case folder to place the database files in subfolderof the case folder.
5. You are prompted if you would like to specify a different location for the case folder. The processing
status dialog appears, showing the progress of the archive. When the archive completes, close the
dialog.
To verify an evidence image’s integrity, a hash of the current file is generated and allows you to compare that to
the hash of the originally acquired drive image.
Column Description
Image Name Displays the filename of the evidence image to be verified.
Path Displays the path to the location of the evidence image file.
Working with Evidence Image Files Verifying Drive Image Integrity | 103
2. Click either Calculate, or Verify according to what displays in the Command column, to begin hashing
the evidence file.
The Progress dialog appears and displays the status of the verification. If the image file has a stored hash, when
the verification is complete, the dialog shows and compares both hashes. Completing these processes may take
some time, depending on the size of the evidence, the processor type, and the amount of available RAM.
Full disk images RAW/dd, E01, and S01 can be mounted Physically. Partitions contained within full disk images,
as well as Custom Content Images of AD1 and L01 formats can be mounted Logically. The differences are
explained in this section.
Mount a full disk image with its partitions all at once; the disk is assigned a Physical Drive name and the
partitions are automatically assigned a drive letter beginning with either the first available, or any
available drive letter of your choice.
A full disk image mounted physically, and assigned a Physical Drive name that can be read using Imager
or with any Windows application that performs Physical Name Querying.
Mount images of multiple drives and/or partitions. The mounted images remain mounted until unmounted
or until Imager is closed.
Mounted images can be easily unmounted in any order, individually, or all at once.
A logically mounted image may be viewed in Windows Explorer as though it were a drive attached to the
computer, providing the following benefits:
File types with Windows associations can be viewed in their native or associated application, when
that application is installed locally.
Anti-virus applications can be run on the mounted image.
Because the logically mounted image is seen as a drive in Windows Explorer, it can be shared, and
viewed from remote computers when Remote Access has been configured correctly.
Files can be copied from the mounted image to another location.
Mount NTFS / FAT partitions contained within images as writable block devices. This feature caches
sections of a read-only image to a temporary location allowing the user to “write” to the image without
compromising the integrity of the original image.
Once mounted via the write cache mount method, the data can then be leveraged by any 3rd party tools
which require write access.
Note: When Logically mounting an image, the drive or partition size displays incorrectly in the Windows Start >
Computer view. However, when you open the “drive” from there, the folders and files contained within the
mounted image do display correctly.
E01, S01, and RAW/dd images are drive images that have the disk, partition, and file structure as well as drive
data. A physical disk image can be mounted Physically; the disk image partitions can be mounted Logically.
Working with Evidence Image Files Characteristics of a Logically Mounted Image | 105
Note: If you are mounting an HFS image of a Mac drive, you must choose
File System / Read Only to view contents of the drive. Otherwise, it will appear empty, and may
prompt you to format the drive.
7. Click Mount.
All the related mount information will be displayed in the Mapped Image List.
To mount another image, repeat the process. You can continue to mount images as needed, until you
run out of evidence to add, or mount points to use. Mounted images remain available until unmounted,
or until the program is closed.
8. Click Close to return to the main window.
Note: Check your existing mappings. If you map to a drive letter that is already in use, the original will
prevail and you will not be able to see the mapped image contents.
Working with Evidence Image Files Mounting a Drive Image as Writable | 106
Unmounting an Image
To unmount a mounted image
1. Click File > Image Mounting. The Map Image to Drive dialog opens.
2. Highlight the images to unmount, click Unmount. To unmount multiple mappings, click the first, then
Shift-click the last to select a block of contiguous mappings. Click a file, then Ctrl-click individual files to
select multiple non-contiguous mappings.)
3. Click Done to close the Map Image to Drive dialog.
Final Carve Processing jobs can be monitored in the Progress Window as Additional Analysis Jobs.
Note: Multiple user names in a case are automatically assigned to Original User Names when a case is
Archived, or Archived and Detached, and then restored. They can also be reassigned if necessary.
You can use the Examiner to locate, bookmark, and report on evidence.
Database The Database menu lets you administer users and roles.
Case The Case menu lets you create, backup, and delete cases. You can also assign users
to roles.
Tools The Tools menu lets you configure the processing engine, recover interrupted jobs and
restore images to a disk.
Manage The Manage menu lets you administrate shared objects such as columns, labels and
carvers.
Help The Help menu lets you access the user guide as well as view version and copyright
information.
Option Description
Exit Exits and closes the program.
Option Description
Log In/ Log Out Opens the authentication dialog for users to log into the database. You can log out the
currently authenticated user without closing the program.
Put each case in Creates a new database for each new case. This is enabled by default.
its own DB
Change password Opens the Change Password dialog. The currently authenticated user can change their
own password by providing the current password, then typing and re-typing the new
password.
See Changing Your Password on page 37.
Administer Users Lets you manage user accounts. The Application Administrator can change users’
roles.
See Adding New Users to a Database on page 42.
Session Opens the Manage Database Sessions dialog. Click Refresh to update the view of
Management current sessions. Click Terminate to end sessions that are no longer active.
See Managing Database Sessions on page 39.
Option Description
New Start a new case with the currently authenticated user as the Case Administrator. Case
Reviewers cannot create a new case.
See Creating a Case (page 58)
Assign Users Allows the Application Administrator or the Case Administrator to adjust or control the
rights of other users to access a particular case. Also allows the Administrator to control
which users can see which of the Shared Labels that are available.
See What You Can Do With Labels (page 161)
Backup Opens a dialog for specifying names and locations for backup of selected cases. You
can select multiple cases in the Case Manager to backup.
Options are:
Backup
Archive
Archive and Detach
See Managing Case Data on page 95.
Restore Opens a Windows Explorer instance for locating and restoring a selected, saved case.
Options are:
Restore an archived case
Attach an archived and detached case
See Managing Case Data on page 95.
Copy Previous Copy a case from a previous version (4.2 or later) into the database.
Case The use of a UNC folder path is no longer required beginning with version 4.2 and
newer.
To use copy from previous case you don't backup the case in the previous version, you
simply use the “Copy Previous Case” feature. If you want to use Backup, you can
backup the case in a previous version, such as 4.2 then restore it to the new version.
Copy Previous Case doesn’t recognize backed-up cases.
Remove This option lets you select a case and delete its index. If you remove a case’s index, you
Generated Index cannot use index searches until you create a new index. To create a new index, in the
Examiner, click Evidence > Additional Analysis. Select dtSearch® Text Index and
click OK.
ISubmit Forms Users have the ability to pull pertinent information from iSubmit and auto-create a case
with that information, allowing investigators to track a case from start to completion
within the iSubmit program.
See Opening a Case in iSubmit on page 57.
Refresh Case List Right-click in the Case List area and select Refresh Case List, or click F5 to refresh the
case list with any new information.
Option Description
Processing Engine Opens the Processing Engine Configuration dialog. Configure Remote Processing
Config Engines here. Specify Computer Name/IP Address, and Port. Add New, Remove,
Enable or Disable configured Processing Engines.
Recover Processing Allows you to recover jobs that were interrupted during processing so the processing
Jobs can be completed.
Show Progress Opens the Progress window so you can check the Processing Status.
Window
Restore Image to Copies a disk image to a disk other than the original.
Disk
Option Description
Carvers Manage Shared Custom Carvers. Custom Carvers created here can be copied to
cases.
See Managing Shared Custom Carvers on page 51.
Custom Identifiers Manage Shared Custom Identifiers. Custom Identifiers created here are automatically
made available to all new cases, but cannot be copied directly to earlier cases. They
must be exported and then imported into such cases.
Columns Manage Shared Column Settings. Custom Columns created here can be copied to
cases.
File Extension Manage Shared File Extension Mappings. File Extension Maps created here are
Maps automatically made available to all new cases, but cannot be copied directly to earlier
cases. They must be exported and then imported into such cases.
Filters Manage Shared Filters. Custom Filters created here can be copied to cases.
Labels Manage Shared Labels. Custom Labels created here can be copied to cases.
See Working with Labels on page 161.
KFF To use the Known File Filter feature (KFF), you must configure a KFF Server. In this
dialog, you specify the type of KFF Server and its location.
For information on configuring the KFF Server, see Getting Started with KFF (Known
File Filter) (page 225).
After the KFF server has been configured, you can click Test Server to test the
communication with the KFF Server.
Email Notification See Email Notifications for Case-Level Permissions on page 48.
Settigns
Indexed Serch See Adjusting the Weighting Criteria for an Index Search Term on page 414.
Term Weights
Option Description
User Guide To access the latest documentation, download the zip file from www.accessdata.com/
productdocs/ftk/ftk.zip.
About Provides version and build information, copyright and trademark information, and other
copyright and trade acknowledgements.
Live evidence describes any data that is not saved to an image prior to being added to a case. Such evidence is
always subject to change, and presents risk of data loss or corruption during examination. For example, a
suspect’s computer, whether because a password is not known, or to avoid the suspect’s knowing that he or she
is under suspicion, may be imaged live if the computer has not yet been or will not be confiscated.
Remote evidence describes data that is acquired from remote live computers in the network after the case has
been created.
Working with Static Evidence Static Evidence Compared to Remote Evidence | 116
Acquiring and Preserving Static Evidence
For digital evidence to be valid, it must be preserved in its original form. The evidence image must be
forensically sound, in other words, identical in every way to the original.
Adding Evidence
When case creation is complete, the Manage Evidence dialog appears. Evidence items added here will be
processed using the options you selected in pre-processing. Please note the following information as you add
evidence to your case:
You can now drag and drop evidence files from a Windows Explorer view into the Manage Evidence
dialog.
You can repeat this process as many times as you need to, for the number of evidence items and types
you want to add.
DMG (Mac) images are sometimes displayed as “Unrecognized File System.” This happens only when
the files are not “Read/Write” enabled.
If the DMG is a full disk image or an image that is created with the read/write option, then it is identified
properly. Otherwise the contents will not be recognized properly.
After processing, the Evidence Processing selected options can be found in the case log. You can also
view them by clicking Evidence > Add/Remove. Double-click on any of the evidence items to open the
Refinement Options dialog.
Popular mobile phone formats (found in many MPE images) such as M4A, MP4, AMR, and 3GP can be
recognized. These file types will play inside the Media tab as long as the proper codecs are installed that
would also allow those files to play in Windows Media Player.
To add static evidence (an exact image, or “snapshot” of electronic data found on a hard disk or other data
storage device) to an existing case, select Evidence > Add/Remove from the menu bar and continue.
Note: Use Universal Naming Convention (UNC) syntax in your evidence path for best results.
Click Refinement Options to override settings that were previously selected for evidence added to this case. If
you do not click Refinement Options here, the options that were specified when you created the case will be
used.
Working with Static Evidence Acquiring and Preserving Static Evidence | 117
After evidence has been added, you can perform many processing tasks that were not performed initially.
Additional evidence files and images can be added and processed later, if needed.
Option Description
Add Opens the Select Evidence Type dialog. Click to select the evidence type, and a Windows
Explorer instance will open, allowing you to navigate to and select the evidence you
choose.
Remove Displays a caution box and asks if you are sure you want to remove the selected
evidence item from the case. Removing evidence items that are referenced in bookmarks
and reports will remove references to that evidence and they will no longer be available.
Click Yes to remove the evidence, or click No to cancel the operation.
Description The options description of the evidence being added. This can be the source of the data,
or other description that may prove helpful later.
Evidence Group Click the drop-down to assign this evidence item to an Evidence Group. For more
information regarding Evidence Groups, see Working with Evidence Groups (page 121).
Time Zone The time zone of the original evidence. Select a time zone from the drop-down list.
Merge Case Merges fragmented index segments to improve performance of index-related commands,
Index such as Index Searching.
Note: The application automatically merges the case index when system resources allow
whether or not Merge Case Index is selected. Selecting this option forces the merge to
execute regardless of system resources.
Language Select the code page for the language to view the case in. The Language Selection dialog
Setting contains a drop-down list of available code pages. Select a code page and click OK.
Case KFF Opens the KFF Admin box for managing KFF libraries, groups, and sets for this case.
Options
Option Description
Refinement Displays the Refinement Options for Evidence Processing. This dialog has limited options
Options compared to the Refinement Options selectable prior to case creation.
Select the options to apply to the evidence being added, then click OK to close the dialog.
Configuring Default Processing Options for a Case (page 60)
When you are satisfied with the evidence options selected, click OK.
Note: To remove evidence from the list either before processing, or after it has been added to the case, select
the evidence item in the list, then click Remove.
Note: When you export data from a case as an image, and then add that image as evidence in either the same
case or a different case, the name of the image is renamed using a generic term. This prevents a user
generated image name from being indexed with evidence.
Note: Folders and files not already contained in an image when added to the case will be imaged in the
AD1 format and stored in the case folder. If you select AD1 as the image type, you can add these
without creating an image from the data.
5. Fill in the ID/Name field with any specific ID or Name data applied to this evidence for this case.
6. Use the Description field to enter an optional description of the evidence being added.
7. Select the Evidence Group that this evidence item belongs to. Click Manage to create and manage
evidence groups.
After processing, the Evidence Processing options selected for this case can be found in the case log. You can
also view them by clicking Evidence > Add/Remove. Double-click on any of the evidence items to open the
Refinement Options dialog.
At the bottom of every Refinement Options selection screen are the following options:
Note: The AD Alert and the AD Ignore Groups are selected by default.
4. Click Done to accept settings and return to the Manage Evidence dialog.
5. Click Language Settings to select the code page for the language to be used for viewing the evidence.
More detail is given in the following section.
6. Click OK to add and process the evidence.
The Language Setting dialog appears, allowing you to select a code page from a drop-down list. When the
setting is made, click OK.
You can mount and process restore points as a separate evidence items within a case. When restore points are
processed, a unique file system image for each restore point is created under the source NTFS partition.
You can view the files in the different file system images to analyze the difference between each restore point
and the files that are unique to each one. This helps you see how a system has changed over a period of time.
You can identify and parse files within the restore points and can search for evidence or malware hidden there.
You configure the processing of restore points when you add new evidence to a case. You can do this for a new
case or an existing case. If the evidence that you are adding contains an NTFS partition with Volume Shadow
Copy restore points, a Select Restore Points option is available. You can view all of the available restore points
and select the ones that you want to process.
When viewing the restore point data, you can use the following VSC-related columns the provides details about
the data.
VSC-related Columns
VSC-Delta Restore Point End Date of second restore point of a delta file
VSC-Delta Restore Point Start Date of first restore point of a delta file
VSC-Delta State The state of a delta file as compared in two restore points
VSC-Renamed From The name this file was renamed from
VSC-Renamed To The name this file was renamed to
VSC- Restore Point Date Date of restore point this file came from
Working with Static Evidence Examining Data in Volume Shadow Copies | 124
About Restore Point Processing Options
When you select restore points to process, you select the following options:
Important: You can select to process one or more restore point. If you do not select a restore point, you cannot
add it later within the same evidence item. You must re-add the NTFS partition as a new evidence
item and then select the desired restore points.
Full All restore points are added as full file systems. The benefit of this option is that you can
view all of the files in all of the restore points. However, you will potentially have duplicate
files, making the data set large. It can also make it more difficult to find the files that have
been deleted or modified.
If "Full" restore option is selected, you are warned if more than one restore point is checked.
You can add the evidence item again if you don’t choose to add it as a restore point image
originally. You can then choose restore points.
Working with Static Evidence Examining Data in Volume Shadow Copies | 125
Delta - Oldest to Instead of creating a full partition for each restore point, one full partition is created for the
latest oldest restore point selected while all newer restore points are created as deltas. The
advantage of this option is that you do not have duplicate files and the contents of the other
restore points are smaller, making it is easier to find the files or folders that have been
deleted or modified.
Delta - Latest to The latest restore point selected is created as a full image while all older restore points are
Oldest created as deltas.
4. You can view the content of each restore point to compare folders and files.
Working with Static Evidence Examining Data in Volume Shadow Copies | 126
5. You can use VSC-related columns to view detailed data.
See VSC-related Columns on page 124.
6. You can also use searches, filters, and so on to find and analyze the files in the share points.
Note: If you selected “Latest to Oldest”, the tree will show Current first, but then the deltas are sorted by the
oldest to the newest. If you selected “Oldest to Latest” the folders are sorted in the correct order.
Working with Static Evidence Examining Data in Volume Shadow Copies | 127
Using Additional Analysis
After evidence has been added to a case and processed, you may wish to perform other analysis tasks. To
further analyze selected evidence, click Evidence > Additional Analysis.
Most of the tasks available during the initial evidence processing remain available with Additional Analysis.
Specific items can also be targeted. Multiple processing tasks can be performed at the same time.
Make your selections based on the information in the table below. Click OK when you are ready to continue.
File Hashes These options create file hashes for the evidence. The Options are:
MD5 Hash: This hash option creates a digital fingerprint based on the
contents of the file. This fingerprint can be used to verify file
integrity and to identify duplicate files.
SHA-1 Hash: This hash option creates a digital fingerprint based on the
contents of the file. This fingerprint can be used to verify file
integrity and to identify duplicate files.
Flag Duplicates: Mark to flag duplicate files. This applies to all files in the case,
regardless of the Target Items selected.
Note: A blank hash field appears for unallocated space files, the same as if the files had not
been hashed at all. To notate in the hash field the reason for it being blank would slow the
processing of the evidence into the case.
KFF Enables the Known File Filter (KFF) that lets you identify either known insignificant files that
you can ignore or known illicit or dangerous files that you want to be alerted to.
When you enable KFF, you must select a KFF Template to use. You can select an existing
KFF Template from the drop-down menu or click ... to create a new one.
See Getting Started with KFF (Known File Filter) on page 225.
You can select to Recheck previously processed items when searching for new information,
or when a KFF group is added or changed.
Mark Recheck previously processed items if changes have been made to the KFF since the
last check.
Target Items Select the items on which to perform the additional analysis. Highlighted, and Checked items
will be unavailable if no items in the case are highlighted or checked. The following list shows
the available options:
Highlighted Items: Performs the additional analysis on the items highlighted in the
File List pane when you select Additional
Analysis.
Currently Listed Items: Performs the additional analysis on all the evidence items
currently listed in the File List pane when you select Additional
Analysis.
All Items: Performs the additional analysis on all evidence items in the
case.
PhotoDNA Enables PhotoDNA which lets you compare images in your evidence against known images in
a library.
See About PhotoDNA on page 275.
Refinement Include OLE Streams: Includes Object Linked or Embedded (OLE) items that are part of files
that meet the other criteria.
Job Options Send Email Alert on Job Completion: Opens a text box for the entry of an email address
destination for a notification email when these jobs complete.
Note: Outgoing TCP traffic must be allowed on port 25.
Important! These Emails are often filtered into Spam folders.
Indexed dtSearch® Index Choose dtSearch® Index to create a dtSearch index that
Search enables instantaneous index searches. Marking dtSearch Index
activates the Entropy Test check box.
Decryption Decrypt Dell Encryption See Decrypting Dell Encryption Files (Dell Data Protection |
Files: Encryption Server) on page 178.
If you select to decrypt Dell Encryption files, the File Signature
Analysis option will automatically be selected as well.
Perform Automatic Attempts to decrypt files using a list of passwords that you
Decryption: provide
See Decrypting Files Using Right-Click Auto Decryption on
page 171.
Other Tools:
Optical Character Parses text from graphics images and adds them to the Index.
Recognition: Creates an additional file with the OCR extension. Click OCR
Options to select specific graphics files to run the OCR process
on, or to set limiting factors such as size, or grayscale.
For more detailed information regarding OCR settings and
options, see Running Optical Character Recognition (OCR)
(page 82).
Cerberus Analysis: Lets you run the add on module for Cerberus Malware Triage.
You can click Cerberus Options to access additional options.
For more information see About Cerberus Malware Analysis
(page 201)
Language Identification Analyzes the first two pages of every document to identify the
languages contained within. The user will be able to filter by a
Language field within review and determine who needs to
review which documents based on the language contained
within the document.
See Identifying Document Languages on page 350.
Document Content Analyzes the content and groups it according to topic in the
Analysis Overview tab. When selected, the DCA Options button is also
activated and opens the Document Content Analysis Options.
See Using Document Content Analysis on page 439.
Entity Extraction Identifies and extracts specific types of data in your evidence.
(Document Content) You can select to process one or all of the following types of
entity data:
Credit Card Numbers
Phone Numbers
Social Security Numbers
In the Examiner, under the Document Content node in the
Overview tab, you can view the extracted data.
See Using Entity Extraction on page 435.
Generate System Extracts data and populates the System Information tab.
Information See Viewing System Information on page 427.
Miscellaneous tab
File Type File Signature Analysis: Analyzes files to indicate whether their headers or signatures match
Identification their extensions.
Before version 5.1, when performing additional analysis, if you selected certain processing
options, such as Flag Bad Extensions, dtSearch Text Index, Data Carve, OCR, Explicit Image
Detection, or Decrypt Dell Encryption Files, the File Signature Analysis option was
automatically selected and the option was disabled so that you could not un-select it. Stating
in version 5.1, if you select one of those options, the File Signature Analysis option is still
automatically selected, but the option is not disabled and you can manually un-select it.
Disable this option with care.
This does not apply to the initial processing options.
Carving Carves data immediately after pre-processing. Click Carving Options, then select the file
types to carve. Uses file signatures to identify deleted files contained in the evidence. All
available file types are selected by default.
For more information on Data Carving, see Data Carving (page 78).
Selecting this will also enable the Expand Compound Files option.
Miscellany
Expand Compound Files Expands and indexes files that contain other files.
(Email, OLE, ZIP, etc.): Include Deleted Files. Checked by default. Uncheck to exclude
deleted files from the case.
See Expanding Compound Files on page 70.
Create Thumbnails for Generates thumbnails for graphic files found in the evidence.
Graphics: Thumbnails are always .JPG format, regardless of the original
graphic format.
See Examining Graphics on page 324.
Generate Common Video When you process the evidence in your case, you can choose to
File create a common video type for videos in your case. These
common video types are not the actual video files from the
evidence, but a copied conversion of the media that is
generated and saved as an MP4 file that can be previewed on
the video tab.
See Examining Videos on page 333.
Flag Bad Extensions: Flags files that have extensions that do not match the file
headers.
HTML File Listing: Generate a list of files contained in the case, in HTML format.
CSV File Listing: Generate a list of files contained in the case, in CSV format. This
list can be used in any CSV supported spreadsheet application.
Don’t Expand Embedded This option lets you not process embedded graphics from email
Graphics. items. The default behavior has not changed. This option only
applies if you select it in the processing options.
Process Internet Browser Processes internet browser history files so that you can see
History for Visualization them in the detailed visualization timeline.
See Visualizing Internet Browser History Data on page 469.
Several specific purposes are served by enabling hashing during processing. First and foremost, when the MD5
Hash and/or SHA-1 Hash options are chosen along with the KFF option, each file item’s MD5 (and/or SHA-1)
value can be found within the KFF Library. The KFF Library does not contain any SHA-256 values. All of the file
items within the evidence that have been encountered and reliably cataloged by other investigators or US
Federal Government archivists can be identified. This feature lets you find the “known” files within the evidence,
which brings some intriguing advantages to the investigator.
These are described in Using the Known File Filter (KFF) (page 259).
Data Carving
Data carving is the process of locating files and objects that have been deleted or that are embedded in other
files.
You can recover and add embedded items and deleted files that contain information that may be helpful in
forensic investigations.
The data carving feature allows the recovery of previously deleted files located in unallocated space. Users can
also carve directory entries to find information about data or metadata.
Note: You can create custom carvers. In addition, you can manually carve for any file type for which you have
the correct header/footer/file length information, then save that file and add it to the case. In addition, you
can carve any data from any file, and save the selected data as a separate file and add it to the case.
Data carving can be done when adding evidence to a case, or by clicking Evidence > Additional Analysis >
Data Carve from within a case.
You can set additional options to refine the data carving process for the selected file types.
2. Click on a job type in the left pane, to view aggregate progress statistics for all of the items in a job type.
3. Click the expand icon to the left of a job type and then select an individual job or task to view the status
of jobs and tasks.
Details about each task in a job are displayed in the right hand pane under Messages.
You can also view the following status information about job processing:
Information Description
Overall The percentage complete as each task progresses.
Processed The number of items that have been processed. If you compare
the numbers in the Data Processing Status screen with the
numbers shown in Overview tab > Case Overview > File
Category, for example, you may notice that the numbers are not
the same. If there is a difference, the numbers in the case are
accurate; the numbers in the Data Processing screen on the
progress bar items are not.
Process State The current status of a job’s processing. When the job is
complete, this field displays Finished, and the Message box in the
right pane also displays Job Finished.
Name The file name of the evidence item that is processing in a task.
Process Manager The Process Manager computer is listed by its name or by its IP
Address. If your Evidence Processing Engine runs on the same
computer as the Examiner and the database, then “localhost” is
the default Process Manager. If you are using Distributed
Processing, the Process Manager or the Remote Processing
computer is listed.
Working with Static Evidence Viewing the Status and Progress of Data Processing and Analysis | 135
4. You can select from the following options:
Job Folder lets you open the location where the JobInformation.log for this job is stored. You can
view detailed information about the processing tasks and any errors or failures in the
JobInformation.log file.
Remove when finished lets you remove a task or job from the job list when it has completed
processing.
Pause lets you pause the current evidence processing task and adds an entry in the Messages box
listing the date and time it was paused.
Resume lets you resume the current processing task after having paused it and adds an entry in the
Messages box listing the date and time processing was resumed. This option only appears after the
Pause option has been enabled.
Cancel lets you stop the current task from running.
5. Click Close to close the display but not cancel any current tasks.
Important: Do not attempt to do any search prior to processing completion. You can view processed items from
the tabbed views, but searching during indexing may corrupt the index and render the case useless.
Note: Processing will have already begun by the time you change the processing priorities and your
desired item may not be first on the list. It will be the first priority once the item(s) currently
processing complete.
Evidence Tracking
Evidence information for all evidence items created using Imager, MPE+, or Cellebrite are available for export.
This allows for proper tracking of evidence.
General Information
Case information
Product and version of the software used to acquire the evidence image
Case number
Evidence number
Unique description
Sector count
Sector count
SHA1 checksum
Acquisition finished
Segment list
Verification finished
MD5 checksum
SHA1 checksum
You can acquire live evidence from only one computer at a time.
See also About Acquiring Digital Evidence (page 26) for details on the ways that evidence can be acquired, and
precautions to take before acquiring evidence.
About Filtering
Filters let you leverage item attributes to locate specific data very quickly. They reduce the amount of time that
you must examine data because they can narrow a large data set down to a very specific focus.
The Examiner includes a Filter toolbar, and a Filter Manager utility to help you work with filters. When you apply
a filter it limits the files that are displayed in the Examiner match the criteria of the filter.
Types of Filters
Global Filters Global filters apply across the entire Examiner interface. For example, if you globally
apply the filter Checked Files, only checked files are displayed, regardless of the tab,
pane, or window that you are viewing.
See also Using Global Filters (page 145)
Tab Filters Tab filters apply only to a specific tab. For example if you apply the Checked Files filter as
a tab filter specific to the Overview tab, when you switch to the Explore tab files that are
not checked are still displayed.
See also Using Tab Filters (page 145)
Custom Filters Custom filters are filters that you create. For example if an AccessData predefined does
not meet your exact needs, you can use the Filter Manager utility to create your own
custom filter.
See also Creating a Custom Filter (page 150)
Nested Filters A nested filter is a filter that contains filters within it. Nested filters let you leverage
several filters together to accomplish a specific goal. Nested filters prevent you from
having to create a complicated custom filter each time you need to use multiple filters
together. For example, a simple nested filter could include both Graphic Files and KFF
Alert Files as filters.
See also About Nested Filters (page 150)
Compound Compound filters are created in the Filter Manager utility. In the Filter Manager you can
Filters add many filters together. You choose to include and exclude a files that meet criteria.
Compound filters let you apply boolean logic to your compound filter.
See also Using Compound Filters (page 149)
Search Filters Search filters are added to a live search or an index search. They limit a search to only
display results that match the criteria contained within the search. You can use static
search filters in conjunction with global filters to very quickly apply two levels of filtering to
your search results.
See also Using Filtering with Searches (page 148)
Task Description
Apply filters globally Using Global Filters (page 145)
Apply filters in categories Using Filters with Category Containers (page 146)
Add filters to live searches Adding a Search Filter to Live Searches (page 148)
Add filters to index searches Adding a Search Filter to Index Searches (page 148)
Use filters when you create reports Using Filters with Reports (page 146)
Create, copy, and customize your own Creating a Custom Filter (page 150)
filters
Share filters between cases Sharing Custom Filters Between Cases (page 152)
Filter Component
Component Description
Name Filter names help you to locate a filter that you want to use.
Description Filter descriptions help you to understand what a filter is designed to accomplish.
Rule Filter rules instruct filters of the goal that you want to accomplish. Filters can have a single
rule or filters can also have multiple rules. Filter rules are the logic that help you make your
filters accomplish a specific task.
Filter rules are comprised of the following components:
Property Filter properties are the attributes that are associated with a data record. An
example of a property is File Type.
Operator Filter operators are the decision that you want to run against a property. Each
property has specific operators that are applicable to it. An example of an
operator that applies to the property “File Type” is the operator “Is Not”
Criteria Filter criteria let you define the conditions of the operator. Each operator has
specific criteria that are applicable to it. An example of criteria that applies to
the property Is Not is the criteria Word Template 2010.
Note: When working with time-based filters, the case time zone is used for date and times offsets.
In the Examiner, you can keep a filter selected, and still turn it on and off.
To turn a filter on or off, click the icon: that is next to the Filter drop-down menu. This leaves the
filter that you have currently selected in place but activates or deactivates it.
If you no longer want to use any global filter, in the Filter drop-down menu, click -unfiltered-.
Graphics
File Paths
File Properties
3. In the upper portion of the Report Options dialog, click the Filter drop-down menu and select the filter
that you want to apply.
You can apply specific filter for each of the report options.
4. After you have finished defining the report, click OK.
To see if you have a global filter applied, in the upper-left portion of the Examiner, check the Filter field to
see if a filter is applied. You can also check the filter icon to see if perhaps the filter is turned on or off.
To see if you have a tab filter applied, in the lower bar of the Examiner, check to see if a tab filter is
applied.
You can add search specific filters to a live search or to an index search. They limit a search to only display
results that match the criteria contained within the search. When you add a search specific filter to a search, the
search results window continues to limit the search results to apply to the filter.
You can use search filters in conjunction with global filters to very quickly apply two levels of filtering to your
search results.
Compound filters are not saved. They are only combined and applied as needed. As they are applied, the File
List pane automatically displays the results of the applied filter. The filter remains applied until it is changed.
To save you the time and effort of creating filters, AccessData has created many predefined filters that you can
leverage to accomplish the majority of your filtering tasks.
Before you create a new filter, you may be able to save time by copying a preexisting filter and modifying it to
meet your specific criteria.
See also Copying Filters (page 151)
Note: Select the checkbox at the top of the list to select all of the listed properties in the rules box at once.
Copying Filters
You can copy any existing filter to use as a basis to create a new filter.
To copy a filter
1. In the Examiner, click Filter Manager.
2. In the Filter Manager, under the Filters list, select a filter.
3. In the lower portion of the Filter Manager, click the icon: Create a copy of the selected filter.
4. In the Filter Definition dialog, modify the filter according to your requirements.
5. Click Save.
You cannot rename a custom filter. However, you can copy a filter, give the copy a new name, and then delete
the original filter, if desired.
Importing Filters
You can import filters that have been saved as XML files into your system.
See also Exporting Filters (page 152)
To import filters
1. In the Examiner, click Filter Manager.
2. In the Filter Manager dialog, click the Import a filter from a xml file icon.
3. In the Open dialog, browse to the location where the filter XML file is stored. Select the filter and click
Open.
4. In the Filter Import dialog, click OK.
Exporting Filters
You can export filters into XML files to use in other systems.
Filtering Data to Locate Evidence Sharing, Importing, and Exporting Filters | 152
To export filters
1. In the Examiner, click Filter Manager.
2. In the Filter Manager dialog, select the filter that you want to export.
Predefined Filters
Alternate Data Shows files with alternate data streams (additional data associated with a file
Streams object).
Archive Files Shows only archive-type file items, such as ZIP and THUMBS.DB.
Bad Extension Files Shows only the files with extensions that don’t match the file header.
Carved Files Shows only the items that have been carved.
Checked Files Shows only the items that you have selected with a check mark.
Decrypted Files Shows only the items that have been decrypted by AccessData tools within the
case. This indicates that AccessData decryption tools have had control of this file
and its decryption since it was added to the case in its original encrypted form.
Deleted Files Shows only those items that have the deleted status.
Duplicate Files Shows only files that have duplicates in the case. This filter requires that you select
the Flag Duplicate Files processing option.
eDiscovery Includes files and folders that are not useful for most eDiscovery cases.
Refinement
Email Attachments Shows all email items that are not email messages.
Email Delivery Time Allows definition of specific date/time range of email deliveries.
Email Files and Shows all email items, both messages and attachments.
Attachments
Encrypted Files Shows only those items flagged as EFS files or other encrypted files.
Excluded eDiscovery Excludes files and folders that are not useful for most eDiscovery cases
Refinement
Explicit Images Folder Shows folders with EID scores of 60 or higher using FST or ZFN (high) criteria.
(High Score)
Explicit Images Folder Shows folders with EID scores of 40 or higher using FST or ZFN (medium) criteria.
(Medium Score)
File Category Allows user to set a filter by file category (is a member of). Relates to File Category
tree under Overview tab.
File Created Time Allows definition of specific date/time range of file creation.
File Modified Time Allows definition of specific date/time range of file modification.
Files with Alternate Shows files that contain Alternate Data Streams (additional data associated with a
Data Streams file system object).
Flagged Ignorable Shows only those items you have identified as Ignorable.
Flagged Privileged Shows only those items you have identified as Privileged.
From Free Space Shows only those items found in (carved from) free space.
From Recycle Bin Shows only those items taken from the recycle bin.
Graphic Files Shows only those items that have been identified as graphics.
KFF Alert Files Shows all files with KFF Alert status that are in a case.
KFF Ignore Files Shows all files with KFF Ignore status that are in a case.
Microsoft Office Files Shows Word, Access, PowerPoint, and Excel files.
Mobile Phone Files Shows files and data from mobile devices added to the case using AccessData
Mobile Phone Examiner.
No Email Related Shows files that are not Email related files.
Files or Attachments
No File Slack Shows all except files found in (carved from) file slack.
No Files with Shows only files that have no duplicates in the case.
Duplicates
No KFF Ignore Files Shows all items except KFF ignore files.
No KFF Ignore or OLE Shows all items except KFF ignore files or OLE subitems.
Subitems
No KFF Ignore or OLE Shows all items except KFF ignore files, OLE subitems, or duplicate items.
Subitems or
Duplicates
No MS Office 2007/ Excludes unimportant files and folders contained in MS Office 2007/2010 OPC files
2010 Unimportant (DOCX, XLSX PPTX etc)
Subitems
No Unimportant OLE Shows all items including OLE subitems, except that unimportant OLE data
Data Streams streams are not shown.
Not Flagged Ignorable Shows all items except those you indicated Ignorable.
Not Flagged Privileged Shows all items except those you flagged Privileged.
NSF Notes Shows Emails, views, and other notes from Lotus Notes NSF databases.
OCR Extractions Shows files that were extracted from graphics with OCR.
OCR Graphics Graphic files that have been parsed by the OCR engine.
OLE Subitems Shows only OLE archive items and archive contents.
Reclassified Files Shows only those items whose classification you have changed.
Subfilter for EID FST This is a subfilter that is used by the explicit images folder (high score) filter.
OR ZFN (high)
Subfilter for EID FST This is a subfilter that is used by the explicit images folder (medium score) filter.
OR ZFN (medium)
Unchecked Files Shows only those items that you have not checked.
User-decrypted Files Shows only those items that you have decrypted and added to the case. Decrypted
by User status is always applied to files added using the Add Decrypted Files
feature. The Examiner cannot confirm validity, content, or origin of such files.
Video Conversion or Shows only generated video thumbnails or common video files.
Thumbnails See Examining Videos on page 333.
Items can be filtered out based on File Type, File Size, and Date.
Note: It is not possible to alter this particular refinement option from within the case.
Visualization can be used once the People Finder filter has been applied for a visual picture of how the data
relate.
Note: Persons of Interest Filters cannot be edited in the Filter Manager. They must be edited within the Persons
of Interest windows.
To Edit a Person:
1. Open the Persons of Interest filter by clicking on the sillhouette icon in the menu bar. The
Communication Participants window will open.
2. Click the Edit button.
3. Add or edit data as desired.
4. Click Ok.
To Delete a Person:
1. Select a name in the Communication Participants list.
2. Click on the red minus icon at the bottom of the window. A warning will appear asking if you are sure
you want to delete the selected name.
3. Click Yes. The name will be deleted.
Filtering Data to Locate Evidence Using the Persons of Interest Filter | 158
Creating a Rule within People Finder
To Create a Rule Manually within the Persons of Interest Filter:
1. Open the Persons of Interest filter by clicking on the sillhouette icon in the menu bar. The
Communication Participants window will open.
2. Select or add a Display Name for your rule.
3. In the Add/Edit Person window, click the small plus icon in the left pane.
4. Select a Type in the dropdown menu.
5. Add an email or phone number to the Data field.
6. Click Ok.
Filtering Data to Locate Evidence Using the Persons of Interest Filter | 159
5. Select Yes or No, then click Close.
If you select Yes, the Examiner will show all communications that fit the applied filter.
If you select No, you may apply the filter at any time using the Filter dropdown box in the Menu Bar.
Note: A yellow background will appear when a filter has been applied. This serves as a visual reminder that a
filter is in effect.
Email
The following fields are used to search for email addresses:
To From
CC BCC
Filtering Data to Locate Evidence Using the Persons of Interest Filter | 160
Chapter 11
Working with Labels
Labels let you group files in the way that makes the most sense to you. Initially, there are no default labels. All
are customized. Labels you create are saved locally and you have complete control over them within your case.
However, labels can be created and shared to the database for use by all who have been granted access to do
so.
Creating a Label
You can use the File List view to create a new label.
To create a label
1. In the File List view, click Create Labels.
2. Click Manage Local. The Manage Labels dialog opens.
3. Click New. A text entry box opens on the first available line.
4. Enter a name for the label, and press enter. The label is saved with the default color; black.
5. Click Change Color. The Color dialog opens. You can use any color from the default palette, or click
Define Custom Colors to create a unique color for this label. Use the cross-hairs and the slide to
create the color you want, then click Add to Custom Colors, then select the custom color from the
Custom colors palette.
6. Click OK. The Manage Labels dialog reopens. You can see your new label listed with the color you
defined or selected.
7. Click Close.
8. Click OK.
Applying a Label
You can apply a label to a file or group of files to make them easy to locate.
To apply a label
1. In the File List view, highlight, check, or select the files you want to apply a label to.
2. Click the Apply Label To drop-down.
3. Choose whether to apply the label that you will select to Highlighted, Checked, or Listed files.
4. Click the Apply This Label drop-down and click on the label to apply to the selected files.
The name of the label is displayed in that label’s color.
The two buttons open separate dialogs that appear very much alike.
Aside from the different list of labels you may see, the only other difference you will see is the button that in
Manage (Local) Labels says Make Shared, and in the Manage Shared Labels says Copy to Case.
Button Description
New Click New to create another label.
Rename Click Rename to change the name of any label you select.
Change Color Click Change Color to select a different color for any label you select.
Delete Click Delete to remove a label from the case. Deleting a label removes all instances
of the label’s application. The files remain, but the label itself is gone.
Import Click Import to bring a label definition into your list from another source.
Export Click Export to save a selected label definition for use in a different case.
Make Shared Click Make Shared (from Manage (Local) labels) to Share a label definition to the
database for others to use.
Copy to Case Click Copy to Case (from Manage Shared labels) to copy a global label to a case that
was created before that label was available.
Group Click Group to create a labels Group that can be used locally or Shared to the
database for others to use according to their permissions.
You must create a label before you can add it to the group. If the label you need is not listed in the Group
Definition area, click Close. In the Manage Labels dialog, click New and create a label.
Note: If you do not know the passwords for encrypted files, you can use tools to try to recover the password.
The following tables list the methods you can use to decrypt files and the type of encrypted files that are
supported
Decryption Methods
Tools > Decrypt Files From the Examiner interface, you can use the Decrypt Files option to decrypt
one or more files.
See Decrypting Files Using the Automatic Decryption Processing Option on
page 170.
See Decrypting EFS on page 174.
See Decrypting Lotus Notes Files on page 177.
See Decrypting S/MIME Files on page 177.
See Decrypting Dropbox DBX Files on page 176.
Decrypting Dell Encryption You can configure Dell Encryption decryption either at the global application
files level or at the case level.
See Decrypting Dell Encryption Files (Dell Data Protection | Encryption
Server) (page 178)
The following table provides a list of the supported types that can be decrypted and the method used:
Windows Rights Management You can decrypt DRM files at the case level.
(RMS) for Microsoft Office files
and Outlook email files See Decrypting Microsoft Office Digital Rights Management (DRM)
Protected Files (page 175)
Dell Encryption You can configure Dell Encryption decryption either at the global
application level or at the case level.
See Decrypting Dell Encryption Files (Dell Data Protection |
Encryption Server) (page 178)
Dropbox After initial evidence processing, you can use the Decrypt Files tool.
Lotus Notes (whole NSF) See Decrypting Dropbox DBX Files on page 176.
Lotus Notes (notes/email)
See Decrypting Other Encryption Types on page 174.
Microsoft EFS, Office
See Decrypting Lotus Notes Files on page 177.
S/MIME PKCS7
See Decrypting S/MIME Files on page 177.
When you enter passwords into the list, you can type them or paste them from a text file. Each password must
be on its own line.
You can add passwords to the list at any time. The password list is saved with the case. The passwords are
present any other time that you access the list in that case.
When compiling a list of passwords, you can use the following sources:
Passwordsthat were recovered using AccessData PRTK or DNA
See Recovering Unknown Passwords of Encrypted Files on page 172.
Passwords that you have learned about as part of an investigation
Lists of known commonly used passwords
Note: In the File List, all decrypted files will be displayed in text. Several decryption key files are identified and
categorized for ease of use. Find them in the Overview tab under File Category > Other Encryption
Files > Certificates. Having these files identified and available makes it easier to quickly access files that
may have been unavailable before.
Note: You may briefly see a progress dialog appear. The dialog is not applicable to this data and will
disappear quickly.
To perform auto-decryption, you must have PRTK or DNA 7.3 or higher installed on the same computer as the
Examiner.
If you have a license, you can use AccessData Password Recovery Toolkit (PRTK) or Distributed Network Attack
(DNA) to attempt to recover passwords for encrypted files. You can use PRTK or DNA in the following ways:
Important: When an item is sent to PRTK/DNA for automatic decryption, a dictionary is automatically generated
based on the case’s wordlist in FTK. This dictionary is used “As Is” in conjunction with the English
dictionaries and “PRTK” profile to attempt password recovery on the selected item.
For details about PRTK/DNA, see the PRTK/DNA User Guide.
The passwords are copied in text format, one password per line.
Decrypting EFS
Understanding EFS
Versions of Windows developed for business environments from Windows 2000 onwards include the ability to
encrypt files and folders. This feature is known as Encrypting File System (EFS). It is not supported in Windows
XP Home Edition.
EFS files, as well as Microsoft® Office, and Lotus® Notes (NSF) files and folders can be decrypted. To do so,
the password must already be known.
In Windows, EFS-encrypted files or folders can be viewed only by the user who encrypted them or by the user
who is the authorized Recovery Agent. When the user logs in, encrypted files and folders are decrypted and the
files are automatically displayed.
Note: There are certain files that cannot be encrypted, including system files; NTFS compressed files, and files
in the [drive]:\[Windows_System_Root] and its subdirectories.
Important: When a user marks an encrypted file as privileged and that file is later decrypted, all associated data
with the newly decrypted file are able to be found in an index search as hits. When a user attempts to
view the hits in a different list, an error is displayed that the path is invalid.
Requirements
Different versions of Windows OS have different requirements for decrypting EFS.
Note: EFS encrypted files in the case are automatically detected. Decrypt File Types will automatically
be marked according to the file types found. Unselect any file types that you do not want to
decrypt.
Note: The Decrypt button is disabled until at least one password is entered, or until Attempt Blank
Password is marked.
Host_id
Note: Dropbox DBX files can only be decrypted if you have the password.
When an NSF file is created, Lotus Notes also creates a user.id file. Lotus Notes uses the user.id file to identify
the user. You must have the user.id file to decrypt the NSF container file and to decrypt its contents.
Lotus Notes versions 7 through 8.5, including NSF and ODS formats 48 and 51 are supported.
Note: Some files do not have a password applied. In these cases, you should click Attempt Blank
Password.
Note: Some files do not have a password applied. In these cases, you should click Attempt Blank
Password.
To decrypt S/MIME
1. In a case, click Tools > Decrypt Files.
2. In the Decrypt Files dialog, click Set Passwords.
3. Enter the password.
See About the Encrypted File Passwords List on page 167.
4. Mark Attempt Blank Password to decrypt files with no password, or whose password is blank.
Note: S/MIME encrypted files in the case are automatically detected. Decrypt File Types will
automatically be marked according to the file types found. Unselect any file types you wish not to
decrypt.
Note: The Decrypt button is disabled until at least one password is entered, or until Attempt Blank
Password is marked.
Dell Encryption version 7.7 is supported in both online and offline key bundle modes.
The integration allows two options for decryption: offline, and online. For a key bundle located on the user’s local
machine or network, use the offline option. For a key bundle located on a remote server within your network, use
the online option.
The first time a user decrypts Dell Encryption files and provides the Dell Encryption server credentials, that
information is encrypted and stored in the database. Later, if that user needs to decrypt Dell Encryption files in
that or another case, the credentials field populates automatically.
The credentials are stored separately for each user, so while one user may have the credentials stored, others
may not until the others have processed a case with Dell Encryption files that need to be decrypted.
Both the Online and Offline Dell Encryption Decryption dialog boxes have a Decryption Threads drop-down box.
This dictates the total number of threads assigned to decryption, not the number of decryption threads per core.
If you have a high-end system, you may benefit from a higher setting. At this time, it is not possible to cancel the
processing once it has begun.
Important: If you click Cancel to process the evidence without decrypting, you will not be able to decrypt at a
later time. Also, the evidence cannot be added to the same case a second time. You will have to
create a new case to decrypt and process this evidence.
You can configure Dell Encryption server settings in the following ways:
Globally, for all cases, in the Case Manager interface under the Tools menu.
Note: From the Processing Options or the Additional Analysis page, you can select to decrypt Dell Encryption
files. If you select to decrypt Dell Encryption files, the File Signature Analysis option will automatically be
selected as well.
You can now do a Live Search on Dell Encryption files on the fly after performing a drive preview.
Usually the Machine ID and Shield ID fields are automatically populated. The Machine ID can be found on the
server as the Unique ID on the Properties tab. The Shield ID can be found as the “Recovery ID” on the “Shield”
tab. It looks similar to this: “ZE3HM8WW”. If the Shield ID is not working, you have the option to use the SDE
Key ID, which will auto-populate when available and should only be used after you have tried the Shield ID.
The Server Data group box contains information on how to contact the server. It includes the Dell Encryption
Server user name, password, and IP address. The port should be 8081, and is auto-populated.
Offline decryption requires you to get a key bundle file from the server. Then, select the key bundle file and enter
the password used to decrypt it. Get the key bundle file by executing the CFGetBundle.EXE file with a
command like that looks like this:
Note: All command line switches are case sensitive. Also, as in the example above, there is no space between
the switch and the accompanying data.
Once you have used either the online or the offline method, the files will be decrypted immediately and the
decrypted file will become a child of the encrypted file. After decryption, the files will be processed with the same
settings last used to process a file.
Once the key has been added and the appropriate partitions selected, click OK to return to the Manage
Evidence dialog. Select a time zone from the Time Zone drop-down, then click OK to begin processing.
Important: If you click Cancel to process the evidence without decrypting, you will not be able to decrypt at a
later time. Also, the evidence cannot be added to the same case a second time. You will have to
create a new case to decrypt and process this evidence.
4. Click OK and the credential dialog is again displayed for the next partition.
This sequence continues until you have entered the credentials for all encrypted partitions.
Safeguard Easy
Safeguard Easy works only with an image of a complete drive or a live drive. Imaged partitions cannot be
decrypted because the information needed to decrypt the partition exists in the boot record of the drive.
When a live drive or drive image is added as evidence, it is checked to determine if SafeGuard Easy encryption
is used on the drive. If it is used, a dialog will appear asking for the user name and password required to access
the drive. If the correct user name and password are entered, the drive will be decrypted transparently during
processing and the user can access information on the drive as though the drive were not encrypted. Incorrect
passwords will result in long waits between attempts -- waits that grow exponentially for each failure. Hitting the
cancel button on the dialog will allow the drive to be added as evidence, but the encrypted portions will not be
processed.
Secondary hard drives and removable media that has been encrypted with SafeGuard Easy are not currently
supported. The problem with secondary drives and removable media is that they contain NO information that
indicates how they are encrypted. The encryption information for secondary drives and removable media is
contained on the boot drive of the computer that encrypted them.
Versions 2.x and later, and all Imager versions since then support SafeGuard Easy drives encrypted with the
following algorithms: AES128, AES256 (the default), DES, 3DES, and IDEA.
The Safeguard dialog box appears only when a valid Utimaco-encrypted image is read.
The username and password used to create the encrypted image are required for decryption. Once the
credentials have been added, click OK to return to the Manage Evidence dialog. Select a time zone from the
Time Zone drop-down, then click OK to begin processing.
Important: The following important information applies when using SafeGuard Decryption:
SafeGuard Enterprise
SafeGuard Enterprise (SGN) is supported. Utimaco supplied libraries to access the decryption keys for SGN via
their recovery mechanism. This involves a somewhat cumbersome challenge/response system with the server
to access the decryption keys. Each partition may be decrypted with a different key. The challenge/response
process needs to be done for each encrypted partition. In order to enable the challenge/response system, a file
called recoverytoken.tok needs to be retrieved from the server and selected in the decryption dialog. A
recoverytoken.tok file is automatically selected if it is in the same directory as the evidence file.
AccessData uses SafeGuard-provided BE_Sgn_Api.DLL and BE_KBRDLLn.DLL. These libraries are 32-bit
libraries. The 32-bit process is used to retrieve keys in 64-bit. The actual decryption of the drive is done in the
Examiner, but the SafeGuard libraries are needed to generate the key from the username/password.
To recognize that a drive is encrypted with SafeGuard Enterprise, “UTICRYPT” is searched for at the beginning
of the first sector of each partition.
Important: The following important information applies when using SafeBoot Decryption:
If you click Cancel to process the evidence without decrypting, you will not be able to decrypt at a later
time. Also, the evidence cannot be added to the same case a second time. You will have to create a new
case to decrypt and process this evidence.
You must add all partitions and decrypt the encrypted partitions when first adding the evidence to the
case or you will be unable to see them. Encrypted partitions do not display in the Evidence list.
Once the key has been added and the appropriate partitions selected, click OK to return to the Manage
Evidence dialog. Select a time zone from the Time Zone drop-down, then click OK to begin processing.
Administrators can instruct PGP® WDE devices that are managed by a PGP® Universal™ Server to
automatically secure an encrypted disk to additional credentials based on a company’s central policy. These
could include a WDE Administrator key (for IT support purposes), an Additional Decryption Key (also called a
corporate recovery key) and/or a Whole Disk Recovery Token (“WDRT”). WDRTs are commonly used to reset a
forgotten passphrase and, can also be used by authorized administrators or examiners to decrypt an acquired
image of a PGP® WDE encrypted drive.
You can also view the File Properties of the original encrypted file to see the password that was used to decrypt
that file.
This section discusses how to export data from the Examiner interface and includes the following:
Exporting Data from the Examiner Copying Information from the Examiner | 186
3. In the Copy Special dialog, select from the following:
Item Description
Choose Columns Choose the column template definition that you want to use for the exported data.
Include Header Row Includes a header row that uses the column headings you selected.
All Highlighted Copies all items highlighted in the current file list.
All Checked Copies all items checked in all file lists. You can check files in multiple lists.
Checked items remain checked until you uncheck them.
All Copies all items in the case. Selecting this option can create a very large TSV or
CSV file, and may exceed the 10,000 item capacity of the clipboard.
4. In the Choose Columns drop-down list, select the column template that contains the file information that
you want to copy.
5. To define a new column settings template click Column Settings to open the Column Settings Manager.
6. Click OK to copy the data to the clipboard.
Exporting Data from the Examiner Copying Information from the Examiner | 187
Exporting Files to a Native Format
You can export files that you find in an investigation to process and distribute to other parties. For example, you
can export encrypted files that you need to decrypt with Password Recovery Toolkit (PRTK). You can also export
Registry files to analyze in the Registry Viewer.
Export Options
Append extension to Uses the file’s header information to add missing file extensions.
filename if bad/absent
Exclude Slack Space Excludes all slack files from the export.
Children Files
Export emails using Item Substitutes the Item number in the case instead of the email title to shorten the
number for name file paths.
Export directory as file Creates a file that contains the binary data of a directory that you export.
If you select a folder to export, the Examiner does not export the parent folder or
empty sub-folders.
You can export folders as files, but any empty folders that are not selected to be
exported as files are not created during the export. To work around this issue,
export a folder structure with its children, move up one folder level and mark
Export directory as file and Export children.
Limit Path Length The Limit Path Length option is now off by default. This prevents getting only
partial paths in the export.
Create Manifest files Generates manifest files that contain the details and options that are selected for
the exported data. including headers. The Export Summary File is commonly
called a Manifest file. If you select this option the export creates the manifest file
CSV format. The export saves the file in the same destination folder as the
exported files.
Exporting Data from the Examiner Exporting Files to a Native Format | 188
Export Options (Continued)
Export emails as MSG Exports email files into the MSG format for broader compatibility.
Export messages from You can export email messages to a PST file, even if they didn't come from a
email to PST PST file originally. This lets you accomplish the following:
Export messages from RFC822, NSF, PST, Exchange, and so on to a PST.
As the opposite of reduction, you can create a new PST file with responsive
messages in it.
This creates a new PST rather than exporting the whole source PST and run-
ning reduction to remove anything non-responsive.
Convert email archives, such as NSF, to a PST with the same folder and mes-
sage structure.
The Exporting Emails to PST feature requires that you have either Microsoft
Outlook or the Microsoft Collaboration Data Objects (CDO) installed on the same
computer as the processing engine.
See the Important Information in the Release Notes.
Include thumbnails of Includes the thumbnails of the video files that were created during evidence
video files processing or during additional analysis.
Include common video Includes the common video format (MP4) files that were created during evidence
format processing or during additional analysis.
3. Select the items that you want to export from the following options:
All Highlighted Selects all items highlighted in the current file list. Items remain highlighted
only as long as the same tab is displayed.
4. In the Destination Base Path field, enter or browse to and select the location to export the file.
The default path is [Drive]:\case_folder\Report\Export\.
5. Click OK.
Exporting Data from the Examiner Exporting Files to a Native Format | 189
Exporting Files to an AD1 Image
You can export files to an Image. However; you can only export files to the AD1 format, or to their native format.
To export files to their native type see Exporting Files to a Native Format (page 188).
To export images into an image file Exporting an Image to an Image (page 192).
Image Options
Option Description
Case Number (Optional) Lets you enter a case number for the data that is to be exported.
Evidence Number (Optional) Lets you enter an evidence number for the data that is to be exported.
Unique Description (Optional) Lets you add a description to the data that is to be exported.
Examiner (Optional) Lets you add the name of the evidence examiner to the data that is to be
exported.
Notes (Optional) Lets you add notes to the data that is to be exported.
Relative to The image can be saved locally (Relative to This machine), or remotely (Relative to
Remote source machine).
Folder Specify the path and the destination folder for the image on the target computer.
Username Specify the domain and the user name to access the target computer.
Image Filename Specify a filename for the image, but do not include an extension.
(Excluding
Extensions)
Exporting Data from the Examiner Exporting Files to an AD1 Image | 190
Image Options (Continued)
Option Description
Compression Specify the compression level to use. 0 represents no compression, 9 represents the
highest compression. Compression level 1 is the fastest to create. Compression level
9 is the slowest to create.
Use AD Encryption Select this option if you want to encrypt the image as it is created.
When exporting data to an image from an encrypted drive, create the image
physically, not logically. A physical image is often required for decrypting full disk
encryption.
6. Click OK.
Exporting Data from the Examiner Exporting Files to an AD1 Image | 191
Exporting an Image to an Image
You can export images into the following types:
Option Description
Case Number (Optional) Lets you enter a case number for the data that is to be exported.
Evidence Number (Optional) Lets you enter an evidence number for the data that is to be
exported.
Unique Description (Optional) Lets you add a description to the data that is to be exported.
Examiner (Optional) Lets you add the name of the evidence examiner to the data that
is to be exported.
Notes (Optional) Lets you add notes to the data that is to be exported.
Image Destination By default, the image type is AD1. When exporting to an AD1, the image’s
Type file path is added under a root directory. This behavior speeds the process of
gathering data for the AD1, and shortens the path to the AD1 content.
Relative to The image can be saved locally (Relative to This machine), or remotely
(Relative to Remote source machine).
Folder Specify the path and the destination folder for the image on the target
computer.
Username Specify the domain and the user name to access the target computer.
Image Filename Specify a filename for the image, but do not include an extension.
(Excluding
Extensions)
Option Description
Image Fragment Specify the image fragment size in MB.
Size
You can save RAW and E01 file types in a single segment by specifying 0
MB.
Use AD Encryption Select this option if you want to encrypt the image as it is created.
When exporting data to an image from an encrypted drive, create the image
physically, not logically. A physical image is often required for decrypting full
disk encryption.
6. Click OK.
7. In the Create Image dialog, choose if you want to Verify Images after they are created.
8. Choose if you want to Precalculate progress statistics. This feature estimates the progress of the
task as it is running.
9. Choose if you want to Add image to case when completed.
10. Specify the Time Zone of the evidence.
11. Click OK.
12. Click Start.
To export file list information to a network/folder/etc you must have rights to access and save information to the
location.
Exporting Data from the Examiner Exporting File List Information | 194
Exporting a Word List
You can export the contents of the case index or registry into a word list. You can use this word list as the basis
for a custom dictionary to aid in the password recovery process.
You must have indexed the case to export the word list. If you have not indexed the case, you can click
Evidence > Additional Analysis. In the Additional Analysis dialog, under Search Indexes, select dtSearch
Index, and then click OK.
You can only export Registry Viewer contents into a word list if the Registry Viewer is installed on the computer
where you are running the Examiner.
Exporting Data from the Examiner Exporting Hashes from a Case | 196
Exporting All Hits in a Search to a CSV file
After you run a search for terms, words, or predefined patterns, you can export your results to a comma
delimited text file (CSV).
Exporting Data from the Examiner Exporting All Hits in a Search to a CSV file | 197
Exporting Emails to PST
You can export email messages to a PST file, even if they didn't come from a PST file originally. This lets you
accomplish the following:
Note: When preserving the folder structure, the export creates a root directory for the email, followed by
the user name associated with that email. The folder and message structure then mirror that of
the emails being exported.
To convert email archives with the same folder and message structure
1. In the Export dialog, select Export messages from email archives to PST.
2. Configure other export options and click OK.
CSV
Comma
Exporting Data from the Examiner Exporting the Properties Panel | 199
Exporting Geolocation Data to KML or KMZ
Geolocation data can be exported in order to allow users to view geolocation data from the case in any
application that allows KML imports. For example, Google Earth.
Note: The same process can be followed using Google maps; however, the KML or KMZ file will not be
updated with a Google Earth icon.
Exporting Data from the Examiner Exporting Geolocation Data to KML or KMZ | 200
Chapter 14
About Cerberus Malware Analysis
Cerberus analysis may slow down the speed of your overall processing.
Note: This feature is available depending on your product license. Please contact your sales representative for
more information.
Important: Cerberus writes binaries to the AD Temp folder momentarily in order to perform the malware
analysis. Upon completion it will quickly delete the binary. It is important to ensure that your antivirus
is not scanning the AD Temp folder. If antivirus deletes/Quarantines the binary from the temp
Cerberus analysis will not be performed.
Cerberus analyzes the following types of files:
More serious attributes have higher positive scores, such as +20 or +30. Safer attributes have smaller or even
negative numbers such as +5, -10 or -20.
The existence of any particular attribute does not necessarily indicate a threat. However, if a file contains several
attributes, then the file will have a higher sum score which may indicate that the executable binary may warrant
further investigation. The higher the threat score, the more likely a file may be to contain malicious code.
For example, you may have a file that had four attributes discovered. Those attributes may have scores of +10,
+20, +20, and +30 for a sum of +80. You may have another file with four attributes of scores of +5, +10, -10, -20
for a sum of -15. The first file has a much higher risk than the second file.
Cerberus stage 1 analysis also examines each file’s properties and provides information such as its size, version
information, signature etc.
For example, the Bad Signed attribute as a default value of +20. You can give it a different weight of +30.
You must configure these scores before the files are analyzed.
Bad signatures
Revoked signatures
Expired signatures
Packed with known signature
If any of these attributes are found, the score is overridden with a score of +100.
About Cerberus Malware Analysis About Cerberus Stage 1 Threat Analysis | 202
Cerberus Minimum override score includes:
Important: If a file that is malware has a valid digital signature, the override will score the file as -100 (low threat),
even though the file is really malware.
About Cerberus Malware Analysis About Cerberus Stage 1 Threat Analysis | 203
About Cerberus Malware Analysis About Cerberus Stage 1 Threat Analysis | 204
Cerberus Stage 1 Threat Scores
The following table lists the threat scores that are provided in a Stage 1 analysis:
Persistence +20 Persistence indicates that the application may try to persist permanently on
the host. For example, the application would resume operation
automatically even if the machine were rebooted.
Process +5 Process indicates the application may start a new a process or attempt to
gain access to inspect or modify other processes. Malicious applications
attempt to gain access to other processes to obfuscate their functionality or
attack vector or for many other reasons. For example, reading or writing
into a process’s memory, or injecting code into another process.
Protected +10 ProtectedStorage indicates that the application may make use of the
Storage Windows “pstore” functionality. This is used on some versions of Windows
to store encrypted data on the system. For example, Internet Explorer
stores a database for form-filling in protected storage.
Registry +5 Registry is triggered when a target application attempts to use the registry
to store data. The registry is commonly used to store application settings,
auto-run keys, and other data that the application wants to store
permanently but not in its own file.
Security +5 Imports functions used to modify user tokens. For example, attempting to
clone a security token to impersonate another logged on user.
Obfuscation +30 Stage 1 searches for signs that the application is 'packed', or obfuscated in
a way that hinders quick inspection. The Obfuscation category is triggered
when the application appears to be packed, encrypted, or otherwise
obfuscated. This represents a deliberate decision on behalf of the
developer to hinder analysis.
Process +2 Unusual activity in the Process Execution Space header. For example, a
Execution zero length raw section, unrealistic linker time, or the file size doesn't
Space match the Process Execution Space header.
About Cerberus Malware Analysis About Cerberus Stage 1 Threat Analysis | 205
Cerberus Stage 1 Threat Score Attributes (Continued)
Embedded Data +10 This category is triggered when an application contains embedded
executable code. While all programs contain some program code, this
category indicates that the application has an embedded 'resource', which
contains code separate from the code which runs normally as part of the
application.
Bad / Bit-Bad +20 This category is triggered when the application contains signatures
indicating it uses the IRC protocol or shellcode signature. Many malware
networks use IRC to communicate between the infected hosts and the
command-and-control servers.
Signed / Bit -20 This category is triggered when a program is signed. A program that is
Signed signed is verified as 'trusted' by a third party, usually a legitimate entity like
a government or trusted company. The signature may be expired or invalid
though; check the 'BadSigned' category for this information.
About Cerberus Malware Analysis About Cerberus Stage 1 Threat Analysis | 206
Cerberus Stage 1 File Information
The following table lists the threat scores that are provided in a Stage 1 analysis:
Item Description
File Size Displays the size of the file in bytes.
Entropy Score Displays a score of the binaries entropy used for suspected packing or encrypting.
Interesting Displays the name of functions from the process execution space that contributed to
Functions the file’s threat score.
Suspected Packer Attempts to display a list of suspected packers whose signature matches known
List malware packers.
Has Version Displays whether or not the file has a version number.
Version Info Displays information about the file that is gathered from the Windows API including the
following:
CompanyName
FileDescription
FileVersion
InternalName
LegalCopyright
LegalTrademarks
OriginalFilename
ProductName
ProductVersion
Is Signed Displays whether or not the file is signed. If the file is signed the following information
is also provided:
IsValid
SignerName
ProductName
SignatureTime
SignatureResult
Unpacker results Attempts to show if and which packers were used in the binary.
About Cerberus Malware Analysis About Cerberus Stage 1 Threat Analysis | 207
About Cerberus Stage 2 Static Analysis
When you run a stage 1 analysis, you configure a score that will launch a Cerberus stage 2 analysis. If an
executable receives a score that is equal or higher than the configured score, Cerberus stage 2 is performed.
Cerberus stage 2 disassembles the code of an executable binary without running the actual executable.
About Cerberus Malware Analysis About Cerberus Stage 2 Static Analysis | 208
Cerberus Stage 2 Function Call Data
Stage 2 analysis data is generated for the following function call categories:
File Access
Networking functionality
Process Manipulation
Security Access
Windows Registry
Surveillance
Uses Cryptography
Low-level Access
Loads a driver
Subverts API
Misc
About Cerberus Malware Analysis About Cerberus Stage 2 Static Analysis | 209
File Access Call Categories
Cerberus Stage 2 File Access Function Call Categories
Category Description
File Functions that manipulate (read, write, delete, modify) files on the local file system.
Access
Filesystem.File.Read. This is triggered by functionality which reads executable files from disk.
ExecutableExtension The executable code can then be executed, obfuscated, stored
elsewhere, transmitted, or otherwise manipulated.
FileSystem.Physical. This application may attempt to read data directly from disk, bypassing
Read the filesystem layer. This is very uncommon in normal applications,
and may indicate subversive activity.
FileSystem.Physical. This application may attempt to write data directly to disk, bypassing
Write the filesystem layer in the operating system. This is very uncommon in
normal applications, and may indicate subversive activity. It is also
easy to do incorrectly, so this may help explain any system instability
seen on the host.
FileSystem.Directory. This indicates the application may attempt to recurse through the file
Recursion: system, perhaps as part of a search functionality.
FileSystem.Delete: This indicates the application may delete files. With sufficient
permissions, the application may be able to delete files which it did not
write or even system files which could affect system stability.
FileSystem.File.Delete This indicates the application may try to delete files in the \Windows
.Windows: directory, where important system files are stored. This is rarely
necessary for legitimate applications, so this is a strong indicator of
suspicious activity.
FileSystem.File.Delete This indicates the application may try to delete files in the
. \Windows\System32 directory, where important system files are stored.
System32: This is rarely necessary for legitimate applications, so this is a strong
indicator of suspicious activity.
FileSystem.File.Read. This indicates the application may attempt to read from the \Windows
Windows: directory, which is very uncommon for legitimate applications.
\Windows is where many important system files are stored.
FileSystem.File.Write. This indicates the application may attempt to write to the \Windows
Windows: directory, which is very uncommon for legitimate applications.
\Windows is where many important system files are stored.
About Cerberus Malware Analysis About Cerberus Stage 2 Static Analysis | 210
Cerberus Stage 2 File Access Function Call Categories (Continued)
Category Description
FileSystem.File.Read. This indicates the application may attempt to read from the
System32: \Windows\System32 directory, which is very uncommon for legitimate
applications. \Windows\System32 is where many important system
files are stored.
FileSystem.File.Write. This indicates the application may attempt to write an executable file to
ExecutableExtension: disk. This could indicate malicious software that has multiple ‘stages’,
or it could indicate a persistence mechanism used by malware (i.e.
write an executable file into the startup folder so it is run when the
system starts up).
FileSystem.File. This indicates the program may write compressed files to disk.
Filename.Compressio Compression can be useful to obfuscate strings or other data from
n: quick, automated searches of every file on a filesystem.
About Cerberus Malware Analysis About Cerberus Stage 2 Static Analysis | 211
Networking Functionality Call Categories
Cerberus Stage 2 Networking Functionality Function Call Categories
Category Description
Networking Functions that enable sending and receiving data over the or other networks.
functionality
Network.FTP.Get: Describes the use of FTP to retrieve files. This could indicate the
vector a malware application uses to retrieve data from a C&C
server.
Network.DNS.Lookup. This indicates the application may attempt to resolve the address
Country.XX: of machines in one of several countries. “XX” will be replaced by
the ‘top level domain’, or TLD associated with the lookup,
indicating the application may attempt to establish contact with a
host in one of these countries.
Network.HTTP.Read: The application may attempt to read data over the network using
the HTTP protocol. This protocol is commonly used by malware so
that its malicious traffic appears to ‘blend in’ with legitimate web
traffic.
Network.HTTP. This indicates the application may make an HTTP request which is
Connect.Nonstandard. not a head, get, or post request. The vast majority of web
applications use one or more of these 3 kinds of requests, so this
Request:
category indicates anomalous behavior.
Network.HTTP. Port: Most HTTP connections occur over either port 80 or 443.
Connect.Nonstandard. This indicates the application is communicating with the server
over a non-standard port, which may be a sign that the server is
Port:
not a normal, legitimate web server.
Network.HTTP.Post: This indicates the application makes a ‘post’ http request. ‘post’
messages are normally used to push data to a server, but malware
may not honor this convention.
About Cerberus Malware Analysis About Cerberus Stage 2 Static Analysis | 212
Cerberus Stage 2 Networking Functionality Function Call Categories (Continued)
Category Description
Network.HTTP.Head: This indicates the application makes a ‘head http request. ‘head’
messages are normally used to determine information about a
server’s state before sending a huge amount of data across the
network, but malware may not honor this convention.
FTP.Put: The application may attempt to send files over the network using
FTP. This may indicate an exfiltration mechanism used by
malware.
About Cerberus Malware Analysis About Cerberus Stage 2 Static Analysis | 213
Process Manipulation Call Categories
Cerberus Stage 2 Process Manipulation Function Call Categories
Category Description
Process May contain functions to manipulate processes.
Manipulation
ProcessManageme This indicates the target application may create multiple threads of
nt.Thread.Create: execution. This can give insight into how the application operates,
operating multiple pieces of functionality in parallel.
ProcessManageme This indicates that the application may create threads in other
nt.Thread.Create. processes such that they start in a suspended state. Thus their
Remote: functionality or other properties can be modified before they begin
executing.
ProcessManageme This application may attempt to create one or more other processes.
nt.Process.Create: Similar to threads, multiple processes can be used to parallelize an
application’s functionality. Understanding that processes are used
rather than threads can shed insight on how an application
accomplishes its goals.
About Cerberus Malware Analysis About Cerberus Stage 2 Static Analysis | 214
Security Access Call Categories
Cerberus Stage 2 Security Access Function Call Categories
Category Description
Security Access Functions that allow the program to change its security settings or impersonate other
logged on users.
Category Description
Windows Functions that manipulate (read, write, delete, modify) the local Windows registry. This
Registry also includes the ability to modify autoruns to persist a binary across boots.
Registry.Key.Create The application may attempt to create a new key in the registry.
: Keys are commonly used to persist settings and other
configuration information, but other data can be stored as well.
Registry.Key.Autoru This indicates the application may use the registry to try to ensure
n: it or another application is run automatically on system startup.
This is a common way to ensure that a program continues to run
even after a machine is restarted.
Registry.Value.Delet This indicates the application may attempt to delete the value
e: associated with a particular key. As with the deletion of a key, this
may not represent malicious activity so long as the application only
deletes its own keys’ values.
Registry.Value.Set: The application may attempt to set a value in the registry. This may
represent malicious behavior if the value is set in a system key or
the key of another application.
Registry.Value.Set. This indicates the application may store binary data in the registry.
Binary: This data could be encrypted, compressed, or otherwise is not
plain text.
About Cerberus Malware Analysis About Cerberus Stage 2 Static Analysis | 215
Cerberus Stage 2 Windows Registry Function Call Categories (Continued)
Category Description
Registry.Value.Set. This indicates the application may write plain text to the registry.
Text: While the ‘text’ flag may be set, this does not mandate that the
application write human-readable text to the registry.
Registry.Value.Set. The application may set a value indicating it will use the registry to
Autorun: persist on the machine even after it restarts.
Category Description
Surveillance Usage of functions that provide audio/video monitoring, keylogging, etc.
Category Description
Uses Usage of the Microsoft CryptoAPI functions.
Cryptography
Crypto.Algorithm.X The “XX” could be any of several values, including ‘md5’, ‘sha-1’, or
X: ‘sha-256’. These represent particular kinds of hashes which the
target application may use.
Crypto.MagicValue: This indicates that the target contains strings associated with
cryptographic functionality. Even if the application does not use
Windows OS functionality to use cryptography, the ‘magic values’
will exist so long as the target uses standard cryptographic
algorithms.
About Cerberus Malware Analysis About Cerberus Stage 2 Static Analysis | 216
Low-level Access Call Categories
Cerberus Stage 2 Low-level Access Function Call Categories
Category Description
Low-level Functions that access low-level operating system resources, for example reading sectors
Access directly from disk.
Category Description
Loads a driver Functions that load drivers into a running system.
About Cerberus Malware Analysis About Cerberus Stage 2 Static Analysis | 217
Subverts API Call Categories
Cerberus Stage 2 Subverts API Function Call Categories
Category Description
Subverts API Undocumented API functions, or unsanctioned usage of Windows APIs (for example, using
native API calls).
About Cerberus Malware Analysis About Cerberus Stage 2 Static Analysis | 218
Chapter 15
Running Cerberus Malware Analysis
This chapter includes the following topics about running Cerberus in FTK-based products.
For more information see About Cerberus Malware Analysis (page 201)
Cerberus first runs a threat analysis. After it completes Stage 1 analysis, it can then automatically run a static
analysis against binaries with a threat score that is higher than a certain threshold.
Cerberus analysis may slow down the speed of your overall processing. Depending on the size of your data set
and the amount of executable binaries that you must examine, it may be advisable to run Cerberus analysis in
two steps after you complete initial case processing. In this case, you can first only run Cerberus analysis stage
1 and then after stage 1 is completed, you can then choose to run Cerberus Analysis stage 2.
When creating a new case In the Case Manager, in the New Case Options dialog, click Detailed
Options.
Select Evidence Processing, then click Cerberus Analysis.
If working an existing case in the Examiner, go to Evidence > Additional Analysis. In the Additional
Analysis dialog, under the section Indexing / Tools, click Cerberus
Analysis.
To run stage 1 analysis only Deselect the option to Perform Cerberus Analysis stage 2 if stage 1
threshold is greater than, then only Cerberus Analysis stage 1 is run.
To run both stage 1 and Select the option to Perform Cerberus Analysis stage 2 if stage 1
stage 2 analysis threshold is greater than n.
Specify a threshold for a minimum threat score against which you want
to run the stage 2 analysis.
If a file’s threat score is higher than the threshold value that you set, then
stage 2 is run.If a file’s threat score is lower than the threshold value,
then stage 2 analysis is not run. By default, the threshold automatically
runs stage 2 analysis against files with a threat score greater than +20.
5. Click OK.
6. In the Additional Analysis dialog, click OK.
The Examiner includes the following Cerberus filters that let you display only files that have had Cerberus run
against them.
Cerberus Score: Lets you limit the results that are displayed in the File List pane to only files that have
had Cerberus Stage 1 analysis run against them.
Cerberus Static Analysis: Lets you limit the results that are displayed in the File List pane to only files that
have had both Cerberus Stage 1 analysis and Cerberus Stage 2 analysis.
Cerberus Columns
In the File List pane, there are Cerberus columns that display Cerberus results data.
The data that the Cerberus filter uses to render the information is also available in columns in the Item List.
These columns can be sorted and filtered.
There is a Column template that is pre-configured with columns for each of the Cerberus Threat Score
Attributes.
You can you sort the list of files to see if they have had Cerberus Stage two Static Analysis run, see their threat
score, or to see if they have attributes from a Cerberus stage 1 analysis.
Cerberus Columns
Running Cerberus Malware Analysis Using Index Search with Cerberus | 224
Chapter 16
Getting Started with KFF (Known File Filter)
Introducing KFF
This document contains the following information about understanding and getting started using KFF (Known
File Filter) with products 6.3 and later. If you are using products version 6.2 and earlier, refer to that version’s
documentation.
Important: AccessData applications versions 6.3 and later use a new KFF architecture. If you are using one of
the following applications version 6.3 or later, you must install and implement the new KFF
architecture:
Forensics products (FTK, FTK Pro, AD Lab, AD Enterprise)
Summation
eDiscovery
See What has Changed in Version 6.3 and Later on page 256.
See What Changed in Version 7.0 on page 258.
The following sections explain how to install and configure the KFF Server and KFF environment.
In the FTK, Lab, and Enterprise User Guides: See Using the Known File Filter (KFF) on page 259.
In the eDiscovery Admin Guide: See Using KFF (Known File Filter) on page 147.
In the Summation Admin Guide: See Using D-NIST (Known File Filter) on page 122.
Getting Started with KFF (Known File Filter) Introducing KFF | 225
About the KFF Server and Geolocation
Geolocation (GeoIP) data is used for the Geolocation Visualization feature of several AccessData products.
Important: In versions 6.3 and later, Geolocation data is installed automatically and independently and is no
longer tied to KFF.
Getting Started with KFF (Known File Filter) Introducing KFF | 226
About KFF
KFF (Known File Filter) is a utility that compares the file hash values of known files against the files in your
project. The known files that you compare against may be the following:
Files that you want to ignore, such as operating system or application files
Files that you want to be alerted about, such as malware or other contraband files
The hash values of files, such as MD5, are based on the file’s content, not on the file name or extension. This
helps you identify files even if they are renamed.
Using KFF during your analysis can provide the following benefits:
KFF Server - The KFF Server is the component that is used to store and process the KFF data against
your evidence. After you install the KFF Server, you import your KFF data into it.
See Installing the KFF Server on page 231.
KFF Data - The KFF data are the hashes of the known files that are compared against the files in your
project. The KFF data is organized in KFF Hash Sets and KFF Groups. The KFF data can be comprised
of hashes obtained from pre-configured libraries (such as NSRL) or custom hashes that you configure
yourself.
See Components of KFF Data on page 227.
Item Description
Hash The unique MD5 or SHA-1 hash value of a file. This is the value that is compared
between known files and the files in your project.
Hash Set A collection of hashes that are related somehow. The hash set has an ID, status,
name, vendor, package, and version. In most cases, a set corresponds to a
collection of hashes from a single source that have the same status.
Group KFF Groups are containers that are used for managing the Hash Sets that are
used in a project.
KFF Groups can contains Hash Sets as well as other groups.
Projects can only use a single KFF Group. However, when configuring your
project you can select a single KFF Group which can contains nested groups.
Status The specified status of a hash set of the known files which can be either Ignore
or Alert. When a file in a project matches a known file, this is the reported status
of the file in the project.
Getting Started with KFF (Known File Filter) About KFF | 227
Item Description
Library A pre-defined collection of hashes that you can import into the KFF Server.
You can use the following pre-defined libraries:
NSRL
For law enforcement users, you can also use Project Vic libraries.
See About Pre-defined KFF Hash Libraries on page 228.
You can also import hashes into the KFF Server in .CSV format.
For FTK-based products, you can also import hashes into the KFF Server that are contained in .TSV, .HKE,
.HKE.TXT, .HDI, .HDB, .hash, .NSRL, or .KFF file formats.
Hashes are organized into Hash Sets. Hash Sets usually include hashes that have a common status, such as
Alert or Ignore.
Hash Sets must be organized into to KFF Groups before they can be utilized in a case or project.
NIST NSRL
See Importing the NIST NSRL Library on page 248.
For law enforcement users using forensic products, you can also use Project Vic libraries.
See Using Project VIC on page 275.
It is not required to use a pre-configured KFF library in order to use KFF. You can configure or import custom
hash sets. See your application’s Admin Guide for more information.
Getting Started with KFF (Known File Filter) About KFF | 228
How KFF Works
The Known File Filter (KFF) is a body of MD5 and SHA1 hash values computed from electronic files. Some pre-
defined data is gathered and cataloged by several US federal government agencies or you can configure you
own. KFF is used to locate files residing within project evidence that have been previously encountered by other
investigators or archivists. Identifying previously cataloged (known) files within a project can expedite its
investigation.
When evidence is processed with the MD5 Hash (and/or SHA-1 Hash) and KFF options, a hash value for each
file item within the evidence is computed, and that newly computed hash value is searched for within the KFF
data. Every file item whose hash value is found in the KFF is considered to be a known file.
Note: If two hash sets in the same group have the same MD5 hash value, they must have the same metadata.
If you change the metadata of one hash set, all hash sets in the group with the same MD5 hash file will be
updated to the same metadata.
The KFF data is organized into Groups and stored in the KFF Server. The KFF Server service performs lookup
functions.
Status Values
In order to accelerate an investigation, each known file can labeled as either Alert or Ignore, meaning that the file
is likely to be forensically interesting (Alert) or uninteresting (Ignore). Other files have a status of Unknown.
The Alert/Ignore designation can assist the investigator to hone in on files that are relevant, and avoid spending
inordinate time on files that are not relevant. Known files are presented in the Overview Tab’s File Status
Container, under “KFF Alert files” and “KFF Ignorable.”
Hash Sets
The hash values comprising the KFF are organized into hash sets. Each hash set has a name, a status, and a
listing of hash values. Consider two examples. The hash set “ZZ00001 Suspected child porn” has a status of
Alert and contains 12 hash values. The hash set “BitDefender Total Security 2008 9843” has a status of Ignore
and contains 69 hash values. If, during the course of evidence processing, a file item’s hash value were found to
belong to the “ZZ00001 Suspected child porn” set, then that file item would be presented in the KFF Alert files
list. Likewise, if another file item’s hash value were found to belong to the “BitDefender Total Security 2008 9843”
set, then that file would be presented in the KFF Ignorable list.
In order to determine whether any Alert file is truly relevant to a given project, and whether any Ignore file is truly
irrelevant to a project, the investigator must understand the origins of the KFF’s hash sets, and the methods
used to determine their Alert and Ignore status assignments.
You can install libraries of pre-defined hash sets or you can import custom hash sets. The pre-defined hash sets
contain a body of MD5 and SHA1 hash values computed from electronic files that are gathered and cataloged by
several US federal government agencies.
Getting Started with KFF (Known File Filter) About KFF | 229
Higher Level Structure and Usage
Because hash set groups have the properties just described, and because custom hash sets and groups can be
defined by the investigator, the KFF mechanism can be leveraged in creative ways. For example, the
investigator may define a group of hash sets created from encryption software and another group of hash sets
created from child pornography files and then apply only those groups while processing.
Exporting to When you export KFF data using the CSV format, you can export specific pieces
CSV format of KFF data, such as one or more Hash Sets or one or more KFF Groups. The
exported CSV contains the hashes as well as all of the information about any
associated Hash Sets and KFF Groups.
Each export is contained in one .CSV file.
CSV files can be easily viewed and can be manually edited.
Importing When you import a CSV file, the data in the file is data is added to your existing
from CSV KFF data. The CSV file can be a simple file containing only the hashes of files, or
format it can contain additional information about Hash Sets and KFF Groups.
For example, suppose you manually created four Hash Sets and one KFF Group.
That would be the only contents in your KFF Server. Suppose you import a .CSV
file that contains five hash sets and two KFF Groups. They will be added together
for a total of nine Hash Sets and three KFF Groups.
To import .CSV files, you can do either of the following:
Use the KFF Import feature in your application.
See Using the Known File Feature chapter.
Use the stand-alone KFF Import Utility.
See Importing KFF Data on page 243.
To view a sample of a .CSV file that contains binaries and Hash Sets and KFF Groups, perform a CSV export
and view the file in Excel. You can also use the format of CSV files that were exported in previous versions.
Getting Started with KFF (Known File Filter) About KFF | 230
Installing the KFF Server
For product versions 6.3 and later, you install a KFF Server by installing Apache Cassandra.
For product versions 5.6 - 6.2, you install a KFF Server by installing the AccessData Elasticsearch.
Where you install the KFF Server depends on the product you are using with KFF.
6.3, 6.4, Apache Cassandra March 2018 See Determining Where to Install the
6.5, 7.0 (stand-alone update) KFF Server on page 233.
Version 3.11.2
See Downloading the Latest KFF
Installation Files on page 232.
This 3.11.2 version should be installed
over the 3.11.0 version (do not uninstall
3.11.0). This will maintain your KFF
data.
6.3 Apache Cassandra October 2017 with 6.3 Note: This version is not compatible
versions of with the Java version 8 update 161.
Version 3.11.0 This was fixed with Cassandra
FTK-based products
database 3.11.2
Summation
eDiscovery
See Migrating Legacy KFF Data from Previous Versions on page 240.
Getting Started with KFF (Known File Filter) Installing the KFF Server | 231
Process for Installing KFF
The process for installing KFF is as follows:
Getting Started with KFF (Known File Filter) Installing the KFF Server | 232
Determining Where to Install the KFF Server
Where you install the KFF Server depends on the application and environment you are running.
For FTK and FTK Pro applications, the KFF Server must be installed on the same computer that runs the
FTK Examiner application.
For AD Lab and AD Enterprise, applications, the KFF Server can be installed on the same computer that
runs the FTK Examiner application or on a different computer. For performance purposes, it is generally
installed on a different computer.
See AD Lab and AD Enterprise on page 233.
For Summation or eDiscovery, the KFF Server may be installed on either the same computer as the
application or on a different computer. For large environments, it is recommended that the KFF Server be
installed on a dedicated computer.
See Summation or eDiscovery on page 234.
After installing the KFF Server, you configure the application with the location of the KFF Server.
See Configuring the Location of the KFF Server on page 237.
Getting Started with KFF (Known File Filter) Installing the KFF Server | 233
Summation or eDiscovery
With Summation or eDiscovery, you may have one of the following environments. The type of environment
determines where and how to configure the KFF Server.
Distributed Components Components of the application are installed on multiple servers. For example,
with Local Processing the MAP component is on one server and other application components, such as
WCF Services and Local Processing are installed on a separate computer.
You can install the KFF Server on the same server as WCF Services and
Local Processing or on a different remote computer.
If you install the KFF Server on the same server, no special configuration for
KFF is needed.
If you install the KFF Server on a remote computer, you must perform special
configuration steps for KFF.
Distributed Processing You have installed the Distributed Processing Manager and Distributed
Manager and Engines Processing Engines.
You can install the KFF Server on any computer.
You must perform special configuration steps for KFF.
Dedicated KFF Server For performance, you can install the KFF Server on a dedicated computer.
You must perform special configuration steps for KFF.
If you do not need to perform special configuration steps, you can use default settings.
Configure the KFF Sever location by editing two application configuration files.
See Configuring the KFF Server Location on Summation or eDiscovery on page 238.
Application version 6.3 and later:
During the installation of Cassandra, you must enable and configure remote access.
See Installing the KFF Server on page 235.
Ifyou installed Cassandra without enabling remote access, you can manually configure Cassandra.
See Manually Configuring Remote Setting for Cassandra on page 239.
Getting Started with KFF (Known File Filter) Installing the KFF Server | 234
Installing the KFF Server
How you install the KFF Server depends on version of the product you are running.
For product versions 6.3 and later, you install the KFF Server by installing Apache Cassandra 3.11.2.
Cassandra Prerequisites
Python 2.7 When you install Cassandra, it will also automatically install Python 2.7.13 if
needed.
Java 8 (64-bit) Important: In order to install Cassandra, you must have 64-bit Java for Windows
version 8. No other version of Java (7 or 9) is currently supported. The
latest version of Java that has been tested with KFF is Java 8 update
192 (64-bit).
Before installing Cassandra, you must install Java 8.
https://java.com/en/download/windows-64bit.jsp
If you are using a 32-bit browser, your browser may automatically download the
32-bit version. You must use the 64-bit version.
Getting Started with KFF (Known File Filter) Installing the KFF Server | 235
Installing Cassandra
To install Cassandra
1. Select the computer that you want to install Cassandra on.
See Determining Where to Install the KFF Server on page 233.
2. If needed, install 64-bit Java 8.
See Cassandra Prerequisites on page 235.
3. Use one of the following to access AccessData_Cassandra_Installer.exe:
Installation Disk
Download ISO
See Downloading the Latest KFF Installation Files on page 232.
4. Launch Cassandra\AccessData_Cassandra_Installer.exe.
5. If needed, click Install to install Python 2.7 (x64).
6. On the Cassandra installer Welcome page, click Next.
7. Accept the license terms and click Next.
8. Verify or change the the Destination Folder and click Next.
9. If needed, configure Remote Access.
See Determining Where to Install the KFF Server on page 233.
Important: If installing for FTK, do not enable Remote Access. FTK requires a setting of localhost.
9a. Select Enable Remote Access.
9b. In the RPC_Address field, enter the IP address of the computer you are installing on.
For example, 10.10.10.10.
9c. In the Native Transport Port Number field, leave the default 9042.
9d. Click Next.
If you do not enable Remote Access during installation, you can manually configure it later.
See Manually Configuring Remote Setting for Cassandra on page 239.
10. If you enabled Remote Access, set the User Credentials for the service and click Next.
11. Click Install to perform the installation.
12. Click Finish.
13. If your AccessData application is already open, restart it.
Getting Started with KFF (Known File Filter) Installing the KFF Server | 236
Configuring the Location of the KFF Server
After installing the KFF Server, on the computer running the application, such as Summation, eDiscovery, FTK,
or AD Lab, you configure the location of the KFF Server.
Do one of the following:
Configuring the KFF Server Location on AD Lab and AD Enterprise (page 237)
Configuring the KFF Server Location on Summation or eDiscovery (page 238)
Manually Configuring Remote Setting for Cassandra (page 239)
If running with AD Lab or AD Enterprise, and if not using default settings, before using KFF, you must configure
the location of the KFF Server.
Getting Started with KFF (Known File Filter) Configuring the Location of the KFF Server | 237
Configuring the KFF Server Location on Summation or eDiscovery
When using the KFF Server with Summation or eDiscovery, two configuration files must point to the KFF Server
location.
Important: If you are upgrading to 6.3 or later from 6.2 or earlier, the syntax of and the port values for the KFF
Server have changed. If the KFF Server is not being recognized, make sure that the two config files
are correct.
See What has Changed in Version 6.3 and Later on page 256.
If one of the following is true, you must manually specify the location of the KFF Server:
Manually Verifying or Configuring the KFF Server Location on products 6.3 and later
1. Configure AdgWindowsServiceHost.exe.config:
1a. On the computer running the work manger service, go to C:\Program
Files\AccessData\Common\FTK Business Services.
1b. Open AdgWindowsServiceHost.exe.config.
1c. Find the line <add key=”KFFServerUrl” value=”localhost:9042” />.
Note: 9042 is the default port for Cassandra.
1d. If needed, change localhost to be the location IP address of your KFF server.
For example, value=”10.10.10.10:9042”
Otherwise, leave as localhost.
1e. Leave the following line unchanged:
<add key=”KFFServerDBType” value=”Cassandra” />
1f. Save and close the file.
1g. If you changed the file, restart the AccessData Business Services Common service.
Getting Started with KFF (Known File Filter) Configuring the Location of the KFF Server | 238
2. Configure Infrastructure.WorkExecutionServices.Host.exe.config:
2a. On the computer running the work manger service, go to C:\Program
Files\AccessData\eDiscovery\WorkManager.
2b. Open Infrastructure.WorkExecutionServices.Host.exe.config.
2c. Find the line <add key=”KFFServerUrl” value=”localhost:9042” />.
Note: 9042 is the default port for Cassandra.
2d. If needed, change localhost to be the location IP address of your KFF server.
For example, value=”10.10.10.10:9042”
Otherwise, leave as localhost.
2e. Leave the following line unchanged:
<add key=”KFFServerDBType” value=”Cassandra” />
2f. Save and close the file.
2g. If you changed the file, restart the AccessData Work Manager service.
3. Migrate or Import your KFF Hash Data.
See About Importing KFF Data on page 243.
However, if you did not enable remote access or make a change, you can manually configure the remote
settings for Cassandra.
Getting Started with KFF (Known File Filter) Configuring the Location of the KFF Server | 239
Migrating Legacy KFF Data from Previous Versions
You can migrate KFF Data from a previous KFF Server architecture to a newer one.
See Migrating Legacy KFF Data from versions 5.6 - 6.2 to 6.4 on page 240.
See Migrating Legacy KFF Data from versions 5.5 and earlier on page 241.
You migrate data using the KFF Migration Tool. To use the KFF Migration Tool, you identify the following:
Getting Started with KFF (Known File Filter) Migrating Legacy KFF Data from Previous Versions | 240
To migrate legacy KFF data
1. Launch the KFF Hash Manager Migration Tool.
2. Enter the location and port of the legacy ElasticSearch KFF data.
For example, if ElasticSearch is on the same computer, you can use the default location of
http://localhost:9200.
If it is on a different computer, enter the IP address and port of the computer. For example, http://
10.10.10.10:9200.
3. Enter the location of the new KFF server (Cassandra database).
For example, if Cassandra is on the same computer, you can use the default location of
localhost. If it is on a different computer, enter the IP address, for example, 10.10.10.10.
4. Click Start Migration.
Because KFF Templates are no longer used, they will be migrated as KFF Groups, and the groups that were
under the template will be added as sub-groups.
You migrate data using the KFF Migration Tool. To use the KFF Migration Tool, you identify the following:
The Storage Directory folder where the legacy KFF data is located.
This was folder was configured using the KFF Server Configuration utility when you installed the legacy
KFF Server. If needed, you can use this utility to view the KFF Storage Directory. The default location of
the KFF_Config.exe file is Program Files\AccessData\KFF.
The URL of the new KFF Server (the computer running the AccessData Elastic Search Windows Service)
This is populated automatically if the new KFF Server has been installed.
Getting Started with KFF (Known File Filter) Migrating Legacy KFF Data from Previous Versions | 241
4. The URL of Elasticsearch should be listed.
5. Click Start.
6. When completed, review the summary data.
Getting Started with KFF (Known File Filter) Migrating Legacy KFF Data from Previous Versions | 242
Importing KFF Data
Source Description
Pre-configured KFF libraries You can import KFF data from the following pre-configured libraries
NIST NSRL
Law enforcement users: Project VIC
To import large KFF libraries, use the KFF Import Utility.
See About KFF Data Import Tools on page 243.
See Importing Pre-defined KFF Data Libraries on page 247.
See KFF Library Reference Information on page 254.
Custom Hash Sets and KFF You can import custom hashes from CSV and other file types.
Groups See About the CSV Format on page 230.
You can import custom CSV files either through the application or the KFF
Import Utility.
Other files types can be imported in FTK.
See About KFF Data Import Tools on page 243.
The application’s Import The KFF management feature in the application lets you import .CSV files
feature (especially files that only have one KFF status).
For FTK-based forensics products, you can also import custom hashes from the
following file types:
Delimited files (CSV or TSV)
Hash Database files (HDB)
FTK Exported KFF files (KFF)
FTK Supported XML files (XML)
FTK Exported Hash files (HASH)
Project VIC JSON files
To import these kinds of files, use the KFF Import feature in your application.
See Using the Known File Feature chapter.
You can also manually create your own KFF hash set data.
Getting Started with KFF (Known File Filter) Importing KFF Data | 243
KFF Data Import Tools
KFF Import Utility You can import files using the KFF Import Utility.
It is recommended that you use the KFF Import Utility to import files in the
following situations:
A CSV file that has a mixture of Alert and Ignore statuses.
Large pre-configured libraries:
NIST NSRL
See Using the KFF Import Utility on page 245.
Important: You must use the same version of the KFF Import Utility as the
product you are using. If you are using 6.4, you must use the 6.4
version of the KFF Import Utility to import the NSRL library into the
KFF Server.
Getting Started with KFF (Known File Filter) Importing KFF Data | 244
Using the KFF Import Utility
It is important that you use the correct version of the KFF Import Utility with the version of the application you are
using. The KFF Import Utility was modified significantly for 6.3.
Important: You must use the same version of the KFF Import Utility as the product you are using.
If you are using 6.4, you must use the 6.4 version of the KFF Import Utility to import the NSRL library into
the KFF Server.
If you are using 6.3, you must use the 6.3 version of the KFF Import Utility to import the NSRL library into
the KFF Server.
You can also use the KFF Import Utility to remove the NSRL, NDIC, or DHS indexes that you have imported.
Installing the KFF Import Utility versions 6.3, 6.4, and later
You must use the matching version of the KFF Import Utility with your application, for example, 6.3 or 6.4.
Getting Started with KFF (Known File Filter) Using the KFF Import Utility | 245
Importing a CSV Using the KFF Import Utility versions 6.3 and later
You can import Hash Sets and KFF Groups by importing a custom CSV file.
Verifying a File Using the KFF Import Utility versions 6.3 and later
You can verify imported Hash Sets and KFF Groups to ensure the correct file is being imported.
Removing Pre-defined KFF Libraries Using the KFF Import Utility version 6.3 and later
You can remove a pre-defined KFF Library that you have previously imported.
You cannot see or remove existing custom KFF data (your own CSVs or manually entered data).
Getting Started with KFF (Known File Filter) Using the KFF Import Utility | 246
Importing Pre-defined KFF Data Libraries
Important: In versions 6.3, you must import specific files for these versions. It is recommend that you use the
KFF Import Utility.
After importing pre-defined KFF Libraries, you can remove them from the KFF Server.
Removing Pre-defined KFF Libraries Using the KFF Import Utility version 6.3 and later (page 246)
See the following sections:
Getting Started with KFF (Known File Filter) Using the KFF Import Utility | 247
Importing the NIST NSRL Library
To import NSRL data in applications version 6.3, 6.4, 7.0, and later, you can do one of the following:
Download version 2.58 or later RDS files from nist.gov and import them.
See Downloading and Importing the NIST NSRL Files from NIST.ORG on page 248.
Download version 2.54 files from AccessData and import them.
See Downloading and Importing the NIST NSRL Files from NIST.ORG on page 248.
Important: The NSRL library is very large. It can take several hours to import it.
After you have downloaded the files, you import them into the KFF Server.
Before importing NSRL data, we recommend that you verify the hashes of the iso files that you downloaded from
NIST. This assures that the data has not been corrupted.
Getting Started with KFF (Known File Filter) Using the KFF Import Utility | 248
To prepare NSRL files for importing
1. Mount the RDS ISO file.
2. Create a folder that you can browse to from the Import Utility (for example, RDS_258_modern).
3. Extract the NSRLFile.txt.zip file into that RDS folder.
4. Copy the following files from the ISO image to that same RDS folder:
NSRLProd.txt
NSRLOS.txt
NSRLMfg.txt
NSRLOS.txt
NSRLMfg.txt
NSRLFile.txt
AppTypes.txt
Getting Started with KFF (Known File Filter) Using the KFF Import Utility | 249
Importing the NIST NSRL Library Files from AccessData (v2.54)
You can download version 2.54 files from AccessData and import them.
Important: The NSRL library data is contained in a large (3.75 GB) .ZIP file. When expanded, the data is about
21.7 GB. Make sure that your file system can support files of this size.
About NSRL Library Files Provided by AccessData
You can import the NSRL library into your KFF Server. During the import, two KFF Groups are created:
NSRL_Alert and NSRL_Ignore. In FTK-based products, these two groups are automatically added to the Default
KFF Group.
The NSRL libraries are updated from time to time. The NSRL import feature supports appending new data and
updating existing data when importing a newer version. To import and maintain the NSRL data, you do the
following:
1. Import the complete You must first install the most current complete NSRL library. You can later add
NSRL library. updates to it.
To access and import the complete NSRL library, see
Importing the NIST NSRL Library (page 248)
2. Import updates to the When updates are made available, import the updates to bring the data up-to
library date.
See Installing KFF Updates on page 253.
Important: In order to use the NSRL updates, you must first import the complete
library. When you install an NSRL update, you must keep the previous NSRL
versions installed in order to maintain the complete set of NSRL data.
NSRL Library
Release Released Information
Complete library Mar 2017 For use only with applications version 5.6 and later.
version 2.54 Contains the full NSRL library up through update 2.54.
(source .ZIP file)
Complete library Nov 2014 For use only with applications version 5.6 and later.
version 2.45 Contains the full NSRL library up through update 2.45.
(source .ZIP file)
Getting Started with KFF (Known File Filter) Using the KFF Import Utility | 250
4a. Launch the KFF Import Utility.
4b. Browse to the NSRLFile.txt that is contained in the nsrlsource_2.54 folder.
4c. Click Open.
4d. Click Import.
4e. When the import is complete, a finished window pops up, click OK.
Getting Started with KFF (Known File Filter) Using the KFF Import Utility | 251
Uninstalling KFF
You can uninstall KFF application components independently of the KFF Data.
Applications 5.5 For applications version 5.5 and earlier, you can uninstall the following components:
and earlier
KFF Server (v1.2.7 and earlier)
Note: The KFF Server is also used by the geolocation visualization feature.
AccessData Geo Location Data (1.0.1 and earlier)
This component is not used by the KFF feature, but with the KFF Server for the geolo-
cation visualization feature.
The location of the KFF data was configured when the KFF Server was installed. You can
view the location of the data by running the KFF.Config.exe on the KFF Server.
If you are upgrading from 5.5 to 5.6, you can migrate your KFF data before uninstalling the
KFF Server.
Getting Started with KFF (Known File Filter) Uninstalling KFF | 252
Installing KFF Updates
From time to time, AccessData will release updates to the KFF Server and the KFF data libraries.
Some of the KFF data updates may require you to update the version of the KFF Server.
Getting Started with KFF (Known File Filter) Installing KFF Updates | 253
KFF Library Reference Information
The following pre-defined libraries are currently available for KFF and come from federal government agencies:
Use the following information to help identify the origin of any hash set within the KFF
The NSRL hash sets do not begin with “ZZN” or “ZN”. In addition, in the AD Lab KFF, all the NSRL hash
set names are appended (post-fixed) with multi-digit numeric identifier. For example: “Password Manager
& Form Filler 9722.”
Once an investigator has identified the vendor from which a hash set has come, he/she may need to consider
the vendor’s philosophy on collecting and categorizing hash sets, and the methods used by the vendor to gather
hash values into sets, in order to determine the relevance of Alert (and Ignore) hits to his/her project. The
following descriptions may be useful in assessing hits.
NIST NSRL
The NIST NSRL collection is described at: http://www.nsrl.nist.gov/index.html. It is composed entirely of hash
sets being generated from application software. So, all of its hash sets are given Ignore status by AccessData
staff except for those whose names make them sound as though they could be used for illicit purposes.
The NSRL collection divides itself into many sub-collections of hash sets with similar names. In addition, many of
these hash sets are “empty”, that is, they are not accompanied by any hash values. The size of the NSRL
collection, combined with the similarity in set naming and the problem of empty sets, allows AccessData to
modify (or selectively alter) NSRL’s own set names to remove ambiguity and redundancy.
You could define a group of hash sets created from encryption software and another group of hash sets
created from child pornography files. Then, you would apply only those groups while processing.
You could also use the Ignore status. You are about to process a hard drive image, but your search
warrant does not allow inspection of certain files within the image that have been previously identified.
You could do the following and still observe the warrant:
4a. Open the image in Imager, navigate to each of the prohibited files, and cause an MD5 hash value
to be computed for each.
4b. Import these hash values into custom hash sets (one or more), add those sets to a custom group,
and give the group Ignore status.
Getting Started with KFF (Known File Filter) KFF Library Reference Information | 254
4c. Process the image with the MD5 and KFF options, and with AD_Alert, AD_Ignore, and the new,
custom group selected.
4d. During post-processing analysis, filter file lists to eliminate rows representing files with Ignore
status.
Category Description
AccessData The sets shipped with as the Library. Custom groups can be created from these sets, but
the sets and their status values are read only.
Project Sets and groups created by the investigator to be applied only within an individual project.
Specific
Shared Sets and groups created by the investigator for use within multiple projects all stored in the
same database, and within the same application schema.
Important: Coordination among other investigators is essential when altering Shared groups in a lab
deployment. Each investigator must consider how other investigators will be affected when Shared
groups are modified.
Getting Started with KFF (Known File Filter) KFF Library Reference Information | 255
What has Changed in Version 6.3 and Later
See What Changed in Version 6.3 on page 256.
See What Changed in FTK and Lab Version 6.4 on page 257.
See What Changed in March of 2018 on page 257.
See What Changed in Enterprise Version 6.5 on page 258.
See What Changed in Version 7.0 on page 258.
If you used KFF with applications version 6.2 or earlier, be aware of the following changes in the KFF
functionality.
Item Description
KFF Server KFF Server now runs as a different service.
In versions 5.6 through 6.2, the KFF Server ran as the AccessData Elastic-
search Windows Service.
In 6.3 and later, the KFF Server uses the AccessData Cassandra service.
Important: If you are upgrading from 6.2 or earlier, all KFF data must be created
in or migrated into the new KFF Server.
See Migrating Legacy KFF Data from versions 5.6 - 6.2 to 6.4 on page 240.
eDiscovery or In eDiscovery or Summation, there are two configuration files that configure the
Summation KFF Server location of the KFF server.
Configuration Files See Configuring the KFF Server Location on Summation or eDiscovery on
page 238.
The location format and port value in those files have changed.
In 5.6 - 6.2, the following was used:
<add key=”KffElasticSearchUrl” value=”http://localhost:9200” />
In 6.3 it was changed to:
<add key=”KFFServerUrl” value=”localhost:9042” />
Note: The “http://” text is no longer used and Cassandra uses port 9042 instead
of 9200.
There is also a new line:
<add key=”KFFServerDBType” value=”Cassandra” />
Getting Started with KFF (Known File Filter) What has Changed in Version 6.3 and Later | 256
KFF Changes from version 6.2 to 6.3
Item Description
Hash Manager Migration If you are upgrading from 5.6 through 6.2, there is a new tool that lets you
Tool migrate custom KFF data to the new KFF Server on 6.3.
See Migrating Legacy KFF Data from versions 5.6 - 6.2 to 6.4 on page 240.
Important: NIST NSRL, NDIC HashKeeper, or DHS library data from 6.2 and
earlier will not be migrated when using the Migration Tool. You must re-import
those using the 6.3 KFF Import Tool.
See About Importing Pre-defined KFF Data Libraries on page 247.
KFF Import Utility This utility has been updated to use the new KFF Server.
If you are upgrading from 5.6 - 6.2, make sure to install and use the new 6.3
version.
See Using the KFF Import Utility on page 245.
NIST NSRL To import NSRL data, you can do either of the following:
Download version 2.54 files from AccessData and import them.
Download version 2.58 or later RDS files from nist.gov and import them.
See Importing the NIST NSRL Library on page 248.
Export/Import When you export and import KFF data, the Binary format (Entire Library) is no
longer available. CSV is the only export format supported.
Geolocation data Geolocation data is installed independently and is no longer linked to KFF.
Note: Locked/Protected sets will not be migrated from 6.3 to 6.4 in KFF. These will need to be imported.
Only the Project VIC and NSRL sets are locked/protected. All other sets in the KFF can be modified and
archived.
NDIC or DHS sets cannot be migrated into the 6.4 version of KFF.
See the FTK and LAB 6.4 Release Notes.
See the KFF Release Notes from March 2018 for details.
Getting Started with KFF (Known File Filter) What has Changed in Version 6.3 and Later | 257
What Changed in Enterprise Version 6.5
No changes were made and you still use the same KFF Server: Version 3.11.2
Getting Started with KFF (Known File Filter) What has Changed in Version 6.3 and Later | 258
Chapter 17
Using the Known File Filter (KFF)
This chapter explains how to configure and use KFF and has the following sections:
Step 3. Add and manage KFF Groups to organize KFF Hash Sets.
Using KFF Groups to Organize Hash Sets (page 266)
Step 7. (Optional) Archive or export KFF data to share with other KFF Servers.
See Exporting KFF Data on page 274.
Using the Known File Filter (KFF) Process for Using KFF | 259
About the KFF Admin page
You use the KFF Admin page to configure KFF Data by doing the following:
Import Hashes
Manually manage Hash Sets
Create and manage KFF Groups
Export KFF data
Hash Sets Pane Displays the sets that you have imported or
created.
For example, if you import the NSRL KFF library,
those sets are displayed here.
Once you select a KFF Group in the Groups pane,
only the Hash Sets and Groups that are in that
selected group are listed.
Using the Known File Filter (KFF) About the KFF Admin page | 260
Elements of the KFF Admin page
Archive Server Lets you archive all of the custom KFF Groups and
Hash Sets stored in this KFF Server.
See Enabling a Case to Use KFF on page 269.
Using the Known File Filter (KFF) About the KFF Admin page | 261
Adding Hashes to the KFF Server
You must add the hashes of the files that you want to compare against your evidence data. When adding hashes
to the KFF Server, you add them in KFF Hash Sets.
You can use the following methods to add hashes to the KFF Library:
Migrate legacy KFF Server You can migrate legacy KFF data that is in a KFF Server in applications
data versions 5.5 and earlier.
See Migrating Legacy KFF Data from versions 5.5 and earlier on
page 241.
Import hashes You can import previously configured KFF hashes, for example, from
.CSV, .HDB, .HKE, or .HASH files.
See Importing KFF Data on page 262.
Manually create and manage You can manually add hashes to a Hash Set.
Hash Sets See Manually Managing Hashes in a Hash Set on page 263.
Add hashes from files in your You can add hashes from files in your case.
case See Adding Hashes From Files in Cases on page 264.
This chapter explains how to import KFF data using the KFF Admin page.
KFF export files, such as CSV, TSV, HDB, HKE, KFF, HASH
See About the CSV Format on page 230.
KFF export files, such as TSV, HDB, HKE, KFF, HASH
When importing KFF data, you must enter values for the following fields:
Name
Source Vendor
Version
Package
While the values are required, you can enter whatever values you may want to use to help you organize your
hashes.
Using the Known File Filter (KFF) Adding Hashes to the KFF Server | 262
To import KFF hashes from files
1. Open the Case Manager or the Examiner.
2. Click Manage > KFF.
3. In KFF Admin, click Import.
4. Click Add File.
5. Set the Status: Alert or Ignore.
6. To browse to a file, for the Path, click ...
7. Browse to the path of the file.
8. Use the file type selector to view the types of files that you are looking for (.CSV, HKE, KFF, etc.)
9. Select a file.
10. Click Open.
11. Enter information for the hash set:
12. Click OK.
13. (Optional) Add other files that you want to import.
14. Click Import.
Important: You can manually delete hash values that were imported from NSRL, NDIC HashKeeper, and DHS
libraries. However, this can take one to several hours. Instead of deleting them using the application,
we recommend that you delete them using the KFF Import Utility. See Removing Pre-defined KFF
Libraries Using the KFF Import Utility version 6.3 and later on page 246.
You can use the KFF Hash Finder to search for hash values within a hash set. You search by entering a
complete hash value. You can only search for one hash within one hash set at a time.
Using the Known File Filter (KFF) Adding Hashes to the KFF Server | 263
5d. Select the status of the hash:
Alert
Ignore
None
5e. Enter the File Name of the file for the hash.
5f. (Optional) Enter other information about the hash.
5g. Click Save.
6. To manually edit a hash in a hash set, do the following:
6a. In the Hash field, enter the complete hash value that you want to edit.
6b. Click Search to verify that the hash already exists.
6c. If the hash was found, click Edit.
6d. Edit any settings and click Save.
7. To manually delete a hash from a hash set, do the following:
7a. In the Hash field, enter the complete hash value that you want to delete.
7b. Click Search to verify that the hash already exists.
7c. If the hash was found, click Delete.
8. Click Done.
Using the Known File Filter (KFF) Adding Hashes to the KFF Server | 264
4h. (Optional) Click Add file and repeat for other files.
4i. Click Import.
5. Add the new Hash Sets to one or more KFF Groups.
Using the Known File Filter (KFF) Adding Hashes to the KFF Server | 265
Using KFF Groups to Organize Hash Sets
When you enable KFF for a case, you select which KFF Group to use during processing.
Within a KFF group, you can manually edit custom Hash Sets.
Alert - All Hash Sets within the KFF Group will be set to Alert regardless of the status of the individual
Hash Sets.
Ignore - All Hash Sets within the KFF Group will be set to Ignore regardless of the status of the individual
Hash Sets.
No Override - All Hash Sets will maintain their default status.
For example, if you have a Hash Set with a status of Alert, if you set the KFF Group to No Override, then the
default status of Alert is used. If you set the KFF Group with a status of Ignore, the Hash Set Alert status is
overridden and Ignore is used.
As a result, use caution when setting the Status Override for a KFF Group.
The reason that you may want to nest KFF Groups is that you can use multiple KFF Groups when processing
your data. When you enable KFF for a case, you can only select one KFF Group. By nesting, you can use
multiple KFF Groups.
For example, you may have one KFF Group that contains Hash Sets with an Alert status. You may have a
second KFF Group that contains Hash Sets with an Ignore status. When processing a case, you may want to
use both of those KFF Groups. To accomplish this, you can create another KFF Group as a parent and then add
the other two KFF Groups to it. When processing, you would select the parent KFF Group.
When nesting KFF Groups you must be mindful of the Status Override of the parent KFF Group. When nesting
KFF Groups, the Status Override the highest KFF Group in the hierarchy is used. In most cases, you will want to
set the parent KFF Group with a status of None. That way, the status of each child KFF Group (or their Hash
Sets) is used. If you select an Alert or Ignore status for the parent KFF Group, then all child KFF Groups and
their Hash Sets will use that status.
Using the Known File Filter (KFF) Using KFF Groups to Organize Hash Sets | 266
About the Default KFF Group
A Default KFF Group is automatically created, but by default, has no Hash Sets in it. You cannot rename or
delete the Default KFF Group however, you can add and remove Hash Sets.
The purpose of the Default KFF Group is that you can add the Hash Sets that you most regularly use, and when
you enable the processing of KFF data for a case, you can simply select the Default KFF Group.
If you install NSRL, NDIC HashKeeper, and DHS libraries, they are automatically added to the Default KFF
Group. You can remove them from the Default KFF Group if you wish.
Using the Known File Filter (KFF) Using KFF Groups to Organize Hash Sets | 267
To manage a KFF Group
1. Open the Case Manager or the Examiner.
2. Click Manage > KFF.
3. Select a group or right-click a KFF Group.
4. Do one of the following:
Click Edit.
Click Delete.
Click Export.
Using the Known File Filter (KFF) Using KFF Groups to Organize Hash Sets | 268
Enabling a Case to Use KFF
1. (Optional) Create a You can enable KFF when you create a case or add evidence to a case.
new case or add You can also enable KFF for an existing case using Additional Analysis.
evidence to a case.
See Re-Processing KFF Using Additional Analysis on page 273.
2. Configure how to When you create a case or or add evidence to a case, you can choose how to
process KFF Ignorable process KFF Ignorable files:
files Exclude KFF Ignorable Files - By default, KFF will not include Ignorable files
in the processed evidence. They will not be visible in the Examiner nor will
they be in any file counts.
Enable Include KFF Ignorable Files - You can enable a processing option to
include KFF Ignorable files. Any files that are KFF Ignorable will be included
and visible in the project.
However, Ignorable files can be hidden using filters.
See Enabling and Configuring KFF on page 269.
See Using KFF Filters on page 272.
When you process KFF using Additional Analysis, KFF Ignorable files are still
included in the case’s evidence files.
4. Select a KFF Group When you enable KFF, you select one KFF group to use. You can select an
existing group or create a new group.
A KFF Group can include other KFF Groups. You can select a parent KFF Group
that contains other groups with the sets that you want to use
See Using KFF Groups to Organize Hash Sets on page 266.
Using the Known File Filter (KFF) Enabling a Case to Use KFF | 269
2c. Click the Evidence Processing tab.
3. In the Evidence Processing options, select KFF.
4. Do one of the following to select a KFF Group:
In the KFF drop-down menu, select and existing KFF Group that you want to use.
Click ... to open KFF Admin and configure a KFF Group to use and then select it.
See About KFF Groups on page 266.
You can use a KFF Group that you created or use the Default group.
See About the Default KFF Group on page 267.
5. Configure any other processing options.
6. Click OK.
Using the Known File Filter (KFF) Enabling a Case to Use KFF | 270
Reviewing KFF Results in the Examiner
You can view the KFF results in the Examiner. You can use the following tools to view KFF results:
Note: KFF Ignorable files will not be displayed in the File List unless you enabled the Include KFF Ignorable
Files processing option.
See Enabling a Case to Use KFF on page 269.
KFF Columns
Column Description
KFF Status Displays the status of the file as it pertains to KFF. The three status options are
Alert, Ignore, or Unknown (blank).
KFF Group Displays the name of the KFF Group that has the matched hash.
Not KFF Ignore... Displays a True status it if is not a KFF Ignorable file or a False status if it is a
KFF Ignorable file.
Using the Known File Filter (KFF) Reviewing KFF Results in the Examiner | 271
Using KFF Filters
You can use filters to filter your evidence based on KFF data. You can use the Filter Manager to build a
Compound filters.
Using the Known File Filter (KFF) Reviewing KFF Results in the Examiner | 272
Re-Processing KFF Using Additional Analysis
You can process an existing case with KFF using Additional Analysis in the following situations:
After you have processed a case with KFF enabled, you can re-process your data using an updated or
different KFF Group. This is useful in re-examining a project after adding or editing hash sets.
See Adding Hashes From Files in Cases on page 264.
Enabling KFF for a case that was not previously processed using KFF.
Using the Known File Filter (KFF) Re-Processing KFF Using Additional Analysis | 273
Exporting KFF Data
Exporting KFF Groups - This exports the selected KFF Groups with any included sub-groups and any
included Hash Sets and hashes to a CSV file.
See About the CSV Format on page 230.
Using the Known File Filter (KFF) Exporting KFF Data | 274
Chapter 18
Using Project VIC
This chapter contains information on how to integrate with and use Project VIC.
Project VIC has compiled information about known online child abuse images. Known image or video files have
unique identifier known as a “hash value.” When you process your evidence data, it is compared to the known
hash values. If a match is found, the file in your evidence is flagged. You can easily see flagged files in the
examiner.
You can also provide information to Project VIC about images that were previously unknown.
About PhotoDNA
Project VIC includes a component called PhotoDNA. This tool compiles a digital signature or fingerprint of
images (known as a “hash”), which can be matched against a database of known child pornography images.
This significantly reduces the time law enforcement officers must spend viewing images, speeding their
determination of whether child victims have already been identified or are currently at risk.
Note: This PhotoDNA feature requires a special law enforcement license. Contact sales for more information.
Without the license, the feature is not enabled.
The KFF architecture lets you import Project VIC hash values and compare your evidence data against those
hash sets. Files that match hits in Project Vic are flagged so you you can easily identify them.
The categories can vary depending on the country or region in which you are.
For example, in the United States of America, the following categories are used:
Step 4. Create a case, enable Project VIC for the case, and process the case.
See Creating a Case and Enabling Project VIC on page 279.
If you want to use data from Project VIC, you must contact them and have an account with them in order to
download hash data.
If you have not done so, you must install a KFF Server.
For other information on how to use the KFF infrastructure, see Using the Known File Filter (KFF) (page 259).
If you import Project VIC data, they are imported as KFF Hash Sets. The imported Project VIC hash sets are
automatically placed in a KFF Group named Project VIC - Region which is nested inside a parent group named
Project VIC. When you process a case, you select one, and only one KFF Group to use. The Project VIC KFF
group is the one to generally use unless you use some custom sets.
If you have custom hash sets, you must manually associate them with a KFF Group.
1. Create a new case or You can enable Project VIC when you create a case or add evidence to a case.
add evidence to a case. You can also enable Project VIC for an existing case using Additional Analysis.
2. Enable Project VIC You enable Project VIC by enabling the following processing options:
KFF
Photo DNA
A law enforcement licence is required for the PhotoDNA option to be avail-
able.
See About PhotoDNA on page 275.
See Enabling and Configuring Project VIC on page 279.
4. Select a KFF Group When you enable Project VIC, you can select the Project VIC KFF group to use
or you can select a custom group if you created one.
Note: A law enforcement licence is required for the PhotoDNA option to be available.
Using Project VIC Creating a Case and Enabling Project VIC | 279
Viewing Project VIC Results in the Examiner
You can view the Project VIC results in the Examiner. You can use the following tools to view Project VIC
results:
Note: A law enforcement licence is required for the PhotoDNA information to be available.
Column Description
VIC Category Depending on your region, this is the category as matched with Project VIC hash
data.
VIC Hash Type Identifies if the file was flagged through a SHA1 hash or through PhotoDNA.
PhotoDNA Hash When a file is flagged and categorized, a hash is assigned to it.
The hash value is based on difference from the known image.
You can also use this column to find files that have a PhotoDNA hash but do not
have a VIC category. You can bookmark these files and export them to Project
VIC so that they can be reviewed and categorized.
Bookmarking Files to Export to Project VIC (page 282)
Using Project VIC Viewing Project VIC Results in the Examiner | 280
Project VIC and PhotoDNA Columns
Column Description
Photo DNA Distance A PhotoDNA Distance value is generated that represents how closely it matches
any of the files in Project VIC. (If the image matches more than one item, the
closest score is used).
The PhotoDNA Distance value can range from 0 to 49,000. A value of 0 means
that there is no distance and the photo is a perfect match. Any score higher than
the range means that there is no match and therefore no value is given.
Using Project VIC Viewing Project VIC Results in the Examiner | 281
Bookmarking Files to Export to Project VIC
You may discover images in your evidence that are not categorized but could be.
Using the Project VIC and PhotoDNA Information Columns (page 280)
You can export the information about those files to Project VIC so that they can be analyzed and categorized.
For general information about creating and using bookmarks, see Bookmarking Evidence (page 388).
2. Right-click on a selected file in the File List view and click the Project VIC icon .
3. Enter in the bookmark information.
See Project VIC Bookmarks Dialog Options on page 282.
4. Click OK.
Field Description
Bookmark Name The name you give the bookmark.
Project VIC Case Number The name you give the bookmark.
Default Project VIC Category You can select a default category for all of the items in the bookmark.
Also, lower in the dialog, you can assign a category for an individual file.
This will override the default for that file.
Project VIC Category (Optional) You can highlight and assign a category for an individual file.
This will override the default for the bookmark if you set one.
Tags (Optional) You can highlight and tag an individual file if they match a
criteria. The available tags are:
Infant/Toddler
S&M/Violent
This tag is included in the exported JSON file.
Field Description
File Comments (Optional) You can enter comments about a file.
Select Bookmark Parent Select the parent bookmark under which you would like to save the
bookmark.
There are two default bookmark parents:
A Shared tree that is available to all investigators
A bookmark tree specific to the logged-in-user
Administrators and Case Administrators can see and use all bookmarks
in a case.
If the bookmark is related to an older bookmark it can be added under
the older bookmark, with the older bookmark being the parent, or it can
be saved as a peer.
Reviewing Cases
This part contains information about reviewing cases and contains the following chapters:
Using the FTK Examiner Interface (page 285)
Exploring Evidence (page 297)
Examining Evidence in the Overview Tab (page 315)
Examining Email (page 320)
Examining Graphics (page 324)
Examining Videos (page 333)
Examining Miscellaneous Evidence (page 339)
Bookmarking Evidence (page 388)
Searching Evidence with Live Search (page 400)
Searching Evidence with Index Search (page 411)
Using the Known File Filter (KFF) (page 259)
Using Project VIC (page 275)
Viewing System Information (page 427)
Using Visualization (page 443)
Customizing the Examiner Interface (page 489)
Working with Evidence Reports (page 499)
For example, you can use the following tabs to perform a specific task:
The Overview tab lets you narrow your search to look through specific document types, or to look for
items by status or file extension.
The Graphics tab lets you quickly scan through thumbnails of the graphics in the case.
The Email tab lets you view emails and attachments.
As you find items of interest, you can do the following
Note: When entering the Examiner and clicking on a tab for the first time, if that tab uses the Thumbnail pane
memory is allocated for displaying graphics and video thumbnails if they are present in the case.
Option Description
Explore Tab See Explorer Tree Pane (page 297)
Using the FTK Examiner Interface Creating Screen Captures in the Examiner | 286
Menus of the Examiner
When a case is created and assigned a user, the Examiner window opens with the following menus:
Examiner Menus
Menu Description
File See Options of the Examiner File Menu (page 288)
Option Description
Export Exports selected files and associated evidence to a designated folder.
Export to Image Exports one or more files as an AD1 image to a storage destination.
When exporting to AD1 the image's file path is added under a root directory. This
speeds the process of gathering data for the AD1, and for shortening the path to
AD1 content.
Export File List Info Exports selected file information to files formatted as the Column List in CSV, TSV,
and TXT formats.
Export Word List Exports the words from the cases index as a text file. You can use this word list to
create a dictionary in the AccessData PRTK and DNA products.
Export System Exports system information when populated in the System Information tab. This
Information option is grayed out unless System Information has been added to the case.
Report Opens the Report Options dialog for creating a case report.
Timeline Report Opens the Timeline Report dialog for creating a Timeline bookmark report.
Job Summary Report Opens an Evidence History.log report showing a job summary for all processing
done within the case.
Close Closes the Examiner and returns to the Case Manager window.
Option Description
Copy Special Duplicates information about the object copied as well as the object itself, and
places the copy in the clipboard.
See Copying Information from the Examiner (page 186)
Option Description
Refresh Reloads the current view with the latest information.
Filter Bar Inserts the filter toolbar into the current tab. These features are also available from
the Filter menu.
Thumbnail Size Selects the size of the thumbnails displayed from the Graphics tab. Select from the
following:
Large-default
Medium
Small
Tiny
Tab Layout Manages tab settings. The user can lock an existing setting, add and remove
settings, and save settings one tab at a time or all at once. The user can also
restore previous settings or reset them to the default settings.
FIle List Columns Specifies how to treat the current File List. Options are:
Save As Default
Save All as Default
Reset to Factory Default
Reset All To Factory Default
File Content Tabs Specifies the behavior of file content when a different tab is selected. Options are:
Switching Auto
Manual
Index Searches Displays the Index Search Results pane in the upper-left pane.
Live Searches Displays the Live Search Results pane in the upper-left pane.
Option Description
Bookmark Information Adds the Bookmark Information pane into the current tab.
File List Adds the File List pane into the current tab.
File Content Adds the File Content pane into the current tab.
Email Attachments Displays the attachments to email objects found in the case. Available only in the
Email and Overview tabs.
Properties Inserts the Object Properties pane into the current tab view.
Hex Value Interpreter Displays a pane that provides an interpretation of Hex values selected from the
Hex View pane.
Thumbnails Displays a pane containing thumbnails of all graphics found in the case.
Video View Displays a pane containing thumbnails of all videos found in the case.
Progress Window Opens the Progress dialog, from which you can monitor tasks and/or cancel them.
Option Description
Add/Remove Opens the Manage Evidence dialog, used to add and remove evidence. From
Manage Evidence, choose from the following:
Time Zone — Choose Time Zone for evidence item
Additional Analysis Opens the Additional Analysis dialog with many of the same processing options
available when the evidence was added. Allows the user to reprocess using
available options not selected previously.
See Using Additional Analysis (page 128).
Process Manually Initiates the processing of items that have been manually carved, using the
Carved Items selected options.
Manage Evidence Opens the dialog where you can create and manage Evidence Groups.
Groups
Import Custom When a Custom Column Settings file has been created, import it into your case
Column File using this tool.
Delete Custom If you have imported or created a Custom Column Settings file, use this tool to
Column Data delete the associated column and its data from the view.
Merge Case Index The processing engine does this automatically and no longer needs user
interaction to select the merge.
Option Description
New Opens the Filter Definition dialog to define a temporary filter.
Duplicate Duplicates a selected filter. A duplicated filter serves as a starting point for
customizing a new filter.
On Applies the selected filter globally in the application. The File List changes color to
indicate that the filter is applied.
Import Opens the Windows file manager allowing the user to import a pre-existing filter.
Export Opens the Windows File Manager allowing the user to save a filter.
The name of the filter cannot have any special or invalid characters or the export
will not work.
Tab Filter Allows the selection of a filter to apply in the current tab.
Option Description
Decrypt Files Decrypts EFS and Office files using passwords you enter.
Dell Encryption Opens the Dell Encryption Decryption dialog where you enter the decryption
Decryption information.
See Decrypting Dell Encryption Files (Dell Data Protection | Encryption Server)
(page 178)
Send to DNA/PRTK for Uses the integrated DNA/PRTK capabilities to decrypt several types of encrypted
password recovery files.
See Recovering Passwords using the PRTK/DNA Integrated Tool on page 172.
Verify Image Integrity Generates hash values of the disk image file for comparison.
Restore Image to Disk Restores a physical image to a disk. If the original drive was on a bootable
partition, the restored image may also be bootable. This feature is disabled for
Case Reviewers.
Mount Image to Drive Allows the mounting of a physical or logical image for read-only viewing. Logically
mounting images allows them to be viewed as a drive-letter in Windows Explorer.
Mounted logical drives now show the user the correct file, even when a deleted file
with the same name exists in the same directory.
Disk Viewer Opens a hex viewer that allows you to see and search contents of evidence items.
Search Text for a term using Match Case, ANSI, Unicode, Regular Expression or
Search Up instead of down; Search Hex using Search Up. Specify a logical sector
or a cluster.
Other Applications Opens other AccessData tools to complement the investigational analysis.
Recover Processing Restarts processing so jobs that were interrupted can be completed.
Jobs
Visualization Lets you launch the Visualization add on module for the data that you currently
have displayed in the File List Pane. Visualization is only available from the
Explore, Overview, and Email Tabs.
Execute SQL Executes a user-defined SQL script from within the interface.
Run Python Script Allows you to run any Python script on selected evidence files within a case.
Indexed Serch Term See Adjusting the Weighting Criteria for an Index Search Term on page 414.
Weights
Option Description
User Guide To access the latest documentation, download the zip file from www.accessdata.com/
productdocs/ftk/ftk.zip.
Case Folder Opens the folder that contains the case data.
About Provides version and build information, copyright and trademark information, and other
copyright and trade acknowledgements.
The Explore tab displays all the contents of the case evidence files and drives as the original user would have
seen them.
Black = Default
Grey = Deleted
Pink = Bookmarked or added to a task.
See Bookmarking Evidence on page 388. See on page 94.
Red = Encrypted
See Identifying the Encrypted Files in a Case on page 169.
The File List view reflects the files available for the current tabbed view and the properties that meet selected
Column templates, limited by any filters that may be applied. In this pane, you can choose which columns to
display, as well as the order of those columns, create Bookmarks, create Labels, Copy or Export File Lists. The
File List pane is included in all default tab views.
Alt Color The color of the even lines <BgAltColor>248, 248, 248</BgAltColor>
in a default state
Alt Color Filtered The color of a filtered item <BgAltColor_Filtered>248, 248, 200</
in an even numbered line BgAltColor_Filtered>
Color Quick Pick The color applied to a quick <BgColor_QuickPick>248, 255, 248</
pick item in an odd BgColor_QuickPick>
numbered line
Alt Color Quick The color applied to a quick <BgAltColor_QuickPick>228, 244, 228</
Pick pick item in an even BgAltColor_QuickPick>
numbered line
In order to change the colors, you must add the Entry value to the Preferences.xml file. The colors are based on
RGB values, with the three numbers representing the Red, Green, Blue values in that order.
Note: If you need help knowing what values equal which colors, you can search for RGB values online to find
the information you need. There are over 16 million color combinations, so they are not listed here.
The Entries listed in the table above, once added to the Preferences.xml file, will allow you to customize the
colors in the File List.
You can hover over a column’s short name to display a tooltip that shows a more descriptive column long name.
You can sort the list using any column. Click on a column heading in the File List view to sort on that column.
Hold down the Shift key while clicking a different column header to make the newly selected column the primary-
sorted column, while the previous primary-sorted column becomes the secondary-sorted column. There are only
two levels of column sorting, primary and secondary.
To undo a secondary sort, click on a different column header to make it the primary-sorted column.
Column widths in most view panes can be adjusted by hovering the cursor over the column heading borders,
and dragging the column borders wider or narrower.
A data box displays in the lower-right of the File List View that indicates the total logical size of the currently listed
files.
Component Description
Checks all of the files in the current list.
Apply Label drop-down allows you to select from the list of defined labels and apply
it to a single selected file or a group of files as selected in the Apply Label To drop-
down.
Export File List lets you save selected files to another folder.
Component Description
Column Templates
Sets the columns to a specific selection from the list of defined column sets.
See Managing Columns on page 494.
Some Default Column Templates are:
Cerberus Results
See Cerberus Columns on page 221.
eDiscovery
eDiscovery Mail
Email
Explicit Image Detection (EID)
File Listing
GeoEXIF, GeoIP, Geolocation - Shows Geolocation-related columns
See Using Geolocation Columns in the Item List on page 485.
Internet History
See Examining Internet Artifact Data on page 352.
Normal (default)
Reports: File Path Section
Reports: Standard
Leave query running when switching tabs (this may affect the performance of other
tabs).
Cancel retrieving row data. This is not a pause button. To retrieve row data after
clicking Cancel, you must begin again. There is no way to pause and restart the
retrieval of row data.
Checked files are persistent and remain checked until the user unchecks them.
Checked files are per-user; another user or an Administrator will not see your checked files as
checked when viewing the same case.
Option Description
Open Opens the selected file.
Launch in Content Launches the file in the Content Viewer, formerly known as Detached Viewer.
Viewer
Open With Opens the file. Choose either Internet Explorer or an External Program.
Create Bookmark Opens the Create New Bookmark dialog for creating a new bookmark.
See Bookmarking Evidence on page 388.
Add to Bookmark Opens the Add to Bookmark dialog for adding selected files to an existing
bookmark.
See Bookmarking Evidence on page 388.
Remove from Removes a file from a bookmark. From the Bookmarks tab, open the bookmark
Bookmark containing the file to be removed, then select the file. Right-click and select
Remove from Bookmark.
See Bookmarking Evidence on page 388.
Labels Opens the Labels dialog. View assigned Labels, create or delete a Label, Apply a
Labels to file, or Manage Local or Manage Global Labels.
See Working with Labels on page 161.
Review Labels Opens the Label Information dialog to display all labels assigned to the selected
file or files.
See Working with Labels on page 161.
Mount Image to Drive Allows you to mount an image logically to see it in Windows Explorer, or physically
to view.
See Mounting an Image to a Drive on page 104.
Add Decrypted File Right-click and select Add Decrypted File. Opens the Add Decrypted File dialog.
Browse to and select the file to add to the case, click Add.
View File Sectors Opens a hex view of the selected file. Type in the file sector to view and click Go
To.
Find on Disk Opens the Disk Viewer and shows where the file is found in the disk/file structure.
Note: Find on disk feature won’t find anything under 512 B physical size. Files
smaller than 1500 bytes may reside in the MFT and do not have a start cluster.
Find on disk depends on that to work.
Option Description
Find Similar Files Opens the Search for Similar Files dialog. The selected file’s hash value is
displayed. Click From File to see the filename the hash is from. The Evidence
Items to Search box shows all evidence items in the case. Mark which ones to
include in the search. Select the Minimum Match Similarity you prefer, and click
Search or Cancel.
Open in Registry Opens a registry file in AccessData’s Registry Viewer. Choose SAM, SOFTWARE,
Viewer SYSTEM, SECURITY, or NTUSER.dat.
Export Opens the Export dialog with all options for file export, and a destination path
selection.
See Exporting Data from the Examiner on page 186.
Acquire to Disk Image Allows you to create a new disk image (001, AFF, E01, or S01) from a disk image in
the case.
Export File List Info Opens the Save As dialog. Choose TXT, TSV, or CSV. The default name is
FileList.TXT.
Check/Uncheck All Checks or unchecks all files that are currently highlighted in the list. (Pressing the
Highlighted space bar does the same thing.)
Change “Flag as Change Flag Status of all files as either Ignorable or Not Ignorable according to
Ignorable” Status Selection Options.
Change “Flag as Change Flag Status of all files as either Privileged or Not Privileged according to
Privileged” Status Selection Options.
View This Item In a Changes the File List view from the current tab to that of the selected tab from the
Different List pop-out.
You can use CTRL+F to search within the File Content pane.
The File Content pane tab has a Default tab and a Web tab for each of the following tabbed views:
Hex Tab
Text Tab
Filtered Tab
Natural Tab
Properties Tab
Hex Interpreter Tab
Note: The Find on Disk feature (in File List view, right-click an item) won’t find anything under 512 Bytes
physical size. Also, files smaller than 1500 bytes may reside in the MFT and thus do not have a start
cluster. Find on Disk depends on the start cluster information to work.
The File Content pane title changes depending on which tab is selected at the bottom of the window. The
available tabs are File Content, Properties, and Hex Interpreter. These three tabs default to the bottom left of the
File Content pane in any program tab where it is used.
The three tabs can be re-ordered by clicking on a tab and dragging-and-dropping it to the position in the linear
list where you want it. Click any of these tabs to switch between them. The information displayed applies to the
currently selected file in the Viewer pane.
Note: When highlighting terms in Natural View, each term throughout the document is highlighted, one term at a
time. When it reaches the limit of highlighting in that window, regardless of which term it is on (first,
second, third, etc.) it stops highlighting. There is no workaround.
Note: Viewing large items in their native applications may be faster than waiting for them to be rendered in the
Examiner viewer.
The Natural View top tab is the only one of the four that has additional tabs that provide for the viewing of Text,
Media, and Web files, in their native application environment.
Component Description
Enable or Disable CSS Formatting. CSS formatting displays any fonts, colors, and layout
from cascading style sheets. HTML formatting not part of a cascading style sheet might
remain. Enabled feature is indicated by a blue background; disabled feature is indicated by a
gray background.
Enable or Disable External Hyperlinks. Enabled hyperlinks in the file will link to active internet
pages. This may not accurately provide data that was available using that link at the time the
image was made, or the evidence was acquired. Enabled feature is indicated by a blue
background; disabled feature is indicated by a gray background.
Option Description
Name The filename of the selected file.
File Type The type of a file, such as an HTML file or a Microsoft Word 98 document. The file header
is used to identify each item’s file type.
Path The path from the evidence source down to the selected file.
General:
Actual File: True if an actual file. False if derived from an actual file.
From Recycle Bin: True if the file was found in the Recycle Bin. False otherwise.
Start Cluster: Start cluster of the file on the disk.
Compressed: True if compressed. False otherwise.
Original Name: Path and filename of the original file.
Start Sector: Start sector of the file on the disk.
File has been examined for slack: True if the file has been examined for slack. False
otherwise.
DOS Attributes:
Hidden: True if Hidden attribute was set on the file. False otherwise.
System: True if this is a DOS system file. False otherwise.
Read Only: True or False value.
Archive: True if Read Only attribute was set on the file. False otherwise.
8.3 Name: Name of the file in the DOS 8.3 naming convention, such as [filename.ext].
Option Description
Verification Hashes: True if verification hashes exist. False otherwise.
NTFS Information:
NTFS Record Number: The number of the file in the NTFS MFT record.
Record Date: UTC time and date record was last modified.
Resident: True if the item was Resident, meaning it was stored in the MFT and the
entire file fit in the available space. False otherwise. (If false, the file would be stored
FAT fashion, and its record would be in the $I30 file in the folder where it was saved.)
Offline: True or False value.
Sparse: True or False value.
Temporary: True if the item was a temporary file. False otherwise.
Owner SID: The Windows-assigned security identifier of the owner of the object.
Owner Name: Name of the owner of that file on the source system.
Group SID: The Windows-assigned security identifier of the group that the owner of
the object belongs to.
Group Name: The name of the group the owner of the file belongs to.
NTFS ACL attributes. This is the same functionality that is currently found in Imager.
When there are multiple sets of ACL attributes present, they are now distinguished by
number.
File Content The content information and verification information of the file:
Info MD5 Hash: The MD5 (16 bytes) hash of the file (default).
SHA-1 Hash: The SHA-1 (20 bytes) hash of the file (default).
SHA-256 Hash: the SHA-256 (32 bytes) hash of the file (default).
The information displayed in the Properties tab is file-type-dependent, so the selected file determines what
displays.
Copy raw data Go to Offset takes you to a desired offset. You can
select the Hex data to save as a separate file.
Save selection Save selection as carved file lets you manually carve
data from files.
The Hex Value Interpreter reads date/time stamp values, including AOL date/time, GPS date/time, Mac date/
time, BCD, BCD Hex, and BitDate.
The Hex tab displays file contents in hexadecimal format. Use this view together with the Hex Interpreter pane.
The Hex View tab is also found in the File Content View. This feature helps if you are familiar with the internal
code structure of different file types, and know where to look for specific data patterns or for time and date
information.
In a big-endian system, the most significant bit value in the sequence is stored first (at the lowest storage
address). In a little-endian system, the least significant value in the sequence is stored first. These rules apply
when reading from left to right, as we do in the English language.
As a rule, Intel based computers store data in a little-endian fashion, where RISC-based systems such as
Macintosh, store data in a big-endian fashion. This would be fine, except that a) AccessData’s products image
and process data from both types of machines, and b) there are many applications that were developed on one
type of system, and are now “ported” to the other system type. You can’t necessarily apply one rule and
automatically know which it is.
Little-endian is used as the default setting. If you view a data selection in the Hex Interpreter and it does not
seem correct, you can try choosing the big-endian setting to see if the data displayed makes more sense.
The File Content pane currently provides many code pages from which to choose. When the desired code page
is selected, the Text tab will present the view of the selected file in text using the selected code page language.
Component Description
Turns the filter on or off. Filtered data is shown in a colored pane to indicate that it is
filtered. In addition, if no filter is applied, the icon is grayed out. When active, or ON,
the Filter button has a light blue background. When inactive, or OFF, the
background is gray.
Opens the drop-down menu listing defined filters. Applies the selected filter.
Turns the QuickPicks filter on or off. The QuickPicks filter is used in the Explore tab
to populate the file list with only items the investigator wishes to analyze. When
active, or ON, the QuickPicks button is light blue. When inactive, or OFF, the
background is gray.
Locks or unlocks the movable panes in the application. When the lock is applied,
the box turns grey, and the panes are locked. When unlocked, the box has a light
blue background and blue outline, indicating the panes can be moved.
The QuickPicks filter simultaneously displays open and unopened descendent containers of all selected tree
branches in the File List at once. The colors of the compound icons indicate whether descendants are selected.
The icons are a combination of an arrow, representing the current tree level, and a folder, representing any
descendants.
QuickPicks Icons
Icon Description
A dark green arrow behind a bright green folder means all descendants are selected.
A dark green arrow behind a yellow folder means that although the folder itself is not
selected, some of its descendents are selected.
A white arrow with no folder means neither that folder, nor any of its descendants is
selected.
A white arrow behind a bright green folder means that all descendants are selected,
but the folder is not.
The File List view reflects the current QuickPicks selections. When QuickPicks is active, or on, if no folders are
selected, the File List view shows the currently selected item in the Tree view, including first-level child objects.
When any item is selected, that selection is reflected in the File List view. When QuickPicks is not active, or off,
the File List view displays only items at the selected level in the tree view, with no children.
Examining Evidence in the Overview Tab Using the Overview Tab | 315
File Extension Container
The File Extension container itemizes files by their extensions, such as TXT, MAPIMAIL, and DOC and lists
them in a tree view.
The File Extension Container content numbers do not synchronize or match up with the overall number of case
items. This is because case items, such as file folders, do not have extensions and, therefore, are not listed in
the File Extension Container.
File Categories
Category Description
Archives Archive files include email archive files, ZIP, STUFFIT, THUMBS.DB thumbnail
graphics, and other archive formats.
Databases Database files such as those from MS Access, Lotus Notes NSF, and other database
programs.
Documents Includes recognized word processing, HTML, WML, XML, TXT, or other document-type
files.
Email Includes email messages from Outlook, Outlook Express, AOL, Endoscope, Yahoo,
Rethink, Udder, Hotmail, Lotus Notes, and MSN.
Executables Includes Win32 executable files and DLLs, OS/2, Windows VxD, Windows NT, Java
Script, and other executable formats.
Folders Folders or directories that are located in the evidence.
Graphics Lists files having the standard recognized graphic formats such as TIF, GIF, JPEG, and
BMP, as found in the evidence.
Internet/Chat Files Lists Microsoft Internet Explorer cache and history indexes.
Mobile Phone Data Lists data acquired from recognized mobile phone devices.
Multimedia Lists AIF, WAV, ASF, and other audio and video files as found in the evidence.
OS/File System Files Lists partitions, file systems, registry files, and so forth.
Other Encryption Files Lists found encrypted files, as well as files needed for decryption such as EFS search
strings, Public Keys, Private Keys, and other RSA Keys.
For more information on Decrypting Encrypted Files, See Decrypting Files (page 165).
Examining Evidence in the Overview Tab Using the Overview Tab | 316
File Categories (Continued)
Category Description
Other Known Types A miscellaneous category that includes audio files, help files, dictionaries, clipboard
files, link files, and alternate data stream files such as those found in Word DOC files,
etc.
Note: Other Known Types includes NSF Misc. Note (Calendar, $profile data, and other
miscellaneous files that in the past were shown as HTML), and NSF Stub Note (a link
to the same email or calendar item in another view) sub categories.
Presentations Lists multimedia file types such as MS PowerPoint or Corel Presentation files.
Slack/Free Space Lists files, or fragments of files that are no longer seen by the file system, but that have
not been completely overwritten.
Spreadsheets Lists spreadsheets from Lotus, Microsoft Excel, Quattro Pro, and others, as found in the
evidence.
Unknown Types Lists files whose types are not identified.
User Types Lists user-defined file types such as those defined in a Custom File Identification File.
The statistics for each category are automatically listed. Click the category button to see the file list associated
with it. The following table displays the file status categories.
Examining Evidence in the Overview Tab Using the Overview Tab | 317
File Status Categories (Continued)
Examining Evidence in the Overview Tab Using the Overview Tab | 318
Use the data values in the following table to select which category you would like to specify.
Examining Evidence in the Overview Tab Using the Overview Tab | 319
Chapter 22
Examining Email
Exchange and PST Emails can be exported to MSG format. In addition, MSG files resulting from an export of
internet email look the way they should.
The Email Tab > Email Items tree view contains two new groups: Email By Date (organized by Year, then by
Month, then by Date, for both Submitted and Delivered); and Email Addresses (organized by Senders and
Recipients, and subcategorized by Email Domain, Display Name, and Email Addresses).
You can also export Tasks, Contacts, Appointments, Sticky Notes, and Journal Entries to MSG files.
Important: If the Mozilla Firefox directory is added as evidence while in use, history, downloads, etc. are
identified as zero-length files.
When an email-related item is selected in the File List, right-click and choose View this item in a different list >
Email to see the file in Email context.
Note: Email data parsed into the new nodes in the Email tree view will only be populated in new cases.
Converted cases will not have this data. To make this data available in older cases, re-process the case in
the new version.
Note: This software does not parse anything other than Email and Contacts for Windows 10 Email at this time.
There are two ways to view Windows 10 Email and Contacts. If you choose to see the full file structure of the
store.vol file, you will need to use the Explore Tab. If you only want to view emails, the Email Tab contains all
emails in the case, including Windows 10 Email.
Note: If you’d like to see an email in the Email Tab instead of the Explore Tab, right-click on the email and select
View This Item In a Different List > Email.
Note: If the user has not downloaded the attachment, the content will not be available.
Each graphic file is shown in a thumbnail view. A graphic displays in the Thumbnail view when its thumbnail is
checked in the File Contents pane.
In the thumbnail viewer, if a graphic is not fully loaded, the following icon is displayed:
In the thumbnail viewer, if a graphic cannot be displayed, the following icon is displayed:
Beneath each thumbnail image is a check box. When creating a report, choose to include all of the graphics in
the case or only those graphics that are checked.
The Evidence Items pane shows the Overview tree by default. Use the View menu to change what displays
here.
In a new installation, the Graphics tab filter is set to the Graphic Files w/o Dup+Ignore filter by default.
This eliminates the need to sort through a high volume of unrelated images. File types not shown when this filter
is applied include duplicate items, flagged ignore, and KFF ignorable.
In an upgrade environment, the current tab filter will be the filter that was previously used. You can apply the
Graphics Files w/o Dup+Ignore filter as the default Graphics Tab Filter.
You can also add standard filters (such as a Not Bookmarked filter) to pare down the images in the panel to view
only things you haven’t seen or that haven’t been processed already. This can be ideal for investigating large
batches of images. See Using Compound Filters (page 149) for instructions on how to create and apply multiple
filters simultaneously.
See Filtering Data to Locate Evidence (page 141) for more information on using filters.
To change the Thumbnail Size in the View menu, click View > Thumbnail Size and select a size.
To change the Thumbnail Size with the Thumbnail Size Selector, click and select a size.
Note: The thumbnail pane needs to be sized at least one thumbnail in height for the scrolling feature to work
properly.
Name
Logical Size
Physical Size
Created
Ignore Highlighted
You can remove unrelated images from the Thumbnails Pane using the Ignore Highlighted button.
Selecting one or more files in the Thumbnails Pane and clicking the Ignore Highlighted button will give the file(s)
a Flagged Ignore status. If the default Graphic Files w/o Dup+Ignore filter is applied, the selected files will no
longer be visible in the Graphics tab. This allows graphics files that are not applicable to the case to be removed
from the Thumbnail Pane.
See About the Graphics Tab Filter on page 326.
To review the files that have been flagged with an ignore marker, navigate to Overview > File Status > Flagged
Ignore.
Extra Large
Large
Medium
Small
See Using Explicit Image Detection (page 83) for more information on setting the EID pre-processing options
prior to case creation.
When the pre-processing options are set and applied to evidence as it is processed, in the case you can easily
identify files that fit the criteria you set.
Note: You can also use the Project VIC feature to identify known explicit images. See Using Project VIC on
page 275.
EID Scoring
Each folder is given a score that indicates the percentage of files within the folder that have an EID score above
50. For example, if the folder contains 8 files and three of them score over 50, the folder score will be 38 (3 is
37.5% of 8). Now, a folder score of 38 does not mean there is no objectionable material in that folder, it only
means that there is not a high concentration of objectionable material found there.
Explicit Image Detection filtering rates pictures according to the presence or absence of skin tones in graphic
files. In addition, it not only looks for flesh tone colors, but it has been trained on a library of approximately
30,000 pornographic images. It assesses actual visual content. This capability increases the speed with which
investigators can handle cases that involve pornography.
Successfully filtered pictures are issued a score between 0 and 100 (0 being complete absence of skin tones,
and 100 being heavy presence of skin tones). A score above 100 indicates that no detection could be made.
When you set filters for analyzing the scored data, you specify your own acceptance threshold limit for images
The Video tab lets you view detailed information about the video files in your cases.
You can generate thumbnails from video files and display them in the Video Thumbnail pane. This functionality
lets you quickly examine a portion of the contents within video files without having to watch each media file
individually.
The Video tab also includes an embedded media player that lets you view the contents of video files. When you
process the evidence in your case, you can choose to create a common video type for each of the various
videos in your case. These common video types are not the actual video files from the evidence, but a copied
conversion of the media that is generated by AccessData. These features let you view the contents of multiple
video types, in a common resolution, and sampling rate, from within the Examiner’s embedded media player.
When you process evidence, video thumbnails are created by default. To disable the creation of video
thumbnails, turn off the Create Thumbnails for Videos option in the Evidence Processing options.
Option Description
Percent This option generates thumbnails against videos based on the percentage of a videos
total content. For example if you set this value to 5, then at every 5% of the video a
thumbnail is generated.
Interval This option generates thumbnails against videos based on seconds. For example, if you
set this value to 5, then at every 5 seconds within a video, a thumbnail is generated.
5. Click OK.
4. Click the Pause button when you are ready to capture a video thumbnail.
Note: You can navigate through the video using the Rewind and Fast Forward
5. Click Add in the bottom right corner of the Video Thumbnails pane.
The application creates a video thumbnail of the paused frame and places that thumbnail in the Video
Thumbnail pane.
The contents in the Video tree displays the multimedia contents in your case and information about the content
that applies to the requirements of the Tab filter.
For example, in the graphic below, you can see that the case has 46 total multimedia files. 12 of those
multimedia files meet the requirements of the Tab filter and therefore have had video thumbnails generated for
them.
You can use the Video tree pane to navigate and drill down to specific multimedia containers and files. If you
select a file in the tree pane, The Video Thumbnails pane and the File List pane display the content that is
contained in your selection.
You can use the Video Thumbnail pane to rapidly scan through the visual contents in a video file, without having
to launch and watch the entire video.
In the Video Thumbnails pane, if a thumbnail could not be generated the following icon is displayed:
In the Video Thumbnails pane, beneath the first thumbnail image for a set of videos is a check box. You can
select this check box to check the video file in the Examiner.
For example, if you visually scan the contents of the video thumbnails pane and discover something you need to
investigate in the File Content viewer, rather than watching the entirety of the video, you can select the location
you want to start the video by selecting that thumbnail.
2. In the File Content Pane, In the Natural tab, click the Play icon.
The video begins to play from the location that you selected in the Video Thumbnails pane.
See The Thumbnails Size Setting (page 327) for information on how to do this.
See Moving the Thumbnails Pane (page 328) for information on how to do this.
Also, when looking at the file name at the bottom of the File List, if the file was generated by FTK, there is an >>
after the parent file name and before the generated file name.
For example, photo.jpg>>photo.exif.html, or mystuff.zip>>pass.doc
You can also use bookmarks to relate generated files with the actual source file in the evidence.
You can use bookmarks to quickly relate generated files with the actual source filed in the evidence. By selecting
the Actual Source File option, the source file will be listed and bookmarked as well. All parent items are
recursively related within the bookmark from the generated item to the actual source file and not just a parent
folder.
For example, during processing, a DOC file may be generated from a ZIP file. If you bookmark the DOC file and
select the Actual Source File option, the original ZIP file is included in the bookmark as well.
The related items are also shown in the bookmark section of reports.
You can also view information in the File List to identify processing-generated files.
View event data that is contained in Microsoft In the File List, you can see a list of all of the EVTX files. When
Windows XML event log (EVTX) files you view an EVTX log file, in the File Content pane, you can view
the information about all of the events that are contained in that
one file. There can be a lot of data contained in one file.
Expand EVTX log files into separate objects for When you expand EVTX log files, each event is extracted as its
every event record own record. As a result, in the File List, each event is shown as
its own item. Each item has a small amount of data in it but there
can be many individual event records. For example, you may
have 100 EVTX log files, and if you expand them, you can have
over 100,000 individual event records.
If you expand data, you will have files are are generated when the data was processed and was not part of the
original data. There are tools to help you identify generated data.
3. If your case has any EVTX files, they are displayed in the File List.
4. Click an EVTX file to view the data in the Natural tab.
Some log files may not contain any events and you will only see the heading EVTX Events.
Examining Miscellaneous Evidence Viewing Data in Windows XML Event Log (EVTX) Files | 342
Viewing IIS Log File Data
You can view data that is contained in IIS log files in HTML format in the Natural tab of the File Contents Pane.
You can also process IIS log files so that they are broken into individual records and interspersed with other
items to support timeline analysis. To process IIS log files, there is a new IIS LOG check box in Evidence
Processing Options > Expansion Options. This option is not enabled by default.
View the log file data In the File List, you can see a list of IIS log files. When you view
a log file, in the File Content pane, you can view the information
that are contained in that one file. There can be a lot of data
contained in one file.
Expand log file data out as individual records When you expand IIS log files, each record is extracted. As a
result, in the File List, each record is shown as its own item.
If you expand data, you will have files are are generated when the data was processed and was not part of the
original data. There are tools to help you identify generated data.
You can process Registry data files so that they are broken into individual records so they are interspersed with
other items to support timeline analysis. To process Registry data, there is a new Registry check box in Evidence
Processing Options > Expansion Options. This option is not enabled by default.
SAM:
SAM\Domains\Account\Users
NTUSER.DAT:
Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-
006097DEACF9}\Count
Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{5E6AB780-7743-11CF-A12B-
00AA004AE837}\Count
Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-
9926F41749EA}\Count
Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-
443BCFE33D9F}\Count
Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\FirstFolder
Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRULegacy
Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU
View the Registry data In the File List, you can view Registry files.
Expand Registry data out as individual records When you expand Registry data, each record is extracted. As a
result, in the File List, each record is shown as its own item.
If you expand data, you will have files are are generated when the data was processed and was not part of the
original data. There are tools to help you identify generated data.
The individual records from the CSV will be interspersed with other data, giving you the ability to perform more
advanced timeline analysis across a very broad set of data. In addition you can leverage the visualization engine
to perform more advanced timeline based visual analysis.
To process CSV files, there is a new Log2tCSV check box in Evidence Processing Options > Expansion
Options. This option is not enabled by default.
You can view CSV data in one of two ways:
View the original CSV In the File List, you can see a list CSV files. When you select a file, you can view the
files information that is contained in each file in the File Content pane .
Expand log file data When you expand CSV files, each record is extracted. As a result, in the File List, each
out as individual record is shown as its own item.
records
When you process evidence, you have the option of expanding CSV files. The options is
turned off by default.
If you expand data, you will have files are are generated when the data was processed and was not part of the
original data. There are tools to help you identify generated data.
See Identifying Processing-Generated Data on page 340.
Log2t Filename The full path of the filename that contained the entry. In most input modules this is the
name of the logfile or file being parsed, but in some cases it is a value extracted from it, in
the instance of $MFT this field is populated as the name of the file in question, not the
$MFT itself.
Log2t Format The name of the input module that was used to parse the file. If this is a log2timeline input
module that produced the output it should be of the format Log2t::input::NAME where
name is the name of the module. However other tools that produce l2t_csv output may put
their name here.
Log2t Host The hostname associated with the entry, if one is available.
Log2t Inode The inode number of the file being parsed, or in the case of $MFT parsing and possibly
some other input modules the inode number of each file inside the $MFT file.
Log2t MACB The MACB or legacy meaning of the fields, mostly for compatibility with the mactime
format.
Log2t Notes Some input modules insert additional information in the form of a note, which comes here.
This might be some hints on analysis, indications that might be useful, etc. This field might
also contain URL's that point to additional information, such as information about the
meaning of events inside the EventLog, etc.
Log2t Short The short description of the entry, usually contains less text than the full description field.
This is created to assist with tools that try to visualize the event. In those output the short
description is used as the default text, and further information or the full description can be
seen by either hovering over the text or clicking on further details about the event.
Log2t Source The short name for the source. This may be something like LOG, WEBHIST, REG, etc.
This field name should correspond to the type field in the TLN output format and describes
the nature of the log format on a high level (all log files are marked as LOG, all registry as
REG, etc.)
Log2t SourceType A more comprehensive description of the source. This field further describes the format,
such as "Syslog" instead of simply "LOG", "NTUSER.DAT Registry" instead of "REG", etc.
Log2t User The username associated with the entry, if one is available.
After processing is complete, you can add the Language column in the File List in the Examiner.
You can filter by the Language field within review and determine who needs to review which documents based
on the language contained within the document.
If there are multiple languages in a document, the first language will be identified.
This feature is enabled by selecting a new Language Identification processing option. When you enable
Language Identification, you have the following options:
Document Types to process - You can select to process the following file types:
Documents
Presentation
Spreadsheets
Note: The Language Identification processing option is disabled by default. If you enable it, the basic language
setting and all four document types are enabled by default.
Basic Languages
The system will perform language identification for the following languages:
Arabic
Chinese
English
French
German
Japanese
Korean
Portuguese
Russian
If the language to identify is one of the ten basic languages (except for English), select Basic when choosing
Language Identification. The Extended option also identifies the basic ten languages, but the processing time is
significantly greater.
Extended Languages
The system will perform language identification for 67 different languages. This is the slowest processing option.
The following languages can be identified:
At a basic level, when evidence is processed, internet artifact files are categorized and organized so that you
can easily see them. You can use either of the following to quickly see internet artifact files:
For example, using these views, you can quickly see the following files:
AOL:
Skype Data
Skype Files
Web-based email providers
Flashmail
Foxmail
Some internet artifact information is stored in SQLite tables. Most of these tables are viewable in the Natural
view.
Internet Explorer version 10 or later also use ESE databases to store data like the internet history, cookies,
cache, and so forth. (See About Expanding Data from Internet Explorer (IE) Version 10 or Later on page 355.)
Expand Google Chrome and Mozilla Firefox SQLite tables and IE 9 IE.DAT files to create individual
records.
This provides investigators the ability to bookmark specific records from within the tables. For example, if
you are looking for a specific Top Site record, you can more easily find and bookmark the record you
need.
Reconstruct web pages .
When viewing either Cache or History entries, if enough data is stored in the cache, you can see the
reconstructed web page that was cached when the user was browsing the respective web site.
The following table lists the expanded data that you can view:
If you expand internet artifact data, you will have files are are generated when the data was processed and was
not part of the original data. There are tools to help you identify generated data.
This data displays in the Overview tab under Internet/Chat Files or in the Internet/Chat tab.
Note: The IE WebCache contains many files and can take additional time to expand. Therefore, IE WebCache
is not selected by default.
Important: Expanding internet artifact data can add a significant amount of data to your evidence.
Clicking an individual file and viewing the contents in the Natural view.
For most items, you will see the data displayed in a table.
Viewing Reconstructed web pages
For history and cache entries, if enough data exists, the reconstructed web page appears. If enough
data is not available, informational data appears instead.
You can use the URL has HTML column to help you determine which files can be reconstructed.
Chrome:
Original Chrome artifact files are stored under the Chrome Browser Files folder
The expanded data is stored under the Chrome Browser Data folder.
Firefox:
Original Firefox artifact files are stored under the Firefox Files folder
The expanded data is stored under the Firefox Browser Data folder.
IE
Original IE artifact files are stored under the Internet Explorer Browser Files folder
The expanded data is stored under the Internet Explorer Browser Data folder.
Firefox:
Firefox Cache
Firefox SQLite
IE:
IE Cookie Text
IE Recovery
IE WebCache
Internet Explorer Files
Skype SQLite
See About Internet Artifact Processing Options on page 356.
5. Process your data.
Note: Chrome and Firefox SQLite files are also located in Internet/Chat Files.
Visit TImes
Typed Times
Last VIsit Time
This Visit Time
Duration
6. Click OK.
7. Select the template name you just configured and click Apply.
This applies the template to the File List.
8. Click Close.
9. Expand Browser > Browser Data for either Chrome or Firefox.
10. Click History.
In this example, you will see the history data in the columns for each record.
The mobile phone data that you can see comes from the following sources:
Call History
Cookie
Powering Event
SMS Messages
Web History
Mobile Phone Files
Cellebrite Files
For many of these files, you can view information from the files in the Natural view. For example, you can see
artifacts for the Call History or the contents of an SMS Message.
Some mobile phone information is stored in SQLite tables. Most of these tables are viewable in the Natural view.
Note: The files listed in the Mobile Phone Data section are specific to the particular mobile phone image you
have processed, and will be different for each mobile phone image.
There are many files found on mobile phones that are not specific to the Mobile Phone file category. This data
could include, but is not limited to, the following file categories:
Archives
Databases
Documents
Folders
Graphics
During processing, be sure to select the All Communications option. This will mark any mobile conversations by
default.
Important: If a non-text item from a chat was not included in the evidence file, the unavailable item will be listed
along with any relevant information. These could include items such as images, videos, voice
recordings, locations, stickers, emojis, or other attachments.
The viewer has been implemented for the following chat conversations:
Android SMS
Android MMS
Celebrite Chat
FB Messenger (Android)
Hangouts
Instagram (Android)
Kik (Android)
pidgin
Skype
Viber (Android)
WeChat (Android)
WeChat (iOS)
WhatsApp (Android)
WhatsApp (iOS)
XRY Chat
Use the Chat Conversations column setting in the File List to see the most relevant data for these files. The type
of chat will be listed in the Src (Source) column. It is possible to sort using this column to find data from a
particular source.
Note: It may be easier to use a different tab for certain types of mobile phone data. The HTML5 Tab is available
on all File Content panels.
Note: You will need the user’s password in order to open any encrypted backup files. We currently do not
decrypt iOS Backup files.
Note: There is a known issue within Facebook that deletes the last names of contacts and substitutes the first
name for the last name. This is a bug within Facebook, but the behavior will persist when exploring
evidence within the Examiner.
Note: The Attachments Column will contain links, not actual items. These links are external (stored in
the cloud) and will need the Facebook cookies to work, meaning you must be logged in under
the proper Facebook account to view them. The Pending Send Media Attachment Column will
also have a link to the image. But since this image was pending, it might be available some-
where in the evidence.
Contacts
User
First Name
Last Name
Last Update Time
Profile URLs
Message Threads
Timestamp
User
Message
Attachment URLs
Attachments (if the data is present in the image)
Phone
State
Country
Contact Items
Display Name
Username
Note
Country
City
Conversation Items
Create Date
Modify Date
Message Count
Participants
Message Items
Create Date
From
To
Message
Chat Text
Chat Attendees
Shared Location
Shared Location Date and Time
Money Sent
Files Transferred in Chat
Joined Groups and Attendees
Images Shared in Chat
Voice Recording Shared in Chat
Video Recording Shared in Chat
Video Call Duration
Voice Call Duration
Contact List
Contacts
Display Name
Phone Number
Status
Given Name
Family Name
Nickname
Company
Conversation
Message Count
Participants
Thread ID
Item Description
Sent Date
From
To
Message
Date Created
Date Modified
Message
From
To
Item Description
Date Created
Date Modified
Sent Date
Message
Attachment
Name
File Class
File Size
Contact Items
ID (CoolHTML only)
Full Name
First Name
Last name (attributes only)
Nickname
Group Items
ID (CoolHTML only)
Group Name (CoolHTML only)
Conversation Items
ID (CoolHTML only)
Conversation Name (CoolHTML only)
Create Date
Message Count
Modify Date
last message time
Participants
Message Items
Date Sent
Creation Date
Date Modified (attributes only)
From*
To*
Android Calendar
To view Android Calendar data:
1. When importing evidence, select the Android Calendar Database option in the Compound File
Expansion Options list.
2. In the Overview Tab, drill down to File Category > Mobile Phone > Mobile Phone Items and highlight
Mobile Phone Items.
3. Select an item in the File List and the File Content panel will display all associated information.
Android SMS/MMS
To view Android SMS/MMS data:
1. When importing evidence, select the Android SMS/MMS Database option in the Compound File
Expansion Options list.
2. In the Overview Tab, drill down to File Category > Mobile Phone > Mobile Phone Items and highlight
Mobile Phone Items.
3. Select an item in the File List and the File Content panel will display all associated information.
Note: Kik items (contacts, messages) will display a title beginning with Kik at the top of the table shown
in the File Content panel. They will also have a Path entry that begins with Kik.
Note: Google Hangout databases are named babel#, where # represents a number.
Note: Hangouts Items (contacts, messages) will display a title beginning with Hangouts at the top of the
table shown in the File Content panel. They will also have a Path entry that begins with Hangouts.
The following pre-defined Python scripts are included in the Python Script user interface:
EventBasedLogin
Exif2Kmz
SQLiteWizard
SQLite_Data_Carver
Each pre-defined script has a corresponding executable option, for those who prefer to run the EXE file.
Note: If you have already exported the desired files from FTK, you may select Option 2 and run the
script on the existing folder without exporting the files again. However, this option will not allow
you to automatically associate the evidence files with the bookmark created within the Python
wizard. Report result files can still be attached to a bookmark as supplementary files. It is
recommended that you not use Option 2 unless you do not plan to associate evidence files to the
bookmark.
4. Once the Export has completed, the Export Progress portion of the wizard will appear. This window will
show the Export Log, as well as the number of items exported and the error count. If any errors
occurred, a button will appear allowing the user to view the error log. There is also a View Export Folder
button in order to quickly access the exported file(s).
5. The Script Execution portion of the wizard will appear. Perform the following actions:
5a. Select any Python script file to run. There is a drop down option that will automatically populate
with the pre-defined scripts included with the product. The pre-defined scripts will offer both the
compiled executable version as well as the Python script source version (which requires the
Python environment).
5b. Add additional scripts using the Add New button. Once selected, this option will allow users to
browse to the file containing the new Python script and apply it. New scripts will be added
automatically to the drop down list for future use.
5c. To view the selected script in a text editor, click the View Script button.
5d. Enter the Input and Output folders. If the files have been exported using the wizard, the Input
folder will be entered automatically and cannot be changed.
5e. Additional parameters may be added into the appropriate box.
5f. Verify the content in the Final Script Command box. This shows the actual command that will be
executed.
5g. The Python environment verification will run automatically and the results will be displayed. If
desired, use the Re-verify environment button to be sure the right version of Python is installed on
the system.
5h. Click Next to execute the script.
Note: Python must be installed and working prior to beginning this step if a script file (.py) is selected.
Visit www.python.org to install the python environment. If the compiled executable (.exe) version
is selected, the Python environment is not required.
6. This will take you to the Script Progress portion of the wizard. A progress bar with a Pause/Cancel
button will appear while the script is running. Any warnings or errors will appear in the Warnings/Errors
box. If additional input is needed for the script, there is a text box. When prompted, enter the input and
click the Enter button to allow the script to complete. Once the script has completed, click Next.
7. In the Bookmark Creation portion of the wizard, it is possible to create a bookmark in order to include
the Python results in a report. If a bookmark is desired, complete the following steps:
7a. Select the Create Bookmark option.
7b. Enter the desired Name for the bookmark.
7c. Enter any necessary Comments related to the bookmark.
7d. Select a location for the bookmark by choosing a parent folder.
7e. Click the Attach button to attach the Python results as supplementary files in the bookmark.
7f. Select the Associate exported items to this bookmark option to include the original evidence files in
the bookmark. These files will auto-populate using the output file from the script execution step.
7g. If no bookmark is required, select the Do not create a Bookmark option.
7h. Click Next.
8. If the option to create a bookmark was selected, the Bookmark Progress portion of the wizard will
appear. The bookmark creation status will be displayed. When finished, click Next.
9. The Summary portion of the wizard will appear. This will include three sections of data: Export, Script
Execution, and Bookmark. Click Finish.
The bookmark will now be visible in the Bookmarks tab of the Examiner. The Python output files will be
listed in the Supplementary Files panel of the bookmark.
Advanced Query Searches are saved by Windows in the Admin > Searches folder. There are two default
searches found in Windows 10. These are the Indexed Locations and Everywhere files.
Belkasoft Parsers
The following file types will be parsed when applying the Belkasoft All-in-One option.
Note: Any items on this list that are able to be parsed by AccessData will be parsed using AccessData software
and not by Belkasoft.
Important: To use this feature, the SQLite Databases option must be selected in the Expand Compound Files
portion of the Evidence Processing Options when processing evidence.
2. Determine the number of columns and tables used within the files you would like to expand.
3. Create and save a query for each file to be expanded. For more information, see Creating Queries.
Note: Queries are specific to the file for which they are created. Be sure to name the query something
similar to the name of the original file to make it easy for users to know which query applies to
which file.
4. In FTK, return to the list of SQLite database files. Right click on the file you would like to expand and
select the Run SQLite Query option. The Run Query dialog will open. Enter a Report Name and select
a destination for the report.
5. Select the proper query from the list you have created and saved, and click OK.
6. Navigate to the destination folder and you will see three new files: XHTML, XML, and XSLT. Open the
XHTML file and you will see the contents of the selected SQLite database in table form.
Creating Queries
You can use the following information to create a basic query template. Be sure to replace the information within
brackets with data for the specific SQLite database files you would like to expand.
Note: Queries will only run on a single file and all fields are output as strings, not binary values.
To include information from two or more tables within the same file
Use the following query:
Select ‘[table 1]’ as [column(s)] from [table 1]
union
Select ‘[table 2]’ [column(s)] from [table 2]
About Bookmarks
A bookmark is a group of files that you want to reference in your case. These are user-created and the list is
stored for later reference, and for use in the report output. You can create as many bookmarks as needed in a
case. Bookmarks can be nested within other bookmarks for convenience and categorization purposes.
Bookmarks help organize the case evidence by grouping related or similar files. For example, you can create a
bookmark of graphics that contain similar or related graphic images. The Bookmarks tab lists all bookmarks that
have been created in the current case.
For example, you can create a bookmark of files that were downloaded from the internet. The report shows
when the files were downloaded (created) and the time interval between then and when they were last
accessed. You can also see if and when the files were modified.
You can also add manual timeline data. Manual timeline data lets you add items to your timeline that may not be
represented by the files in your case. For example, you may have phone logs that show when relevant phone
calls were placed. You can add those phone calls as manual timeline items so that they appear in your report
along with the file information in the case.
You can use the exported CSV file produce you own chronological timeline of the evidence in the case. This can
present a clearer view of how certain events happened which can help investigators communicate to the jurors
and judge on their case.
Creating a Bookmark
To create a bookmark
1. In the File List view , select the files that you want to add to the bookmark.
You can either highlight the files that you want to include, check the boxes of the files that you want to
include, or do nothing to include all files.
2. Right-click on a selected file in the File List view and click Create Bookmark.
3. Enter the information about the bookmark.
See Bookmarks Dialog Options on page 391.
4. Click OK.
Note: Applying filters to a group of listed files for bookmarking can speed the process. The All
Highlighted setting does not work in this instance. Enabling this feature would significantly slow
the response of the program. Instead, use either the Checked Files filter, or the All Files Listed
filter.
You can also use Empty Bookmarks to format your Bookmarks tree. This allows you to better organize your
bookmarks. For example, you may be investigating documents, video, graphics, and emails. You could create an
Empty Bookmark called Documents, under which you would place all of your document-related bookmarks.
Then, you would create an Empty Bookmark called Video, under which you would place all of your video-related
bookmarks. Continue creating Empty Bookmarks until you have a manageable Bookmark tree.
There are two ways to create Empty Bookmarks, creating the Empty Bookmark from the Bookmarks tab or in the
Create New Bookmark dialog.
Field Description
Bookmark Name The name of the bookmark.
Bookmark Comment Comments about the bookmark or its contents. Bookmark Comments
are created in an HTML editor. HTML allows you to format your
comments within the bookmark and for any subsequent reports.
See Bookmark Comments HTML Editor on page 393.
Files to Include Specify which files in the File List to include in this bookmark. You can
select one of the following:
All Highlighted - Includes only the highlighted items.
All Checked - Includes only the checked items.
All Listed - Includes all items in the File List.
None - Creates an Empty Bookmark.
Timeline Bookmark Select this option to make this a Timeline bookmark. If you select the
Timeline tab, this options is selected automatically.
A bookmark can either be a Timeline Bookmark or a regular bookmark,
but not both.
Select Existing Bookmark Select the parent bookmark under which you would like to save the
bookmark.
A default shared tree for bookmarks available to all investigators is
created, and a bookmark tree specific to the case owner is created.
If the bookmark is related to an older bookmark it can be added under
the older bookmark, with the older bookmark being the parent, or it can
be saved as a peer.
File Comments You can assign a comment to each file in the bookmark. Comments are
created in an HTML editor. HTML allows you to format your comments
within the bookmark and for any subsequent reports.
See Bookmark Comments HTML Editor on page 393.
Supplementary You can add external, supplementary files associated with the
Files bookmark. Options are:
Attach: Allows the investigator to add external supplementary files to
the bookmark. The attached files appear in the Supplementary Files
pane and are copied to the case folder.
Remove: Removes a selected supplementary file from the bookmark.
Field Description
Also include If applicable, you can include the following:
Parent index.dat
The option to include Parent index.dat is only available if you have
selected to bookmark an index entry, for example a cookie. This
option includes the entry’s parent index.DAT file in the bookmark.
Email Attachments - If one of the items selected is an email with
attachments, this will include all of the attachments that the email
has.
Parent Email - If one of the items selected is an email attachment
object, selecting this option will include the parent email.
Exclude Selected OCR Extractions
The Exclude Selected OCR Extractions check box appears only
when OCR- extracted files have been selected when creating a new
or adding to an existing bookmark. If, instead, you have selected
graphic files, and have not selected their OCR counterparts, the
check box for OCR Extractions of selected Graphics will be active
and available.
Actual Source File
This option lets you include the parent child of a processing-gener-
ated file.
See Relating Generated Files to Original Files on page 340.
Bookmark Check this item to have the highlighted text in a file automatically
Selection in File highlighted when the bookmark is re-opened. The highlighted text also
prints in the report.
The selected text that will be included displays in the text box below the
check box.
Create Date Select this option to record the date and time that the file was created.
Accessed Date Select this option to record the date and time that the file was last
accessed.
Modified Date Select this option to record the date and time that the file was last
modified.
Object Timeline You can assign a comment to each file timestamp in the bookmark.
Comments Comments are created in an HTML editor. HTML allows you to format
your comments within the bookmark and for any subsequent reports.
See Bookmark Comments HTML Editor on page 393.
The timeline comments are shown in the timeline report anchored to
each date, and each date being used will crate a new row in the text
report.
Manual In this section, you can add manual timeline entries that are not available
Timeline Data as items in the File List.
For example, you may have access to phone records and you can add
call histories as individual manual entries.
You enter the date and time of the items and then in the CSV, they are
displayed chronologically with the other items in your bookmark.
Note: Manual items are listed as Other in the report.
Field Description
Manual (Optional) Enter a comment or description to enter a Manual Timeline
Timeline item. Comments are created in an HTML editor. HTML allows you to
Comments format your comments within the bookmark and for any subsequent
reports.
See Bookmark Comments HTML Editor on page 393.
Remove Highlight a Manual Timeline entry and click Delete to remove it from the
list.
Manual The list Manual Timeline items that you have added.
Timeline Entries
Select Bookmark Parent Select the parent bookmark under which you would like to save the
bookmark.
There are two default bookmark parents:
A Shared tree that is available to all investigators
A bookmark tree specific to the logged-in-user
Administrators and Case Administrators can see and use all bookmarks
in a case.
If the bookmark is related to an older bookmark it can be added under
the older bookmark, with the older bookmark being the parent, or it can
be saved as a peer.
Important: You are required to use the HTML Editor when entering Bookmark Comments, with or without
formatting.
Select a bookmark in the Bookmarks tree view of the Bookmarks tab, or in the Bookmarks node in the tree of the
Overview tab to view information about a bookmark. The Overview tab view provides limited information about
the bookmarks in the case. The Bookmark tab provides all information about all bookmarks in the case. In the
Bookmark tab, the Bookmark Information pane displays the Bookmark Name, Creator Name, Bookmark
Comment, and Supplementary files. When selected, a list of files contained in the bookmark displays in the File
List. If you select a file from the File List, the comment and selection information pertaining to that file displays in
the Bookmark Information pane.
Bookmarked files display in a different color in the File List pane than non-bookmarked files for easy
identification.
Change any of the information displayed from this pane. Changes are automatically saved when you change the
bookmark selection.
In the File List, bookmarked items display in a different color for easy identification. You may need to refresh the
view to force a rewrite of the screen for the different color to display. Forcing a rewrite would impact the overall
performance of the program.
Note: If the file is a graphic file, you will not see, nor be able to make selections in the Text or the
Natural views.
3. Click Create Bookmark in the File List toolbar to open the Create New Bookmark dialog.
4. When creating your bookmark, check Bookmark Selection in File.
5. To save selected content, choose the view that shows what you want to save, then highlight the content
to save.
6. Right-click the selected content. Click Save As.
7. In the Save As dialog, provide a name for the selection and click Save.
The selection remains in the bookmark.
Note: You cannot add a selection of a video from the Bookmark’s Natural Viewer using the Add Selection
button. To add a video thumbnail to a bookmark, see Adding a Video Thumbnail to a New or Existing
Bookmark (page 396).
5. In the File Content > Natural Viewer, click Play ( ) and then Pause.
To create a bookmark for an email, follow the steps for creating a bookmark. Select the email to include in the
bookmark. Right-click and choose Create Bookmark. Note that by default, the Email Attachments box is
active, but unmarked. If only the parent email is needed, the Email Attachments box should remain unselected.
Complete the bookmark creation normally by naming the bookmark, selecting the bookmark parent, then
clicking OK.
If you need to bookmark only an attachment of the email, select and right-click on the attachment. Choose
Create Bookmark. For more information on creating bookmarks, see, Creating a Bookmark (page 389).
Notice that the Parent Email box is automatically active, allowing you to include the parent email if it is not part of
the selection you have already made. If the Parent Email box is checked, and there is more than one
attachment, the Email Attachments box becomes active as well, allowing you to also include all attachments to
the parent email. To add only the originally selected attachment to the bookmark, do not check the Parent Email
box.
One way to be sure to find the exact items you want is to highlight an interesting item in the File List view in one
tab, then right-click on it and select View This Item in a Different List. Click on Email and you are taken to the
Email tab with the selected email highlighted in the File List view, and displayed in the Natural tab in the File
Content pane. In the Email Attachments pane on the right that file is displayed, along with its role; whether it is a
parent email, part of the email thread, or an attachment.
If only an attachment of an email is needed to be added to the bookmark, select the attachment and follow the
instructions for adding to a bookmark.
Copying a Bookmark
To copy a bookmark
1. From either the Bookmark tab or the Overview tab, select the bookmark you want to copy.
2. Using the right mouse button, drag the bookmark to the desired location and release the mouse button.
Deleting a Bookmark
To delete a bookmark
1. In the Bookmark tab, expand the bookmark list and highlight the bookmark to be removed.
2. Do one of the following:
Press the Delete key.
Right-click on the bookmark to delete, and click Delete Bookmark.
Searching evidence for information pertaining to a case can be one of the most crucial steps in the examination.
An index search gives rapid results, and a live search includes options such as text searching and hexadecimal
searching. You can view search results from the File List and File Contents views of the Search tab.
The Live Search is a process involving a bit-by-bit comparison of the entire evidence set with the search term.
Note: If a case was originally processed using distributed processing, when a reviewer conducts a live search,
the system will first attempt to use the computer with the distributed processing engine, but if it is not
available, it will use the reviewer’s local computer to conduct the search.
A Live Text Search gives you options such as ANSI, Unicode with UTF-16 Little Endian, UTF-16 Big Endian, and
UTF-8. The latter two are always case-sensitive. You can also choose from a list of other Code Pages to apply to
the current search. In addition, you can select Case Sensitivity for any Live Text Search.
Note: When entering Chinese characters into search, you must have both ANSI and Unicode options selected.
The difference between a Pattern search and a Text search is that a text search searches for the exact typed
text, there are no operands so the results return exactly as typed. For example, a simple Pattern search allows
you to find all strings that match a certain pattern, such as for any 10-digit phone number (nnn-nnn-nnnn), or a
nine-digit social security number (nnn-nn-nnnn).
More complex Pattern searches (“regex”) require specific syntax. See Live Pattern Search (page 404).
Search terms can be entered then exported as XML files, then imported at any time, or with any case. Text files
can be imported and used in Live Search, however the Live Search Export feature supports only XML format.
Note: When importing TXT files that the search of those terms depend on the specific tab your in. (ie If I have a
few hex terms and import the TXT list into Live Search in the Patterns tab), the search is run as a pattern
search and not hex.
Note: In the progress window, you can Pause, Resume, and Cancel jobs, in addition to closing the
window. (Pause and Resume are the same button, but the label changes depending on
processing activity.)
Note: Mark the Remove when finished check box to take completed jobs off the list for housekeeping
purposes.
15. When processing is complete, return to the Live Search tab to review the results.
Right-click on a search result in the Live Search Results pane to display more options. The available
right-click options are as follows:
Option Description
Create Bookmark Opens the Create New Bookmark dialog.
Set Context Data Width Opens the Data Export Options window. Allows you to set a context width from 32
to 2000 characters within which it can find and display the search hit.
Export Search Term Select to export a search term list that can be imported into this or other cases.
Delete All Search Deletes all search results from the Live Search Results pane.
Results
Delete this Line Deletes only the highlighted search results line from the Live Search Results pane.
Searching before the case has finished processing will return incomplete results. Wait to search until the case
has finished processing and the entire body of data is available.
Note: Search terms for pre-processing options support only ASCII characters.
Click the Hex (Hexadecimal) tab to enter a term by typing it directly into the search field, by clicking the
Hexadecimal character buttons provided, or by copying hex content from the hex viewer of another file and
pasting it into the search box. Click Add to add the hex string to the search terms list.
The instructions for conducting a live search on the hex tab are similar to conducting searches on the Pattern
tab. Remember, when searching for hexadecimal values, a single alphabetic or numeric text character is
represented by hex characters in pairs.
To do a Hex search
1. In the Live Search tab, click the Hex tab.
2. Add Hex search strings using the keyboard or using the Alpha-numeric bar above the Search Terms
box.
3. Click Add to add the term to the Search Terms window.
4. Click Clear to remove all terms from the Search Terms window.
5. Repeat Steps 2, 3, and 4 as needed until you have your search list complete.
6. When you have added the search terms for this search, it is a good idea to export the search terms to a
file that can be imported later, saving the time of re-entering every item, and reduces the risk of errors.
This is particularly helpful for customized pattern searches.
7. In the Max Hits Per File field, enter the maximum number of search hits you want listed per file. The
default is 200. The range is 1 to 65,535. If you want to apply a filter, do so from the Filter drop-down list
in the bar below the Search Terms list. Applying a filter speeds up searching by eliminating items that do
not match the filter. The tab filter menu has no effect on filtering for searches.
8. Click Search.
9. Select the results to view from the Live Search Results pane. Click the plus icon (+) next to a search line
to expand the branch. Individual search results are listed in the Live Search Results pane, and the
corresponding files are listed in the File List. To view a specific item, select the file in the search results.
All search results are highlighted in the Hex View tab.
Telephone Numbers
Social Security Numbers
Computer IP Addresses
Credit Card Numbers
In the Live Search tab, click the Pattern tab. Each has different options.
The patterns consist of precise character strings formatted as mathematical-style statements that describe a
data pattern such as a credit card or social security number. Pattern searches allow the discovery of data items
that conform to the pattern described by the expression, rather than what a known and explicitly entered string
looks for.
These pattern searches are similar to arithmetic expressions that have operands, operators, sub-expressions,
and a value. For example, the following table identifies the mathematical components in the arithmetic
expression, 5/((1+2)*3).
Component Example
Operands 5, 1, 2, 3
Operators /, ( ), +, *
Sub-Expressions (1+2), ((1+2)*3)
Value Approximately 0.556
Like the arithmetic expression in this example, pattern searches have operands, operators, sub-expressions,
and a value.
Note: Unlike arithmetic expressions, which can only have numeric operands, operands in pattern searches can
be any characters that can be typed on a keyboard, such as alphabetic, numeric, and symbol characters.
Operators let regular expressions search patterns of data rather than for specific values. For example, the
operators in the following expression enable the search engine to find all Visa and MasterCard credit card
numbers in case evidence files:
\<((\d\d\d\d)[\– ]){3}\d\d\d\d\>
Example Operands
Operands \–, spacebar space
Operators \, \<, <, ( ), [ ], {3}, \>
Sub-expressions (\d\d\d\d), ((\d\d\d\d)[\– ])
Value Any sequence of sixteen decimal digits that is delimited by three hyphens and bound on
both sides by non-word characters
(xxxx–xxxx–xxxx–xxxx).
As the pattern search engine evaluates an expression in left-to-right order, the first operand it encounters is the
backslash less-than combination (\<). This combination is also known as the begin-a-word operator. This
operator tells the search engine that the first character in any search hit immediately follows a non-word
character such as white space or other word delimiter.
Note: A precise definition of non-word characters and constituent-word characters in regular expressions is
difficult to find. Consequently, experimentation may be the best way to determine if the forward slash less-
than (\<) and forward slash greater-than (\>) operators help find the data patterns relevant to a specific
searching task. The hyphen and the period are examples of valid delimiters or non-word characters.
The begin-a-word operator illustrates one of two uses of the backslash or escape character ( \ ), used for the
modification of operands and operators. On its own, the left angle bracket (<) would be evaluated as an operand,
requiring the search engine to look next for a left angle bracket character. However, when the escape character
immediately precedes the (<), the two characters are interpreted together as the begin-a-word operator by the
search engine. When an escape character precedes a hyphen (-) character, which is normally considered to be
an operator, the two characters (\-) require the search engine to look next for a hyphen character and not apply
the hyphen operator (the meaning of the hyphen operator is discussed below).
The parentheses operator ( ) groups together a sub-expression, that is, a sequence of characters that must be
treated as a group and not as individual operands.
The \d operator, which is another instance of an operand being modified by the escape character, is interpreted
by the search engine to mean that the next character in search hits found may be any decimal digit character
from 0-9.
The square brackets ([ ]) indicate that the next character in the sequence must be one of the characters listed
between the brackets or escaped characters. In the case of the credit card expression, the backslash-hyphen-
spacebar space ([\-spacebar space]) means that the four decimal digits must be followed by either a hyphen or a
spacebar space.
The {3} means that the preceding sub-expression must repeat three times, back to back. The number in the
curly brackets ({ }) can be any positive number.
Finally, the backslash greater-than combination (\>), also known as the end-a-word operator, means that the
preceding expression must be followed by a non-word character.
Sometimes there are ways to search for the same data using different expressions. It should be noted that there
is no one-to-one correspondence between the expression and the pattern it is supposed to find. Thus the
preceding credit card pattern search is not the only way to search for Visa or MasterCard credit card numbers.
In addition to the previous two examples, the credit card pattern search could be composed as follows:
\<\d\d\d\d(\–| )\d\d\d\d(\–| )\d\d\d\d(\–| )\d\d\d\d\>
This expression explicitly states each element of the data pattern, whereas the {3} operator in the first two
examples provides a type of mathematical shorthand for more succinct regular expressions.
This expression also indicates that if an area code is present, a number one (1) may or may not precede the
area code. This meaning is achieved through the sub-expression (\<1[\–\. ])?, which says that if there is a “1”
before the area code, it will follow a non-word character and be separated from the area code by a delimiter
(period, hyphen, or spacebar space).
The next sub-expression, (\(|\<)\d\d\d[\)\.\–/ ] ?, specifies how the area code must appear in any search
hits. The \(|\<) requires that the area code begin with a left parenthesis or other delimiter. The left parenthesis
is, of necessity, escaped. The initial delimiter is followed by three decimal digits, then another delimiter, a right
parenthesis, a period, a hyphen, a forward slash, or a spacebar space. Lastly, the question mark (?) means that
there may or may not be one spacebar space after the final delimiter.
The latter portion of this expression, \<\d\d\d[\.\– ]\d\d\d\d\>, requests a seven-digit phone number with a
delimiter (period, hyphen, or spacebar space) between the third and fourth decimal digit characters. Note that
typically, the period is an operator. It means that the next character in the pattern can be any valid character. To
specify an actual period (.), the character must be escaped ( \ .). The backslash period combination is included in
the expression to catch phone numbers delimited by a period character.
Note that the square brackets ([ ]) still behave as a set operator, meaning that the next character in the sequence
can be any one of the values specified in the square brackets ([ ]). Also note that the hyphen (-) is not escaped;
it is an operator that expresses ranges of characters.
Each field in an IP address can contain up to three characters. Reading the expression left to right, the first
character, if present, must be a 1 or a 2. The second character, if present, can be any value 0–9. The square
brackets ([ ]) indicate the possible range of characters and the question mark (?) indicates that the value is
optional; that is, it may or may not be present. The third character is required; therefore, there is no question
mark. However, the value can still be any number 0–9.
You can build your own regular expressions by experimenting with the default expressions. You can modify the
default expressions to fine-tune your data searches or to create your own expressions.
Visit the AccessData website, www.accessdata.com, to find a technical document on Regular Expressions.
Operator Description
. A period matches any character.
+ Matches the preceding sub-expression one or more times. For example, “ba+” will find all
instances of “ba,” “baa,” “baaa,” and so forth; but it will not find “b.”
* Matches the preceding sub-expression zero or more times. For example, “ba*” will find all
instances of “b,” “ba,” “baa,” “baaa,” and so forth.
[] Matches any single value within the square brackets. For example, “ab[xyz]” will find “abx,”
“aby,” and “abz.”
- A hyphen (-) specifies ranges of characters within the brackets. For example, “ab[0-3]” will
find “ab0,” “ab1,” “ab2,” and “ab3.” You can also specify case specific ranges such as [a-r],
or [B-M].
\< Matches the beginning of a word. In other words, the next character in any search hit must
immediately follow a non-word character.
\> Matches the end of a word. In other words, the last character in any search hit must be
immediately followed by a non-word character.
| Matches the sub-expression on either the left or the right. For example, A|u requires that the
next character in a search hit be “A” or “u.”
\B Matches anything not at a word boundary. For example, will find Bob in the name Bobby.
\r Matches a return.
\t Matches a tab.
Searching Evidence with Live Search Creating Custom Regular Expressions | 409
Common Regular Expression Operators (Continued)
Operator Description
[[:alpha:]] Matches any alpha character (short for the [a-z A-Z] operator).
[[:alnum:]] Matches any alpha numerical character (short for the [a-z A-Z 0-9] operator).
{n,m} Matches the preceding sub-expression at least n (number) times, but no more than m
(maximum) times.
Searching Evidence with Live Search Creating Custom Regular Expressions | 410
Chapter 28
Searching Evidence with Index Search
Searching evidence for information pertaining to a case can be one of the most crucial steps in the examination.
Index Search gives instantaneous results, and Live Search supports modes like text and hexadecimal. Search
results are viewed from the File List and File Contents views in the Search tab.
This chapter details the use of the Index Search feature. It includes the following topics
Conducting an Index Search (page 412)
Using Search Terms (page 413)
Expanding Search Terms (page 413)
Adjusting the Weighting Criteria for an Index Search Term (page 414)
Defining Search Criteria (page 415)
Exporting and Importing Index Search Terms (page 415)
Selecting Index Search Options (page 416)
Viewing Index Search Results (page 417)
Using dtSearch Regular Expressions (page 418)
Documenting Search Results (page 424)
Using Copy Special to Document Search Results (page 425)
Bookmarking Search Results (page 426)
Index searches are instantaneous. In addition, in the Index Search Results List, the offset of the data in the hit is
no longer listed in the hit. You will see it when you look at the hit file in Hex view.
Running an Index search on large files or Index Searches resulting in a large number of hits may make the scroll
bar appear not to work. However, it will return when the search is complete. For more information about indexing
an evidence item, see Indexing a Case (page 75).
The Search Criteria pane shows a cumulative total of all listed or all selected terms, based on the And or the Or
operator. The cumulative total displays at the bottom of the Search Terms list. This functionality has been added
to match the way the Search Terms list functioned in previous versions.
Select none, one, several, or all search terms from the list, click either And or Or, then click either All or
Selected to see cumulative results. You can see this feature at work in the figure below.
Important: If you start an index search and then refresh the interface before the search finishes, the search will
cancel and restart. This will cause a sizeable delay when searching in large or very large cases.
The Index contains all discrete words or number strings found in both the allocated and unallocated space in the
case evidence.
You can configure how special characters, spaces and symbols are indexed. This is not done by default,
however. One benefit is that you can easily search on an exact email address using username@isp (the
extension, such as COM or NET, is not included automatically because a period (.) is not indexed.
In addition to performing searches within the case, you can also use the index to export a word list to use as a
source file for custom dictionaries to improve the likelihood of and speed of password recovery related to case
files when using the Password Recovery Toolkit (PRTK). You can export the index by selecting File > Export
Word List.
Note: Performing a search using Unicode only works with Live Search, not Index Search.
Note: dtSearch has been updated which changes some of the search functionality and results. The search is
now filtering Windows and Linux executables (EXE, BIN, OCF, and ELF). This may reduce the number of
search results and reduce certain items from being shown in the filtered text. For example, the text in a
header of an application may include “This program cannot be run in DOS mode”. Because it is now
filtered it will not longer show in Filtered text.
Note: For Windows 7 and earlier you can use a 3-digit unicode number. For Windows 8 and higher you must
use a 4-digit number. See http://support.microsoft.com/kb/315684/en-us.
To expand terms, a third-party lexical database called WordNet ® is used. When you expand terms, you can use
the following lists: Synonyms, Related, Specific, General.
For example, you may start with a keyword of “delete.” By using the Term Browser, it will suggest synonyms,
such as “erase” and “cancel”. It will also suggest related terms, such as “cut,” “deletion,” and “excision”. It will
also suggest general related terms, such as “censor,” “remove,” “take,” and “withdraw.” It will also suggest
specific related terms, such as “strike,” “excise,” “scratch,” and “expunge”. You can select which of those words
to include in your search.
The first time that you use this feature, the WordNet dictionary must be initialized. This is a one-time event and
can take 5-15 minutes for it to complete. You are prompted before the initialization begins.
Note: It is possible to add a weight while typing in the search term on the Index Tab. To do this, add :##
to the end of the term. For example, to weight the word Crime at a 15, type in the term as
Crime:15. If you prefer not to use the saved weight for a particular search, type in the term with a
:00 at the end. For example, you would type Crime:00.
Searching Evidence with Index Search Adjusting the Weighting Criteria for an Index Search Term | 414
Defining Search Criteria
Refine a search even more by using the Boolean operators AND and OR. You can specify the terms to use in an
index search by selecting specific entries, or by searching against all entries.
You can also use the NOT operator to force the search criteria to exclude terms. To do this, in the Index Search
tab, in the Terms field, type NOT before the term that you want to exclude from the search criteria and then click
Add.
For example, if you do not want to include files with the term “apple” in your search, enter NOT apple into the
search criteria.
The Search Terms list now shows you a cumulative total for the search terms, individually, combined, or total.
You can use the operators All and Selected to see more specific results. This is helpful when refining lists and
terms to limit the results to a manageable number.
You can import a list of search terms to save having to type them multiple times. This is especially helpful when
the list is long, or the terms are complex. When you create a search terms document, each term begins on a new
line, and is followed immediately by a hard return. Save the file in TXT format in any text editor and save it for
future use.
Important: When creating your search criteria, try to focus your search to bring up the smallest number of
meaningful hits per search.
Note: An imported term cannot be edited, except to delete a term and re-add it to your satisfaction.
Important: The Search Options, Stemming, Phonic, and Synonym cannot be combined. You may choose only
one at a time.
Option Result
Stemming Words that contain the same root, such as raise and raising.
Phonic Words that sound the same, such as raise and raze.
Synonym Words that have similar meanings, such as raise and lift.
Files to Search
All Files Searches all the files in the case.
File Name Pattern Limits the search to files that match the filename pattern.
Operand characters can be used to fill-in for unknown characters. The asterisk (*) and
question-mark (?) operands are the only special characters allowed in an index search.
The pattern can include “?” to match any single character or “*” to match an unknown
number of continuous characters.
For example, if you set the filename pattern to “d?ugl*”, the search could return results
from files named douglas, douglass, or druglord.
To enter a filename pattern:
Check the File Name Pattern box.
In the field, enter the filename pattern.
Note: Search by date range is now limited to be between Jan 1, 1970 and Dec 31, 3000.
Searching Evidence with Index Search Selecting Index Search Options | 416
Files to Search (Continued)
Files Saved Beginning and ending dates for the time frame of the last time a file was saved.
Between Check the Files Saved Between box.
In the date fields, type the beginning and ending dates that you want to search
between.
Note: Search by date range is limited to be between Jan 1, 1970 and Dec 31, 3000.
Files Created Beginning and ending dates for the time frame of the creation of a file on the suspect’s
Between system.
Check the Files Created Between box.
In the date fields, enter the beginning and ending dates that you want to search
between.
Note: Search by date range is now limited to be between Jan 1, 1970 and Dec 31, 3000.
File Size Between Minimum and maximum file sizes, specified in bytes.
Check the File Size Between box.
In the size fields, enter the minimum and maximum file size in bytes that you want to
search between.
Save as Default Check this box to make your settings apply to all index searches.
Click Search Now when search criteria are prepared and you are ready to perform the search.
Searching Evidence with Index Search Viewing Index Search Results | 417
Using dtSearch Regular Expressions
You can use regular expression searching capabilities in the dtSearch index search tab. This functionality does
not use RegEx++ that is used in the Live Search tab. dtSearch utilizes the TR1 (Technical Report 1) regular
expressions.
Regular expressions in dtSearch provide a powerful syntax for searching for complicated patterns in text, such
as one of several possible sequences of letters followed by a sequence of numbers. Regular expressions can
also be used to express spelling variations of individual words. Regular expression patterns are arbitrary (i.e.,
supplied by the user dynamically) and cannot be pre-indexed.
Regular expression searching in dtSearch is limited to a single whole word. A regular expression included in the
dtSearch box must be quoted and must begin with ##. An example of this is:
Apple and "##199[0-9]" - will find Apple and 1990 through 1999
Apple and "##19[0-9]+" - will find Apple and 190 through 199
However, if you want to look for Apple Pie, you cannot use "##app.*ie" since this is two words. Only letters and
numbers are searchable. You cannot search for any of the non-indexed characters as defined in the Index
Search Settings in the Detailed Options section of a case creation. Also, dtSearch does not store information
about line breaks so any searches that are made that include the beginning of a line or the end of a line will not
work.
Search considerations using the wildcard character "*" in a regular expression does have an effect on search
speed: the closer to the front of a word the expression is, the more it will slow searching. "Appl.*" will be nearly
as fast as "Apple", while ".*pple" will be much slower.
Note: Advanced searching for Social Security Numbers and Credit Card Numbers and other number patterns
can be achieved, however modifications to the dtSearch engine must be made before processing the
case. For more details, see Advanced Searching on page 7 of this paper.?
Element Terms
Characters and target sequences are referred to as an Element and can be one of the following:
Searching Evidence with Index Search Using dtSearch Regular Expressions | 418
{2} is a repetition character.
A ',' (comma) is a minimum character.
(aa?) is a target sequence.
An alternation character search is 'this|that'.
A concatenation sequence is '(a){2,3}(b){2,3}(c)'.
A back reference is '((a+)(b+))(c+)\3'.
(?:subexpression) matches the sequence of characters in the target sequence that is matched by the
patter between the delimiters.
(?!:subexpression) matches any sequence of characters in the target sequence that does not match the
pattern listed in the subexpression)
A bracket or range expression of the form "[expr]", which matches a value or a range, similar to a "set" in
the Live Pattern Search.
Examples:
"##a" matches the target sequence "a" but does not match the target sequences "b", or "c", and so on.
"##." matches a single character such as "a", "b", and "c",and so on.
"##sal*" matches the target 'sale' and the target "salt' and so on.
"##(a)" capture group, matches the target sequence "a" but does not match the target sequences "b", or
"c", and so on.
"##\d\d\d\d" matches the target sequence of four digits "1234".
"##aa?" or {0,1} matches the target sequence of "aa" and the target sequence of "aaa".
"##ab" matches the target sequence "ab."
"##[b-z]" or range, matches the target sequences "b" and "c" but does not match the target sequences
"a".
"##tom|jerry" matches the target sequence of 'tom' or 'jerry'.
"##\d{4}" or repetition, matches the target sequence of four digits "1234".
"##(?:aa)" or target sequence, matches the target sequence of "aa" and the target sequence of "aaa",
and so on.
Ordinary Character
By entering actual ASCII characters, the search will return that set of characters after the element(s) are
entered. By entering ordinary characters, "##nick", you would find said characters. However, if you wanted to
look for Nick Davis, you could not use "##nick davis" since this is two words.
Examples:
"##(a*)" matches the target sequence "a", the target sequence "aa", and so on.
"##a*" matches the target sequence "a", the target sequence "aa", and so on.
Searching Evidence with Index Search Using dtSearch Regular Expressions | 419
"##(a.)" matches the target sequence "aa", the target sequence "ab", but will not find the target sequence
the target sequence "aaa".
"##a." matches the target sequence "aa", the target sequence "ab", but will not find the target sequence
the target sequence "aaa".
"##.*ick" matches the target sequence "nick", the target sequence "click", and so on.
"##mari.uana" matches the target sequence "marijuana" and the target sequence "marihuana".
Capture Group
A capture group marks its contents as a single unit in the regular expression and labels the target text that
matches its contents. The label that is associated with each capture group is a number, which is determined by
counting the opening parentheses that mark capture groups up to and including the opening parenthesis.
Examples:
"##(ab)*" matches the target sequence "ab", the target sequence 'abab", and so on.
"##(a+)(b+)" matches the target sequence "ab, the target sequence "aab", the target sequence "abb",
and so on.
"##ab+" matches the target sequence "abb" but does not match the target sequence "abab."
"##(ab)+" matches the target sequence "abab" but does not match the target sequence "abb."
"##((a+)(b+))(c+)" matches the target sequence "aabbbc" and associates capture group 1 with the
subsequence "aabbb", capture group 2 with the subsequence "aa", capture group 3 with "bbb", and
capture group 4 with the subsequence "c".
Repetition
Any element can be followed by a repetition count.
Examples:
"##(a{2})" matches the target sequence "aa" but not the target sequence "a" or the target sequence
"aaa".
"##(a{2,})" matches the target sequence "aa", the target sequence "aaa", and so on, but does not match
the target sequence "a".
A repetition count can also take the following form:
"a?" matches the target sequence "" and the target sequence "a", but not the target sequence "aa".
"##(aa?)(bbbb?)(c)" matches the target sequence "aabbbbc" and the target sequence "abbbc".
Decimal Character
You can locate any set of decimals by using the '\d" character element in the expression.
Examples:
Searching Evidence with Index Search Using dtSearch Regular Expressions | 420
"##\d{3}\d\d\d\d" matches the target sequence '1234567".
Visa and "##\d{4}" will match any files that contain the word 'visa' and any four digits.
Alternation
A concatenated regular expression can be followed by the character '|' and another concatenated regular
expression. Any number of concatenated regular expressions can be combined in this manner. The resulting
expression matches any target sequence that matches one or more of the concatenated regular expressions.
Example:
"##(nick|houston)" matches the target sequence "nick", or the target sequence "houston".
Concatenation
Regular expression elements, with or without repetition counts, can be concatenated to form longer regular
expressions. The resulting expression matches a target sequence that is a concatenation of the sequences that
are matched by the individual elements.
Examples:
"##(a){2,3}(b){2,3}(c)" matches the target sequence "aabbc", the target sequence "aaabbbc".
"##(\d{4}){4}" matches the target sequence of "1234123412341234" (16 digits - no spaces).
Back Reference
A back reference marks its contents as a single unit in the regular expression grammar and labels the target text
that matches its contents. The label that is associated with each capture group is a number, which is determined
by counting the opening parentheses that mark capture groups up to and including the opening parenthesis that
marks the current capture group. A back reference is a backslash that is followed by a decimal value N. It
matches the contents of the Nth capture group. The value of N must not be more than the number of capture
groups that precede the back reference.
Example:
"((a+)(b+))(c+)\3" matches the target sequence "aabbbcbbb". The back reference "\3" matches the text in
the third capture group, that is, the "(b+)". It does not match the target sequence "aabbbcbb".
The first capture group is ((a+)(b+))
The second capture group is (a+)
The third capture group is (b+)
The fourth capture group is (c+)
Searching Evidence with Index Search Using dtSearch Regular Expressions | 421
Examples:
"[0-7]" represents the set of characters { '0', '1', '2', '3', '4', '5', '6', '7' }. It matches the target sequences "0",
"1", and so on, but not "a".
"[h-k]" represents the set of characters { 'h', 'i', 'j', 'k' }.
"[0-24]" represents the set of characters {'0', '1', '2', '4' }.
"[0-2]" represents the set of characters { '0', '1', '2' }.
An individual character in a bracket expression adds that character to the character set that is defined by the
expression. If the bracket expression begins with a "^" then this defines that the expression will consider all
characters except for those listed.
Examples:
"[abc]" matches the target sequences "a", "b", or "c", but not the sequence "d".
"[^abc]" matches the target sequence "d", but not the target sequences "a", "b", or "c".
"[a^bc]" matches the target sequences "a", "b", "c", or "^", but not the target sequence "d".
Note: NOTE: Currently, you cannot include search patterns with spaces.
Normal dtSearch strings for credit card numbers or social security numbers
The normal dtSearch wildcard string can be utilized as long as the hyphen is set to be indexed as a space:
Number Patterns
You can use dtSearch TR1 Regular Expression to find number patterns as you can in Live Searches for such
things as Credit Card Numbers, Social Security Numbers, xxxxxxxx. Certain pre-processing options MUST be
completed before this function will work.
Searching Evidence with Index Search Using dtSearch Regular Expressions | 422
Configuring Pre-Processing Options
If you to utilize the dtSearch TR1 Regular Expression functions for looking for number patterns, you must
complete the following pre-processing options:
The first three groups are composed of - (\d{4}[\.\-]). The expression is looking for four digits followed
by a period, or hyphen. This group is repeated three times and followed by the group looking for the
ending 4 digits.
We can shorten that expression by writing it "##((\d{4})[\.\-]){3}(\d{4})".
This will find 1234-5678-1234-5678 or 1234.5678.1234.5678
For Social Security Numbers -
"##(\d{3}[\.\-])(\d{2}[\.\-])(\d{4})".
Searching Evidence with Index Search Using dtSearch Regular Expressions | 423
Documenting Search Results
Once a search is refined and complete, it is often useful to document the results.
Right-click an item in the Search Results list to open the quick menu with the following options:
CreateBookmark: Opens the Create Bookmark dialog. For more information on creating and using
Bookmarks, see Using the Bookmarks Tab (page 395).
Copy to Clipboard: Copies the selected data to the clipboard (buffer) where it can be copied to another
Windows application, such as an Excel (2003 or earlier) spreadsheet.
Note: The maximum number of lines of data that can be copied to the clipboard is 10,000.
Export to File: Copies information to a file. Select the name and destination folder for the information file.
Uses the same criteria as Copy to Clipboard.
Set Context Data Width: Context data width is the number of characters that come before and after the
search hit.
Delete All Search Results: Use this to clear all search results from the Index Search Results pane.
Option Description
All Hits in Case Saves all the current search terms’ hits found from the entire case.
All Hits in Search Saves all the search hits found in each search branch.
All Hits in Term (Live search only) saves the instances of individual terms found from the list of search
terms.
For example, if a live search consisted of the list “black,” “hole,” “advent,” and “horizon,”
this option would copy information on each of the terms individually.
All Hits in File Records the instances of the search term in the selected file only.
All File Stats in Case Creates a CSV file of all information requested in the case.
All File Stats in Creates a CSV file of the information requested in the search.
Search
All File Stats in Term (Live search only) Creates a CSV file of the instances of individual terms found from the
list of search terms.
After the information is copied to the clipboard, it can be pasted into a text editor or spreadsheet and saved.
Choose Export to File to save the information directly to a file. Specify a filename and destination folder for the
file, and then click OK
Search results can then be added to the case report as supplementary files.
Important: When exporting Index Search result hits to a spreadsheet file, the hits are exported as a CSV file in
UTF-16LE data format. When opening in Excel, use the Text to Columns function to separate the
Index Search hit values into columns.
Searching Evidence with Index Search Using Copy Special to Document Search Results | 425
Bookmarking Search Results
To keep track of particular search results, add them to new or existing bookmarks. Search results in the file list
can be selected and added to a newly-created bookmark, or added to an existing bookmark as with any other
data.
Applications
Prefetch
User Assist
Installed
Network Information
Network Shares
Network Connections
Wireless Profiles
Owner Information
Recent Files
LNK
NT User
Shortcuts
SAM Users
USB Devices
For details about the attributes, see Available System Information Data (page 430).
Viewing System Information Populating the Data in the System Information Tab | 428
Exporting System Information Data
You can export the content in the Sytem Information tab into an XML file.
Note: In order to export system information data, the image must have been processed with the Generate
System Information processing option selected during Add/Remove evidence, and the image must
actually contain system information.
Prefetch Each time you turn on your computer, Windows keeps track of the way your
computer starts and which programs you commonly open. Windows saves
this information as a number of small files in the prefetch folder. The next
time you turn on your computer, Windows refers to these files to help speed
the start process.
The prefetch folder is a subfolder of the Windows system folder. The
prefetch folder is self-maintaining, and there's no need to delete it or empty
its contents. If you empty the folder, Windows and your programs will take
longer to open the next time you turn on your computer.
For each prefetch (.PF) file, in the System Information tab displays the
following information:
Complete path to the application executable
Number of times the application was run.
Last time the application was run
User Assist UserAssist is a method used to populate a user's start menu with frequently
used applications. This is achieved by maintaining a count of application
use in each users NTUSER.DAT registry file at sub key:
Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist
For each UserAssist entry in the registry, the System Information tab
displays the following information:
Complete path to the application executable
Number of times the application was run
Last time the application was run
Network Data
Network A network share is a computer resource made available from one host to
Shares other hosts on a computer network. In this feature, it is specifically the
networks that were accessed using the Universal Naming Convention
(UNC). This information is stored in each user's NTUSER.DAT registry file
at sub keys:
Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Map Network
Drive MRU
Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\RunMRU
Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\MountPoints2
For each installed application, the System Information tab displays the
following information:
UNC Path
Last connection time
Owner Information Data This is basic data about the installed operating system and comes from the
HKLM\SOFTWARE registry file under the sub key:
Microsoft\\Windows NT\\CurrentVersion
For each registry value, the System Information tab displays the following
information:
Name of the registry value
The contents of the registry value
LNK Files LNK is a file extension for a shortcut file used by Microsoft Windows to point
to an executable file. LNK stands for LiNK. Shortcut files are used as a
direct link to an executable file, instead of having to navigate to the
executable, LNK files are stored in each users'
AppData\Roaming\Microsoft\Windows\Recent or Recent directory.
For each LNK file, the System Information tab displays the following
information:
Absolute path to target file
Date/Time the target file was created
Date/Time the target file was last written to
Date/Time the target file was last accessed
Jump Lists Jump Lists, new in Windows 7, take you right to the documents, pictures,
songs, or web sites you turn to each day. To open a Jump List, just right-
click a program button on the Windows 7 taskbar. (You can also get to
Jump Lists by clicking the arrow next to the program name on the Start
menu.) The files that support this feature are located in each users'
AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations
folder.
For each LNK file inside each Jump List, the System Information tab
displays the following information:
Absolute path to target file
Date/Time the target file was created
Date/Time the target file was last written to
Date/Time the target file was last accessed
USB Devices When USB devices are plugged into a computer for the first time, the
Windows operating installs an appropriate driver and stores information
about the device in the registry and the setupapi log file. On subsequent
device connections, various registry keys are updated to reflect the last
connection time. Details about each USB devices are stored in the following
registry locations:
HKLM\SOFTWARE\Microsoft\\Windows NT\\CurrentVersion\\EMDMgmt
HKLM\SYSTEM\CurrentControlSet\Enum\USBSTOR
HKLM\SYSTEM\CurrentControlSet\Enum\USB
HKLM\SYSTEM\CurrentControlSet\Control\DeviceClasses\{53f56307-
b6bf-11d0-94f2-00a0c91efb8b}
HKLM\SYSTEM\CurrentControlSet\Control\DeviceClasses\{53f56308-
b6bf-11d0-94f2-00a0c91efb8b}
HKLM\SYSTEM\MountedDevices
HKU\<user sid>\Software\Microsoft\Windows\CurrentVer-
sion\Explorer\MountPoints2
For each USB device, the System Information tab displays the following
information:
Vendor name
Vendor id
Product name
Product id
Instance id (very similar to serial number)
Revision
First time device was connected
Last time device was connected
Last time a user mounted the device
Drives the device was mounted to
Volume labels
Depending on your license, you can analyze the content of documents in your evidence in the following ways:
1. Process the data with the Entity Extraction processing options enabled.
You can select which types of data to extract.
2. View the extracted entities in the Examiner.
The following table provides details of the type of data that is identified and extracted:
Type Examples
Credit Card Numbers in the following formats will be extracted as credit card numbers:
Numbers
Type Examples
16-digit numbers For example,
used by VISA, 1234-5678-9012-3456 (segmented by dashes)
MasterCard, and 1234 5678 9012 3456 (segmented by spaces)
Discover in the
following formats.
Not:
1234567890123456 (no segments)
12345678-90123456 (other segments)
Notes:
Other formats, such as 14-digit Diners Club numbers, will not
be extracted as credit card numbers
Phone Numbers Numbers in the following formats will be extracted as phone numbers:
Type Examples
International Some international formats are extracted, for example,
+12-34-567-8901
+12 34 567 8901
+12-34-5678-9012
+12 34 5678 9012
Notes:
Be aware that you may get some false positives.
For example, a credit number 5105-1051-051-5100 may also
be extracted as the phone number 510-5100.
Social Security Numbers in the following formats will be extracted as Social Security Numbers:
Numbers
Note: If you activated Document Content Analysis as an Evidence Processing option when you created the
project, Document Content Analysis will automatically run after processing data and will not need to be
run manually.
In order for the application to filter the data and display the Cluster Topic container, the following must occur:
Word frequency or occurrence count is used by the algorithm to determine the importance of content within the
data set. Noise words that are excluded from Document Content Analysis are also not included in the Cluster
Topic pivots or clusters.
The UNCLUSTERED category contains any documents that are not included under a Cluster Topic Container.
Not all data will be grouped into categories at once. The application creates categories in an incremental
fashion in order to return results as quickly as possible. Since the application is continually creating
categories, the Cluster Topic container is continually updated.
Duplicate documents are grouped together as they match a specific category. However, if a category is
particularly large, duplicate documents may not be included as part of any category. This is to avoid
Note: With an FTK, FTK PRO, or AD Enterprise license, you can perform Cluster Analysis on a documents only
using the Document Content Analysis feature.
See Using Document Content Analysis on page 439.
You perform the Cluster Analysis by enabling the Cluster Analysis processing option.
When you enable Cluster Analysis, you have the following options:
Document Types to process - You can select to process the following file types:
Documents
Presentation
Spreadsheets
Similarity Threshold - Determines the level of similarity required for documents to be considered related
or near duplicates.
After processing is complete, you can add the Review Set Pivot and the Distance to Pivot columns in the File List
in the Examiner. You will also use the standard Item # column to identify the Pivot file.
About Visualization
Visualization is a component that provides a graphical interface to enhance understanding and analysis of files
and emails in a case. You view data based on file and email dates. Visualization provides dashboards with chats
and lists that quickly show information about the data in the specified date range. Visualization helps you identify
files and emails that you label and bookmark as part of your investigation.
Note: The Visualization feature is available as an add-on license. Please contact your AccessData sales
representative for more information.
Visualization can only display data that has an associated date. If a file or an email does not contain a valid
Created, Modified, Last Accessed, Sent or Received date, it is not displayed. For example, carved files do not
have an associated date so they are not displayed in Visualization.
You can also take screen captures of the Visualization pages to have a record of the data.
The data that you have displayed in the File List pane is the data that you can send to the visualization
module.
The visualization module opens in a separate window from the Examiner that you can minimize,
maximize, and select in the Windows task bar.
3. On the time line, specify the date range for the base time line that you want to view data for.
See Setting the Base Time Line on page 448.
Important: The dashboard and data list displays information only for the data that exists in the base time
line. If specified dates have no files, the dashboard displays the text “No Data Series.” To properly
use Visualization, you must specify the base time line that you want to view data for.
Time line pane - Provides a time line pane with graphics representing the available data. This is the top
part of the page.
Dashboard - Provides graphical chart panes about the data. This is the middle part of the page.
Data list pane- Provides a list of the data items. The is the lower part of the page.
You can resize each pane.
Basic - The basic view lets you specify a base time line that you want to view data for. For example, you
can select a specific year or month, or you can specify a custom date range. Any data that falls in that
date range will be represented in the charts and data list.
See About the Base Time Line on page 446.
Detailed - The detailed time line view shows a graphical representation of each file or email message. If
you have a lot of data in a given date range, you can narrow your view to days, hours, minutes, and
milliseconds.
See About the Detailed Visualization Time Line on page 463.
The span of the time line is automatically configured based on the dates of the data that you specified for
visualization. For example, if the data that you specified has creation dates that range from 8/15/2003 to 9/11/
2003, it will build a time line with those dates as the start and end.
The vertical gray bars represent where the data files are on the time line. The gold text in the lower left corner of
the time line details the full timespan.
In the Basic time line view, you configure the base time line. The base time line is the specific range of dates that
you want to work with. This may be a smaller date range than the full timespan (dates in yellow).
The base time line is represented by the blue selection box with sliding vertical bars. You can modify the base
time line to be any range within the full timespan.
Important: The dashboard and data list displays information only for the data that exists in the base time line. If
specified dates have no files, the dashboard displays the text “No Data Series.” To properly use
visualization, you must specify the base time line that you want to view data for.
In the example in the graphic shown above, there are four files in the default base time line of one month and
those four files are shown in the list and represented in the dashboard.
In the email visualization, the time line is displayed in weeks, with vertical gray bars representing the emails.
Option Description
Log (default) The Log (logarithmic) view makes visualization adjust the bars or lines to raise the low
points and lower the highs so that both are easier to view on a chart. This view smooths
the peaks and valleys in the chart.
Linear The Linear view returns the view from Log to an unadjusted representation of the data.
Changing from the Log view to the Linear view shows more of the variance and spikes in
the data.
Bars (default) The Bars option makes Visualization show evenly-spaced bars to represent the data.
Line The Line view makes Visualization show the data as an unbroken line with peaks and
valleys, representing increases and decreases in the amount of data over time.
Office Black
Office Silver
Vista
Windows 7
Summer
Expression Dark
Transparent
If a file’s Created date, Modified date, or Last Accessed date is prior to the year 1985, visualization displays a
dialog box. The dialog box asks you if you want to include the files with these dates in the visualization display. If
you select the option to Do not ask me again, Visualization will remember your preference the next time the
dates precede 1985.
Within the file data list you can sort, group, and sub-group, items according to columns including; ID, Name,
Category, Date, and Size. To sort, drag and drop the desired column heading onto the blue bar. Any column
heading that includes a filter icon can be used to sort the file list data set.
Important: If you want to filter for a specific date, include the day of and the day after. The filter uses midnight as
the time frame. So if you only want files with a date of January 27, 2013, include January 27 and Jan
28. That will include files from midnight on the 27th to midnight on the 28th.
You can use the Filter icon on any of the column headings to create custom filters in the file details list.
When you select the filter icon, a filter dialog is displayed that lets you select items that apply to the column
where you add filtering expressions. There are many various was in which you can filter to refine the data that is
displayed.
Note: You can filter and sort by file sizes such as bytes, KB, and MB. However, note that when you enter an
operator to filter by size, you must enter the size according to its byte value. You cannot enter the value in
KB or MB. For example, instead of entering 100 KB, you must enter 102400 for the filter to work properly.
You can sort group and subgroup the emails according to the columns including: Sender, Address, Traffic Count,
Sent Mail, and Received Mail. To group the list of emails, you can drag and drop the column headers onto the
table heading of the details list. The list sorts first by the first columns that you drop, and then in the order of any
preceding columns that you drop into the table heading.
When you select the Filter icon, a filter dialog is displayed that lets you select items that apply to the column and
add filtering expressions.
In visualization, Email addresses that are similar but not exactly the same are displayed as two different
addresses, even though they may be the same address. For example, the quotation marks for 'John Doe' and
“John Doe” are not the same. These slight changes in text can happen from different email servers/software
during email transit, and the program cannot discern duplicate email addresses.
You can check specific emails in the examiner from the email details list by selecting the emails and then
choosing one of the Check Selected Items options, Sent, Received, or Both.
When you expand a specific email item, you can run additional functionality. This functionality includes the Social
Analyzer chart. The buttons to open the Social Analyzer chart are located on the right side of a custodian’s email
item in the list.
Note: Social Analyzer is very graphics-intensive. In order to avoid server issues, you should cull the data with
facets and other filters to isolate the information that you want to examine before viewing it in Social
Analyzer.
3. (optional) If you want to view the top ten domains in terms of received emails. click . Each time you
click this icon, the next top ten bubbles will be selected, and so forth.
4. (optional) You can zoom in and zoom out of the Social Analyzer panel. If you hover over a domain
bubble, the full display name and address, as well as the count, is displayed in the tool tip.
5. You can expand selected email domains and examine individual emails in a domain. See Analyzing
Individual Emails in Visualization on page 461.
3. (optional) If you want to view the top ten domains in terms of received emails. click . Each time you
click this icon, the next top ten bubbles will be selected, and so forth.
Years
Months
Days
Hours
Minutes
Seconds
Milliseconds
Different file types are represented by different colors to assist in identifying relevant files.
Important: Before you launch the Detailed time line view, you must specify a base time line in the basic view that
includes the data that you want to look at. Otherwise, you will only be able to see the files that are in
the default base time line.
See About the Base Time Line on page 446.
Years
Months
Days
Hours
Minutes
Seconds
Milliseconds
When you first open visualization, it will determine which time bands to enable based on the date range of the
base time line.
You can choose to display or hide a time band. The bands are displayed at the bottom of the time line. The more
time bands that you turn on, the more granular the data becomes.
The Year time band is on the bottom, with the Month time band above that, and the Days time band (1-31) is
above that. There are green dots in the bands. The green dots represent files or groups of files. Also in the
example, there is a box in the center of the bands. That box is the view window. The view window is always in
the center of the time line. You will only see the files that are in the view window. You can slide the time line to the
left and right to place files into the view window.
If there are large clusters of files, you can turn on more time bands to get a more granular view of the files.
You can have the data grouped by the following two methods:
Selected Time - (Default) Items are grouped by a specific time period, for example Days. For example,
you could have 25 items on the 5th, 200 items on the 6th, and 1100 items on the 7th. There would be a
single group for each day.
Fixed Number - Items are grouped into by a maximum group size of 500. Using the previous example, if
there were 1325 total items, they would displayed in three groups of 441 files.
The group flag includes a Details button. Click the Details button to display a list of all of the items that are
grouped under that flag.
You can also click a group to get a more granular view of the files in the group. When you click a group additional
time bands are enabled to give you a more detailed view.
Be aware that multiple flags may be staked vertically. You may need to make the time line pane taller by
dragging the bottom border of the pane down.
Example of grouping
Internet Explorer
Firefox
Chrome
Safari
Opera
In order to view internet browsing history files in the detailed visualization timeline, you must first process the
browser history files. By default, the option to process browser history files is disabled. You must enable the
Process Internet Browser History for Visualization option in either the processing options or additional analysis
options.
EVTX files - See Viewing Data in Windows XML Event Log (EVTX) Files (page 341)
IIS Log files - See Viewing IIS Log File Data (page 343)
Registry data files - See Viewing Registry Timeline Data (page 345)
CSV files that are in the Log2Timeline format - See Log2timeline CSV fields (page 349)
The Social Analyzer map displays emails in the data set group by domain name. These domain names appear
on the map in circles called “bubbles.” The larger the bubble, the more emails are contained within that domain.
The bubbles in the map are arranged in a larger sphere according to how many emails were sent to that domain.
The center bubble in the sphere will have the most emails sent from this domain, while domains radiating
clockwise from the center will have fewer and fewer emails in their domain bubble. If you want to examine email
domains with the most sent emails, concentrate on examining the bubbles in the center of the map.
Email data in the Social Analyzer map can be examined on two different levels. On the first level, you can get an
overall view of communications between domains. You can then select domains that you want to examine in a
Element Description
This map presents the overall view of the social analyzer data. The orange
rectangle indicates the area displayed in the main social analyzer map. Black
dots in the overall view show domains that are either selected or communicating.
You can either expand or collapse the overall view by clicking on the triangle in
the upper right corner.
When you select a domain bubble, it is surrounded by a colored double ring. The
ring may be colored blue, black, purple, or red. The different colors allow you to
distinguish between different selected domains, but they do not have any
significant meaning.
Domain bubbles that are not selected, but have sent emails to the selected
domain bubble, are surrounded by a single colored ring that is the same color as
the selected domain bubble. This allows you to easily tell which domains have
been communicating with the selected domain bubble. Domain bubbles that do
not connect to any selected domains are greyed out.
Lines connect other domain bubbles to the selected domain bubble. These lines
represent emails sent to the selected domain from other domains. The more
emails that have been sent to the domain, the thicker the line between domain
bubbles are. You can also see emails sent from the selected domain. Select
Show Reversed Connections in the Social Analyzer panel to show visual
representations of emails sent from the selected domain.
A domain bubble with an orange ring indicates that a domain has been
connected to from another domain multiple times. This allows you to pinpoint
domains that have heavy communication between them.
Note: Expansion of large datasets may result in slow server speeds and slow rendering the Social Analyzer
visualization data.
Element Description
Applies the visualization graph filters to the Item List grid. Once
Apply Visualization applied, only those items filtered with visualization will appear in
the Item List grid.
Selects the ten bubbles that have been most connected to in the
Select Most Connected Items Social Analyzer pane. Each time you click this icon, the next top
ten bubbles will be selected, and so forth.
Zooms into the Social Analyzer pane. If you are unable to view
Zoom In the social analyzer data, click Zoom In to locate the data. You can
also zoom in by expanding the slider bar located at the bottom of
the Social Analyzer pane, by using the + key on the keyboard, or
by scrolling the mouse wheel up.
Zooms out of the Social Analyzer pane. You can also zoom out
Zoom Out by expanding the slider bar located at the bottom of the Social
Analyzer pane, by using the - key on the keyboard, or by scrolling
the mouse wheel down.
Expands and collapses the overall map of the data set. Dots that
appear in black in the overall map are domains/emails that are
connected to the selected domain/email. The orange rectangle on
the map shows where the expanded location is on the map.
Element Description
View Show Reversed Connections - Select to show all reversed
connections in the pane. Reversed connections are emails
sent from a particular email or email domain.
Show Connections - Select to show the connections between
domains in the pane. Connections are emails sent to a particu-
lar email or email domain.
Preview Connections on Hover - Select to view connections
between domains when you hover over them. This option is
not selected by default to speed rendering of the map.
Email Display - Display email domains either by the display
name or address.
Bubble Limit - You can choose a display limit of either 2,500,
5,000, or 10,000 domains. Server issues may occur with larger
display limits.
Stats Displays the statistics of either the first or second level of the
email domain data. You can view:
The total number of domains, emails, and bubbles in the pane.
The total number of selected domains, emails, and bubbles in
the pane.
The total number of domains, emails, and bubbles that have
been expanded.
You can access the second level of data by clicking Expand
Selected Data.
Note: Social Analyzer is very graphics-intensive. In order to avoid server issues, you should cull the data with
facets and other filters to isolate the information that you want to examine before viewing it in Social
Analyzer.
4. (optional) If you want to view the top ten domains in terms of received emails. click . Each time you
click this icon, the next top ten bubbles will be selected, and so forth.
5. (optional) You can zoom in and zoom out of the Social Analyzer panel. If you hover over a domain
bubble, the full display name and address, as well as the count, is displayed in the tool tip.
6. You can expand selected email domains and examine individual emails in a domain. See Analyzing
Individual Emails in Visualization on page 474.
4. (optional) If you want to view the top ten domains in terms of received emails. click . Each time you
click this icon, the next top ten bubbles will be selected, and so forth.
5. (optional) You can zoom in and zoom out of the Social Analyzer panel. If you hover over a domain
bubble, the full DisplayName and address, as well as the count, will be displayed in the tool tip.
Heatmap allows you to view a visual representation of file categories and file volume within a project. Information
displays in a grid comprised of squares of different colors and sizes. Each color represents a different file
category, and the relative size of the square represents the file volume within the category. You can view each
file category for more details about the files within that category (similar to a file tree) and navigate between file
categories.
You can also switch between viewing the file volume by the physical size of each file and the file count. This
allows you to see any discrepancies in the size of the files. For example, if someone were trying to hide a file by
renaming the file extension, you could easily see the size discrepancy in the heatmap, and then investigate that
particular file further.
To access Heatmap
1. In Forensics products, do the following:
1a. Open the Examiner.
2b. In the Item List panel, click Options > Visualization > Heatmap.
Heatmap Panel
Element Description
Cancels the heatmap filters and exits out of Visualization.
Apply the visualization graph filters to the Item List grid. Once applied, only those
items filtered with visualization appear in the Item List grid.
Options
Category Files - Allows you to view files by the file category. You can view the files in
each category:
By double-clicking that particular file category’s square, or
By clicking the menu from the upper left side and choosing the file cate-
gory that you want to view in the heatmap.
Folders - Allows you to view files by the folders contained within the project.
You can view the files in each folder:
By double-clicking that particular folder’s square.
By clicking the menu from the upper left side and choosing the folder that
you want to view in the heatmap.
Extensions - Allows you to view files by the file extension.
Metric By Size - Allows you to view file types by size of the files. The larger the files,
the larger the represented square in the heatmap.
By Count - Allows you to view file types by quantity. The more files of a partic-
ular type that are in the project, the larger the represented square in the heat
map.
Photos with GPS information in the EXIF data. If you have photos in the evidence that have GPS data in
the EXIF data, you can see where those photos were taken.
IP location data after gathering Volatile data (Enterprise license only). When using Forensic products and
processing volatile/RAM data, you can see the lines of communication (both sent and received) between
addresses, showing the location of all parties involved.
Using Geolocation Visualization with Forensics Products to View Security Data (page 486)
Note: When using Forensic products, Geolocation IP address data may take up to eight minutes to
generate, depending upon other jobs currently running in the application.
Maps
When viewing geolocation data, you can use any of the following maps:
OpenStreetMaps
Offline Maps (See General Geolocation System Requirements (page 479) and Using Offline Maps
(page 479))
Geolocation Grid
Below the map, you can view a grid that shows details about the items in the map.
See Using the Geolocation Grid on page 484.
Geolocation Data in columns in the Item List
You can view geolocation data for files in the Item List.
See Using Geolocation Columns in the Item List on page 485.
To view EXIF data in Forensic products (FTK, FTK Pro, Lab, and Enterprise):
1. In FTK, open the Examiner.
2. In the Item List panel, click Options > Visualization > Geolocation.
3. You can filter the items displayed and see item details.
See Using the Geolocation Grid on page 484.
The general location of the clusters are determined by a central point on the map. The clusters radiate from this
central point. When you zoom in and out of the map, your central point on the map moves as well, and clusters
will shift position on the map. However, as you zoom into a cluster, the cluster rendered will more closely align
itself with the location of the individual pins.
When viewing IP data, the connections between two pins display on the map as lines between clusters/pins. The
width of the lines represent the amount of traffic between two IP address. The thicker the lines, the more traffic
has occurred. Green lines represent traffic originating from the pin and red lines represent traffic entering the pin.
When you select a cluster and zoom in on a particular pin, you can select one or more pins. When a pin is
selected, the outline and shadow of the selected pin turns orange. If you zoom out of the map, the cluster with
one or more selected pins has an orange ring.
Geolocation Panel
Element Description
After filtering data by selecting one or more pins, this applies the selected
geolocations to the Item List grid. Once applied, only those geolocations filtered
with visualization appear in the Item List grid.
For network data, you will see any communication from those pins to any other
location. This may include one or more items.
If you enter the Geolocation view again, only those geolocation will be displayed
in the map.
To reset the items in the Item List, click the Project Explorer’s Reset and Apply
icons.
Pins displayed Shows the number of spins that are displayed and the number selected.
Options
Element Description
Displays the number of pins selected in the map versus the number of pins
available in the data.
Displays the latitude and longitude where the mouse pointer resides. To view the
position of a particular pin, hover the mouse over the pin. To view the exact
coordinates of the pin, select the pin and right-click.
Zooms in or out on the map. A slide bar displays, allowing you to control the
zoom feature.
Displays either EXIF data or network connection data. You can also view both
Filter types of data at the same time.
Detail of Pin
Note: To save processing time and to ensure data accuracy, the host name does not populate in the
Geolocation pin. However, the host name does populate in the Item List.
If you make any changes to the pin, a warning icon displays that notifies you that changes were made to
the pin and need to be saved. You can do the following in the pin dialog:
Click to save the changes that you have made to the pin
Click to reset the pin. If changes have been saved previously to the pin, this action resets the pin to
the saved version
You can minimize the grid so that the whole map is visible.
You can filter the contents of the grid in the following ways.
In the map, if you select a pin, only that item is displayed. You can click (and select) multiple pins.
In the map, if you right-click a cluster and click , that selects all of the pins in a cluster. This will filter
the grid to those clustered pins. You can add multiple clusters to the grid.
In the grid, the columns in the Geolocation Grid can be filtered to cull the items in the grid. For Network
Communication data, the data in the bar chart is filtered as well when columns are filtered.
Geotagged Country Code: Country Code: ISO country code location of geotagged photo or object,
such as USA, FRA, MEX, HKG, and EST.
Geotagged Postal Code: Postal Code Postal code of geotagged photo or object.
Geotagged Source: Source Source used to resolve geotagged GPS location to locality
information.
Note: The following columns are not used with exif data: GeoTagAreaCode, MetroCode, or Postal Code.
Using Visualization Geolocation Using Geolocation Columns in the Item List | 485
Using Geolocation Visualization with Forensics Products to
View Security Data
Note: This feature is only available with AD forensics productes with a Memory Analysis licesne,
After gathering Volatile data, you can use geolocation to view IP location data to discover where in the world a
computer is communicating. You can view IP locations data when using the following products:
The Geolocation view will display lines that trace internet traffic sent and received between IP addresses,
indicating the physical location of all parties involved. You can drill into geographic regions to see multiple
evidence items. You can then select specific data to post back to the case, where they can view information in
the examiner or include it in reports.
Note: For data collected by Geolocation Visualization, the To Domain Name, To ISP, To Netspeed, and To
Organization columns do not populate in the Item Grid. If you require this data, you need to purchase a
MaxMind Premier database license.
Using Visualization Geolocation Using Geolocation Visualization with Forensics Products to View Security Data | 486
To set this information, you need to populate a configuration file for the KFF server.
Option Description
Ip Address The IP address. The IP addresses must be written in CIDR format and need to
be IPv4 addresses.
ID
Country Code The two letter country code for a country, such as HK for Hong Kong or US for
the United States.
Country Code 3 The three letter country code for a country, such as RUS for Russia or DEU for
Germany.
Region The state or province of the geolocation data, such as NY for New York or ON for
Ontario.
City The city of the geolocation data, such as Beijing or San Francisco.
Postal Code The postal code or zip code of the geolocation data.
Continent Code The continent code of the geolocation data. For example, NA for North America
and AS for Asia.
Using Visualization Geolocation Using Geolocation Visualization with Forensics Products to View Security Data | 487
The iplocations.txt file must be placed in the Geodata folder of the kffdata folder on the server.
User Name
Process Name
Path
Host Name
IP Address
Coordinates
Ports
Using Visualization Geolocation Using Geolocation Visualization with Forensics Products to View Security Data | 488
Chapter 35
Customizing the Examiner Interface
Add or remove panes from the current tab using the View menu. Click View and click the unchecked pane to add
it to the current view, or click a checked item on the list to remove that pane from the current view.
Customizing the Examiner Interface About Customizing the Examiner User Interface | 489
The Tab Layout Menu
Use the options in the Tab Layout menu to save changes to tabs, restore original settings, and lock settings to
prevent changes.
The following table describes the options in the Tab Layout menu.
Option Description
Save Saves the changes made to the current tab.
Restore Restores the Examiner window to the settings from the last saved layout. Custom
settings can be restored.
Reset to Default Sets the window to the setting that came with the program. Custom settings will be lost.
Lock Panes Locks the panes in place so that they cannot be moved until they are unlocked.
Add New Tab Adds a new tab to the window. The new tab will be like the one selected when this
Layout option is used. Customize the tab as needed and save it for future use.
Docking Icons
Docking
Icon Description
Docks the view panel to the top half of the tab.
Docking
Icon Description
Docks the view panel to the bottom half of the tab.
Docks the view panel to the top, right, left, bottom, or center of the pane. When docked to
the center, the new pane overlaps the original pane, and both are indicated by tabs on the
perimeter of the pane.
Docks the view panel to the top, right, left, or bottom of the tree pane. The tree panes cannot
be overlapped.
Locks the panels in place, making them immovable. When the lock is applied, the blue box
turns grey. This button is found on the toolbar.
Note: Features marked with diamonds are mutually exclusive; only one can exist on a tab at a time.
Features with check marks can coexist in more than one instance on a tab.
To remove tabs
1. Highlight the tab to be removed
2. Click View > Tab Layout > Remove.
Column settings are also used to define which file information appears in case reports. Use custom column
settings in defining reports to narrow the File List Properties information provided in the Bookmark and File List
sections.
Additional states have been added to keep track of users’ Label selections. For example, if the user has already
checked a Label name, that filename and path will turn red, and it remains red as long as it remains different
from the original status. Clicking it again will cycle it back to its original status and its color will return to black.
Note: Checking the Label name before choosing Apply Labels To, unchecks the Label name. Choose Apply
Labels To first, then check or select the files to apply the Label to.
Button Action
New Create a new column template. This option opens a blank template you can use to
create a new template from scratch.
Edit Edit existing custom column templates. Use this option to make changes to an
existing custom column template. You cannot edit default templates.
Delete Delete existing custom column templates. You cannot delete default templates
Import Import custom column templates XML files from other cases. Use Import to utilize
a template from another source or that was created after you created your case.
Export Export custom column templates to XML files for others to use. Export a custom
column to use in another system.
Make Shared Case Administrators can Share custom column templates to the database so they
are available to all new cases. Once custom columns are Shared, the Application
Administrator manages them. However, the original remains in the case so the
Case Administrator has full control of it. Case Reviewers do not have sufficient
permissions to create custom column templates.
2. To define column settings using a new or copied template, click New, Edit, or Copy Selected to open
the familiar Column Settings dialog.
3. In the Column Template Name field, type a name for the template.
4. In the Available Columns list, select a category from which you want to utilize a column heading.
You can add the entire contents of a category or expand the category to select individual headings.
You can move any item in the list up or down to position that column in the File List view. The top
position is the first column from left to right.
5. When you are finished defining the column setting template, click OK to save the template and return to
the Manage Column Settings dialog.
6. Highlight the template you just defined, and click Apply to apply those settings to the current File List
view.
If you import a custom column sheet that contains a column that you do not want to import, but you do not want
to delete the column, you can type IGNORE in the first row of the column.
Note: You can overwrite user created column setting files by giving the column template the same
name as an existing user created template. Be sure you provide a file name that is unique if you
don’t want to overwrite the original or existing column template file.
6. In the Save As type text box, click the drop-down and choose CSV (Comma delimited) (*.CSV)
7. In the File List items to export group box, click All Highlighted.
8. Click Column Settings.
9. In the Column Settings dialog box, ensure that Item Number is in the Selected Columns list. If
desired, you can move it to the top of the list, or remove all other columns headings that are listed in the
Selected Columns list.
10. Click OK.
11. In the Choose Columns drop-down, select the Column Setting you just created or modified.
12. Click Save.
13. Open the CSV file that you just created with the Export File List.
14. Copy the item numbers in the Item Number column.
15. In the opened CCexample.CSV file, paste the item numbers in the OBJECTID column.
16. Edit the column headings the way you want them.
For example, the spreadsheet column, “MyCustomInt:INT” displays as the column heading
“MyCustomInt” in the File List view.
Edit “MyCustomInt” to be whatever you want:
The INT portion allows integer values in the column
MyCustomBool:BOOL column allows true or false values
CustomStr:STRING heading allows text values.
17. Save the CCExample.CSV file with a new name, and in a place where you have rights to save and
access the file as needed.
18. Close the FileList.CSV (or whatever name you gave the Export File List file.
19. On the Evidence menu, click Import Custom Column File.
20. Navigate to the CSV file that you just saved, then click Open.
21. In the “Custom column data imported” dialog box, click OK.
22. On the Manage menu, click Column > Manage Columns, or click Column Settings on the File List
toolbar.
23. Choose a column template to copy, or create a new one.
24. Add the custom column headings to a new or existing template.
25. In the Column Settings dialog box, click OK.
26. In the Manage Column Settings dialog box, select the template that contains the custom headings, and
then click Apply.
Note: The data is not deleted; only the custom columns that allowed you to see that specific data are deleted.
Within each grouping, you can choose from a list of various column headings that you want to add. You can also
delete selected columns or arrange them in the order you want them to appear in the File List view.
To view the name, short name, and description of each available column
1. On the Manage menu, click Columns > Managed Shared Columns.
2. Do one of the following:
Select a category.
Open a category and select an individual column setting name.
3. Do either of the following:
Click Add >> to move your selection to the Selected Columns list.
Double-click your selection to add it to the Selected Columns list.
4. Do either of the following.
Use standard Windows column sizing methods to resize the column margins, thereby allowing you to
read each description.
Click anywhere in the Select Columns list box, and then hover over a column description to see the
entire description.
5. Click OK.
When you view data in the File List view, use the type-down control feature to locate the information you
are looking for. Sort on the Filename column, then select the first item in the list.
Type the first letter of the filename you are searching for. As you continue to type, next filename that
matches the letters you have typed will be highlighted in the list.
If at some point you see the file you are looking for displayed in the list, simply click on it. You may type
the entire file name for the exact name to be fully highlighted in the list.
A new column has been added, “Included by Filters” within the All Features group. This column tells you
which filter caused a file to display in the File List pane. The Included by Filters column is not sortable.
In the past, the “Processed” column was able to display only two states, Yes, and No. It has been
changed to display different states, such as the following:
P = Default (may be a null value)
C = Complete
You can create a case report about the relevant information of a case any time during or after the investigation
and analysis of a case. Reports can be generated in different formats, including HTML and PDF. The PDF report
is designed specifically for printing hard copies with preserved formatting and correct organization. The HTML
report is better for electronic distribution.
Option Description
Case Information See Adding Case Information to a Report (page 501)
Graphics See Adding Graphics Thumbnails and Files to a Report (page 504)
File Path List See Adding a File Path List to a Report (page 506)
File Properties See Adding a File Properties List to a Report (page 507)
ListSee
3. When you have completed defining the report, click OK to open the Report Output options dialog.
See Selecting the Report Output Options (page 510)
For information about other items you can define for a report, See Creating a Case Report (page 500).
For information about other items you can define for a report, See Creating a Case Report (page 500).
Note: The sort options you see are determined by the Columns Template you have selected
For more information on customizing columns, see Customizing File List Columns (page 494).
For information about other items you can define for a report, See Creating a Case Report (page 500).
Working with Evidence Reports Adding Graphics Thumbnails and Files to a Report | 504
Adding a Video to a Report
The Video section in the Report Options dialog lets you define lets you define whether-or-not to create a section
in the report that displays the thumbnail images and/or the rendered MP4 files of the case videos. You can also
choose to include a link to the original full sized version of the video. These thumbnails and MP4 videos are
created during evidence processing or during additional analysis.
For information about other items you can define for a report, See Creating a Case Report (page 500).
Working with Evidence Reports Adding a File Path List to a Report | 506
Adding a File Properties List to a Report
The File Properties dialog lets you create a section in the report that lists the file properties of files in selected
categories. Several options let you make the File Properties List in the report as specific or as general as you
want it to be.
For information about other items you can define for a report, See Creating a Case Report (page 500).
Note: The sort options you see are determined by the Columns Template you have selected
For more information on customizing columns, see Customizing File List Columns (page 494).
Working with Evidence Reports Adding a File Properties List to a Report | 507
Adding Registry Selections to a Report
If your drive image contains Registry files, you can include them in your report.
When creating a Report that includes Registry files, a DAT extension is being added to the link. If the link does
not open in the report, it can be exported and opened in Notepad.
For information about other items you can define for a report, See Creating a Case Report (page 500).
Note: User-generated reports must exist in the case before generating the report, otherwise, this option
is disabled. These reports are generated in Registry Viewer and can be collected from the
Registry data found on the source drive.
5. Mark the box Select Auto Reports, to view and select which registry reports to include in the report
from those that were generated automatically based on the registry reports selection in Case Manager
> Case > New > Detailed Options > Evidence Refinement.
Note: If you did not select this option during pre-processing, this option is disabled in the Report
Options dialog.
The file is saved in the case folder under a Screenshots sub-folder. (Do not manually rename the
captured files, otherwise the Report dialog will not find them.)
The file is saved in the original size and in a smaller size that may be needed to fit in a report.
The name and description of the file is saved in the database so that they can be displayed in the Report
Options dialog.
2. Click and drag the + cursor to select the area that you want to capture.
3. In the Screen Capture Info dialog, give the screen capture file a name.
4. Enter a description.
This is recorded with the filename in the database.
5. Click Save.
6. To cancel a screen capture, click Esc.
Working with Evidence Reports Adding Screen Captures from Examiner | 509
Selecting the Report Output Options
The Report Output dialog lets you select the location, language, report formats, and other details of the report.
You can also recreate the directory structure of exported items.
For information about other items you can define for a report, See Creating a Case Report (page 500).
4. Indicate the formats for publishing the report. You can choose any or all of the output formats.
To view a report made in any of the supported formats, you must have the appropriate application
installed on your computer. Options are as follows:
Note: Some report output formats require J#, either 1.1 or 2.0. If you select RTF format, for example, and J# is
not installed, you will see an error.
Working with Evidence Reports Selecting the Report Output Options | 510
6. Under HTML Report Customization, choose from the following:
If you wish to use your own custom graphic or logo, mark the Use custom logo graphic box, then
browse to the file and select it. Use GIF, JPG, JPEG, PNG, or BMP file types.
Ifyou wish to use a custom CSS file, mark the Use custom CSS box. Select the folder where the
custom CSS files have been saved. Click OK. The folder you selected displays in the “Use Custom
CSS” text box.
7. Click OK to run the report.
If the report folder you selected is not empty, you will see the following error message:
Choose to Delete or Archive the contents of the folder, or to Cancel the report. Delete the contents of
the current destination folder, or change to a different destination folder, then recreate the report or
import it if you saved it during creation.
Note: If you are outputting a Concordance, Relativity, or Generic load file, and include rendered images, you will
also get an OPT and LFP file in the export directory.
9. Choose an Encoding option for your load file from the following:
ANSI
UTF-8
UTF-16
10. If you are creating a Concordance, Generic, Introspect, or Relativity load file, you need to specify the
following options:
Choose whether to Include a Header Row by clicking on the checkbox.
Select the Multi-Entry Separator.
Select the Field Mapping.
Select the Text Identifier.
Select the Newline.
11. For the Browser Briefcase, CaseVantage, EDRM, iConect, Ringtail, or Summation eDII options, select
only the Multi-Entry Separator.
12. In the Available Fields pane, select the options you want to appear in your report. Highlight each field
you would like to include and click the >> button to move it to the Selected Fields pane. If you would
like to change the order of appearance for these items in the report, highlight the item you would like to
move in the Selected Fields pane and click on the Up or Down button until it is in the right place.
13. The Files To Include tab contains the following three options:
Export Native Files
When selected, this option allows you to export the emails contained in PST/NSF in one of three
different ways:
OUtput a reduced version of the original PST/NSF file
Output messages as individual HTML/RTF files
Output messages as individual MSG files
14. When finished selecting these options, click OK in both the Load File Export Options and Report Output
dialogs.
15. The progress of load file generation will appear in the Data Processing Status dialog. Once the load file
is generated, you can find it in the folder entered in Step 3. This folder will contain the load file as well as
the original files for any items included in the report.
Note: Best results occur when you select the Summation defaults and the Enable Standard Viewing feature
during processing when creating the case.
Note: When selected, the finished HTML and/or PDF reports open automatically.
You can process only one set of reports at a time. If you select the options to create several different
report formats before clicking OK to generate the report, all will process concurrently. However, if you
start that process and then decide to create a new report, you will not be able to until the current report
is finished generating.
If you start another report too soon, you will be prompted to wait, if you chose to create either HTML or
PDF format for the report, it will automatically open when creation is complete. Otherwise, to view the
report, click Yes when prompted.
For reports to utilize the cascading style sheets, three CSS files are necessary, and must all be located in the
specified CSS folder:
Common.CSS
Bookmarks.CSS
Navigation.CSS
The original CSS files are found in the following path if no changes were made to the default:
To utilize the customized CSS files, click Use custom CSS, and select the path to the folder where the
customized CSS files are stored.
When CSS is selected, Reports checks for those files in the specified directory. If any of the three files is missing
you are notified and the report does not proceed.
Note: The UI option consists of a check box and a text path string. The path string points to the path directory
that contains the three needed CSS files.
Note: The UI options settings are persistent per Windows login user. Thus, your selections will be persistent
across the Case List for the currently authenticated user.
Important: In versions, the cascading style sheets have been updated for a better user experience. Updates
include persistent highlighting on the navigation tree (so examiners know which item they are
viewing) and better organization of data within the report.
However, if you have created personalized templates in previous versions, you will need to re-create
them for 5.1.
All previously distributed reports should be retracted to keep all recipients current.
Note: If you want to keep a previous report, save the new report to a different folder that is empty.
After you create the report, write only the contents from the root of the report folder, and not the report folder
itself. The autorun automatically launches the report’s main page (index.htm) using the default browser when the
CD is read on a Windows computer.
When burning some reports to a CD, some Registry Viewer Auto Reports links may be broken, where
they work when viewing on the computer. To avoid this issue, make sure that longer Joliet filenames are
enabled when burning report to a CD.
To launch the report, the computer must be configured to automatically execute autorun files.
If you burn the folder that contains the report to the CD or DVD, the autorun will not be at the root of the
disk, and will not work properly.
To prevent broken links to report files, use File Item numbers instead of names to keep paths short, and /
or use the Joliet file naming to allow longer file paths.
Reference
This part contains additional reference information and contains the following appendices
Working with Windows Registry Evidence (page 518)
Supported File Systems and Drive Image Formats (page 527)
Recovering Deleted Material (page 530)
Managing Security Devices and Licenses (page 532)
Configuring a Multi-box Setup (page 551)
AccessData Distributed Processing (page 554)
Reference | 517
Chapter 37
Working with Windows Registry Evidence
This appendix contains information about the Windows Registry and what information can be gathered from it for
evidence. It includes the following topics:
The files that make up the registry differ depending on the version of Windows. The tables below list the registry
files for each version of Windows, along with their locations and the information they contain.
Working with Windows Registry Evidence Understanding the Windows Registry | 518
Windows 9x Registry Files
The following table describes each item on the Windows 9x registry files.
Working with Windows Registry Evidence Understanding the Windows Registry | 519
Windows XP Registry Files
The following table describes each item in the Windows XP registry files.
The top level of the tree is divided into hives. A hive is a discrete body of keys, subkeys, and values that is rooted
at the top of the registry hierarchy. On Windows XP systems, the registry hives are as follows:
HKEY_CLASSES_ROOT (HKCR)
HKEY_CURRENT_USER (HKCU)
HKEY_LOCAL_MACHINE (HKLM)
HKEY_USERS (HKU)
HKEY_CURRENT_CONFIG (HKCC)
HKEY_DYN_DATA (HKDD)
HKEY_LOCAL_MACHINE and HKEY_USERS are the root hives. They contain information that is used to
create the HKEY_CLASSES_ROOT, HKEY_CURRENT_USER, and HKEY_CURRENT_CONFIG hives.
HKEY_LOCAL_MACHINE is generated at startup from the system.dat file and contains all the configuration
information for the local machine. For example, it might have one configuration if the computer is docked, and
another if the computer is not docked. Based on the computer state at startup, the information in
HKEY_LOCAL_MACHINE is used to generate HKEY_CURRENT_CONFIG and HKEY_CLASSES_ROOT.
HKEY_USERS is generated at startup from the system User.dat files and contains information for every user on
the system.
Based on who logs in to the system, the information in HKEY_USERS is used to generate
HKEY_CURRENT_USER, HKEY_CURRENT_CONFIG, and HKEY_CLASSES_ROOT.
Keys and sub-keys are used to divide the registry tree into logical units off the root.
Working with Windows Registry Evidence Understanding the Windows Registry | 520
When you select a key, Registry Editor displays the key’s values; that is, the information associated with that
key. Each value has a name and a data type, followed by a representation of the value’s data. The data type tells
you what kind of data the value contains as well as how it is represented. For example, values of the
REG_BINARY type contain raw binary data and are displayed in hexadecimal format.
Additional Considerations
If there are multiple users on a single machine, you must be aware of the following issues when conducting a
forensic investigation:
Working with Windows Registry Evidence Understanding the Windows Registry | 521
If there are individual profiles for each user on the system, you need to locate the USER.DAT file for the
suspects.
If all the users on the system are using the same profile, everyone’s information is stored in the same
USER.DAT file. Therefore, you will have to find other corroborating evidence because you cannot
associate evidence in the USER.DAT file with a specific user profile.
On Windows 9x systems, the USER.DAT file for the default user is used to create the USER.DAT files for
new user profiles. Consequently, the USER.DAT files for new profiles can inherit a lot of junk.
To access the Windows registry from an image of the suspect’s drive, you can do any of the following:
Load the suspect’s drive image and export his or her registry files to view them in Registry Editor.
Mount a restored image as a drive, launch Registry Editor at the command line from your processing
machine, export the registry files from the restored image, then view them in a third-party tool.
Note: The problem with this method is that you can only view the registry as text. Registry Editor
displays everything in ASCII so you can’t see hex or binary values in the registry.
Use Registry Viewer. Registry Viewer integrates seamlessly with the Examiner to display registry files
within the image and create reports.
Important: Registry Viewer shows everything you normally see in live systems using the Windows Registry
Editor. However, unlike Registry Editor and other tools that use the Windows API, Registry Viewer
decrypts protected storage information so it displays values in the Protected Storage System Provider
key (PSSP). Registry Viewer also shows information that is normally hidden in null-terminated keys.
Note: Passwords and MRU lists are not saved unless these options are enabled.
Important: Because normal seizure procedures require that there be no alteration of the suspect’s computer in
any way, you must be able to articulate why you closed any active applications before pulling the plug
on the suspect’s computer. Sometimes it is better to simply pull the plug on the computer; other times,
it makes more sense to image the computer in place while it is on. It may depend on what is the most
important type of data expected to be found on the computer.
For example, Windows updates some program information in the registry when the changes are
made. Other information is not updated until a program is closed. Also, if the computer’s drive is
encrypted and you cannot decrypt it or don’t have the Key or password, you may have no choice
except to image the live drive.
The Registry Quick Find Chart shown below gives more information.
Working with Windows Registry Evidence Understanding the Windows Registry | 522
Windows XP Registry Quick Find Chart
The following charts describe common locations where you can find data of forensic interest in the Windows
Registry.
System Information
Windows XP Registry System Information
Working with Windows Registry Evidence Windows XP Registry Quick Find Chart | 523
Networking
Windows XP Registry Networking Information
User Data
Windows XP Registry User Data
Working with Windows Registry Evidence Windows XP Registry Quick Find Chart | 524
Windows XP Registry User Data (Continued)
Working with Windows Registry Evidence Windows XP Registry Quick Find Chart | 525
User Application Data
Windows XP Registry User Application Data
Working with Windows Registry Evidence Windows XP Registry Quick Find Chart | 526
Chapter 38
Supported File Systems and Drive Image
Formats
This appendix lists the file systems and image formats that are analyzed. It includes the following topics:
File Systems
The following table lists AccessData identified and analyzed file systems.
Supported File Systems and Drive Image Formats File Systems | 527
Whole Disk Encrypted Products
The following table lists identified and analyzed Whole Disk Encryption (WDE) decryption products (these all
require the investigator to enter the password, AccessData forensic products don’t “crack” these).
Supported File Systems and Drive Image Formats Whole Disk Encrypted Products | 528
CD and DVD Image Formats
The following table lists identified and analyzed CD and DVD image formats.
Supported File Systems and Drive Image Formats CD and DVD Image Formats | 529
Chapter 39
Recovering Deleted Material
You can find deleted files on supported file systems by their file header.
The file’s directory entry provides the file’s starting cluster (C) and size. From the size of the file and the starting
cluster, the total number of clusters (N) occupied by the file are computed.
The File Allocation Table (FAT) is examined and the number of unallocated clusters are counted, starting at C
(U). The recovered file [min (N, U)] clusters starting at C are then assigned.
If the deleted file was fragmented, the recovered file is likely to be incorrect and incomplete because the
information that is needed to find subsequent fragments was wiped from the FAT system when the file was
deleted.
If present, the long filename (LFN) entries are used to recover the first letter of the deleted file’s short filename. If
the LFN entries are incomplete or absent, it uses an exclamation mark (“!”) as the first letter of the filename.
The volume free space for deleted directories that have been orphaned are searched with a meta-carve process.
An orphaned directory is a directory whose parent directory or whose entry in its parent directory has been
overwritten.
If the deleted file’s parent directory exists, the recovered file is shown in the directory where it originally existed.
Deleted files whose parent directories were deleted are shown in their proper place as long as their parent
directory’s MFT entry has not been recycled.
Ext2
Nodes that are marked deleted are searched for. The link count is zero and the deletion timestamp is nonzero.
For each deleted inode, the block pointers are processed and blocks are added to the deleted file. However, if an
indirect block is marked allocated or references an invalid block number, the recovered file is truncated at that
point because the block no longer contains a list of blocks for the file that the application is attempting to recover.
The filenames for files deleted on ext2 systems are not recovered. Instead, deleted files are identified by inode
number because ext2 uses variable-length directory entries organized in a linked list structure. When a file is
deleted, its directory entry is unlinked from the list, and the space it occupied becomes free to be partially or
completely overwritten by new directory entries. There is no reliable way to identify and extract completely
deleted directory entries.
Ext3
Deleted files from ext3 volumes are not recovered because ext3 zeroes out a file’s indirect block pointers when it
is deleted.
HFS
Deleted files from HFS are not recovered.
This appendix includes information AccessData product licenses, Virtual CodeMeter activation, and Network
License Server configurations.
You must install the security device software and drivers before you can manage licenses with LicenseManager.
This section explains installing and using the CodeMeter Runtime software and the License Manager.
Note: The CodeMeter software is automatically installed as part of the FTK suite.
Managing Security Devices and Licenses Installing and Managing Security Devices | 532
4. Click Download Now.
5. Save the installation file to your download directory or other temporary directory on your drive.
To install CodeMeter
1. Do one of the following:
Launch the installer from the FTK installer by doing the following:
1a. Launch the FTK installer Autorun.exe file.
1b. Click Other Products.
1c. Click Install License Manager.
Launch the installer from the download by doing the following:
1a. Navigate to, and double-click the installation file.
2. Wait for the Preparing to Install processes to complete.
3. In the Welcome dialog, click Next.
4. Read and accept the License Agreement
5. Enter User Information.
6. Click Next.
7. Select the features you want to install.
8. Click Next.
9. Click Install.
10. Click Finish.
11. Click OK.
CodeMeter Error
If you are not using NLS for your security device configuration, after clicking No, you will see the following
additional message.
To remedy, click OK, then install the correct CodeMeter Runtime software, and connect the CmStick or run
License Manager to generate your Virtual CmStick. Then, restart FTK.
Managing Security Devices and Licenses Installing and Managing Security Devices | 533
Installing LicenseManager
LicenseManager lets you manage product and license subscriptions using a security device or device packet
file.
You can can access the LicenseManager installer from the Web or from the FTK installer.
To install LicenseManager
1. Do one of the following:
Launch the installer from the FTK installer by doing the following:
1a. Launch the FTK installer Autorun.exe file.
1b. Click Other Products.
1c. Click Install License Manager.
Launch the installer from the download by doing the following:
1a. Navigate to, and double-click the installation file.
2. Wait for the Preparing to Install processes to complete.
3. Click Next on the Welcome screen
4. Read and accept the License Agreement.
5. Click Next.
6. Accept the default destination folder, or select a different one.
7. Click Next.
8. In the Ready to Install the Program dialog, click Back to review or change any of the installation
settings. When you are ready to continue, click Install.
9. Wait while the installation completes.
10. If you want to launch LicenseManager after completing the installation, mark the
Launch AccessData LicenseManager check box.
11. Select the Launch AccessData LicenseManager check box to run the program upon finishing the
setup. The next section describes how to run LicenseManager later.
12. Click Finish to finalize the installation and close the wizard.
Note: If using a Keylok dongle, and LicenseManager either does not open or displays the message,
“Device Not Found”
Note: If using a CodeMeter Stick, and LicenseManager either does not open or displays the message,
“Device Not Found”
13. Make sure the CodeMeter Runtime 4.20b software is installed. It is available at www.accessdata.com/
support. Click Downloads and browse to the product. Click on the download link. You can Run the
product from the Website, or Save the file locally and run it from your PC. Once the CodeMeter Runtime
software is installed and running, you will see a gray icon in your system tray.
14. Make sure the CodeMeter Stick is connected to the USB port.
If the CodeMeter Stick is not connected, LicenseManager still lets you to manage licenses using a security
device packet file if you have exported and saved the file previously.
Note: Although you can run LicenseManager using a packet file, AccessData products will not run with a packet
file alone. You must have the CmStick or dongle connected to the computer to run AccessData products
that require a license.
LicenseManager displays license information, allows you to add licenses to or remove existing licenses from a
dongle or CmStick. LicenseManager, and can also be used to export a security device packet file. Packet files
can be saved and reloaded into LicenseManager, or sent via email to AccessData support.
In addition, you can use LicenseManager to check for product updates and in some cases download the latest
product versions.
LicenseManager displays CodeMeter Stick information (including packet version and serial number) and
licensing information for all AccessData products. The Purchase Licenses button connects directly to the
AccessData website and allows you to browse the site for information about products you may wish to purchase.
Contact AccessData by phone to speak with a Sales Representative for answers to product questions, and to
purchase products and renew licenses and subscriptions.
Item Description
Program Lists all AccessData products installed on the host.
Installed Version Displays the version of each AccessData product installed on the host.
Newest Version Displays the latest version available of each AccessData product installed on the host.
Click Newest to refresh this list.
Product Notes Displays notes and information about the product selected in the program list.
AccessData Link Links to the AccessData product page where you can learn more about AccessData
products.
The following buttons provide additional functionality from the Installed Components tab:
Button Function
Help Opens the LicenseManager Help web page.
Button Function
Install Newest Installs the newest version of the programs checked in the product window, if that
program is available for download. You can also get the latest versions from our website
using your Internet browser.
Newest Updates the latest version information for your installed products.
About Displays the About LicenseManager screen. Provides version, copyright, and trademark
information for LicenseManager.
Done Closes LicenseManager.
Use the Installed Components tab to manage your AccessData products and stay up to date on new releases.
Column Description
Program Shows the owned licenses for AccessData products.
Expiration Date Shows the date on which your current license expires.
Status Shows these status of that product’s license:
None: the product license is not currently owned
Days Left: displays when less than 31 days remain on the license.
Never: the license is permanently owned. This generally applies to Hash Tables and
Portable Office Rainbow Tables.
Name Shows the name of additional parameters or information a product requires for its license.
Value Shows the values of additional parameters or information a product contained in or
required for its license.
Show Unlicensed When checked, the License window displays all products, whether licensed or not.
The following license management actions can be performed using buttons found on the License tab:
Button Function
Remove License Removes a selected license from the Licenses window and from the CodeMeter Stick or
dongle. Opens the AccessData License Server web page to confirm success.
Refresh Device Connects to the AccessData License Server. Downloads and overwrites the info on the
CodeMeter Stick or dongle with the latest information on the server.
Reload from Device Begins or restarts the service to read the licenses stored on the CodeMeter Stick or
dongle.
Button Function
Release Device Click to stop the program reading the dongle attached to your machine, much like
Windows’ Safely Remove Hardware feature. Click this button before removing a dongle.
This option is disabled for the CodeMeter Stick.
Open Packet File Opens Windows Explorer, allowing you to navigate to a .PKT file containing your license
information.
Save to File Opens Windows Explorer, allowing you to save a .PKT file containing your license
information. The default location is My Documents.
Finalize Removal Finishes the removal of licenses in the unbound state. Licenses must be unbound from the
CmStick or dongle before this button takes effect.
View Registration Displays an HTML page with your CodeMeter Stick number and other license information.
Info
Add Existing License Allows you to bind an existing unbound license to your CodeMeter Stick, through an
internet connection to the AccessData License Server.
Purchase License Brings up the AccessData product page from which you can learn more about AccessData
products.
About Displays the About LicenseManager screen. Provides version, copyright, and trademark
information for LicenseManager.
Done Closes LicenseManager.
Note: In general, the best place to save the .PKT files is in the AccessData LicenseManager folder. The
default path is C:\Program Files\AccessData\Common Files\AccessData LicenseManager\.
Removing a License
To remove (unassociate, or unbind) a product license
1. From the Licenses tab, mark the program license to remove.
This action activates the Remove License button below the Program list box.
2. Click Remove License to connect your machine to the AccessData License Server through the
internet.
3. When you are prompted to confirm the removal of the selected licenses from the device, click Yes to
continue, or No to cancel.
4. Several screens appear indicating the connection and activity on the License Server, and when the
license removal is complete, the following screen appears.
5. Click OK to close the message box.
Another internet browser screen appears from LicenseManager with a message that says, “The
removal of your licenses from Security Device was successful!” You may close this box at any time.
Adding a License
To add a new or released license
1. From the Licenses tab, under Browser Options, click Add Existing License.
The AccessData LicenseManager Web page opens, listing the licenses currently bound to the
connected security device, and below that list, you will see the licenses that currently are not bound to
any security device. Mark the box in the Bind column for the product you wish to add to the connected
device, then click Submit.
2. An AccessData LicenseManager Web page will open, displaying the following message, “The
AccessData products that you selected has been bound to the record for Security Device nnnnnnn
within the Security Device Database.
“Please run LicenseManager’s “Refresh Device” feature in order to complete the process of binding
these product licenses to this Security Device.” You may close this window at any time.
3. Click Yes if LicenseManager prompts, “Were you able to associate a new product with this device?”
4. Click Refresh Device in the Licenses tab of LicenseManager. Click Yes when prompted.
You will see the newly added license in the License Options list.
If you cannot connect to the Internet, the easiest way to move licenses from one dongle to another is to
physically move the dongle to a computer with an Internet connection, add or remove product licenses as
necessary using LicenseManager, and then physically move the dongle back to the original computer. However,
Updating Products
You can use LicenseManager to check for product updates and download the latest product versions.
Note: Some products are too large to download, and are not available. A notification displays if this is the case.
Purchase product licenses through your AccessData Sales Representative. Call 801-377-5410 and follow the
prompt for Sales, or send an email to [email protected].
Note: Once a product has been purchased and appears in the AccessData License Server, add the product
license to a CodeMeter Stick, dongle, or security device packet file by clicking Refresh Device.
Introduction
A Virtual CodeMeter (VCM) allows the user to run licensed AccessData products without a physical CodeMeter
device. A VCM can be created using AccessData License Manager, but requires the user to enter a
Confirmation Code during the creation process.
Preparation
Contact your AccessData sales rep to order a VCM confirmation code.
Install CodeMeter Runtime 4.10b or newer (available on the AccessData download page).
Install the latest release of License Manager (available on the AccessData download page).
The following steps are to be run on the system where you want to permanently attach the VCM.
Note: Once created, the VCM cannot be moved to any other system.
AD Lab WebUI and eDiscovery administrators, please also follow steps outlined under in Additional
Instructions for AD Lab WebUI and eDiscovery (page 545) in order to enable VCM licensing on the
AccessData License Service.
Note: When creating a VCM on Windows Server 2003 or 2008, please refer to the special set of steps
written for those platforms. See Creating a Virtual CM-Stick with Server 2003/2008 Enterprise
Editions (page 544).
Managing Security Devices and Licenses Virtual CodeMeter Activation Guide | 543
Setting up VCM for Offline Systems
You can setup a Virtual CodeMeter on a system that is not connected to the internet (offline). You must also have
one machine that connects to the internet to perform certain steps. This section details what to do on which
machine.
Note: When creating a VCM on Windows Server 2003 or 2008 Enterprise Edition, please refer to the
special set of steps written for those platforms. See Creating a Virtual CM-Stick with Server 2003/
2008 Enterprise Editions (page 544).
Managing Security Devices and Licenses Virtual CodeMeter Activation Guide | 544
To Create an Empty CodeMeter License Container
1. On the Server 2003/2008 machine, unplug any CodeMeter devices.
2. Open the CodeMeter Control Center. Make sure the window on the License tab is, empty indicating that
no licenses are currently loaded.
3. Select File > Import License.
4. Browse to the License Manager program files directory.
32 bit systems: C:\Program Files\AccessData\LicenseManager\
64 bit systems: C:\Program Files (x86)\ AccessData\LicenseManager\
5. Highlight the TemplateDisc5010.wbb file, then click Import.
6. Click the Activate License button.
7. When the CmFAS Assistant opens, click Next.
8. Select Create license request, and click Next.
9. Confirm the desired directory and filename to save .WibuCmRaC. (Example: Test1.WibuCmRaC)
10. Click Commit.
11. Click Finish.
Managing Security Devices and Licenses Virtual CodeMeter Activation Guide | 545
To enable AD Lab WebUI and eDiscovery to use VCM
1. Open Registry Editor.
2. Navigate to the following key:
HKEY_LOCAL_MACHINE\SOFTWARE\AccessData\Products
Add the following DWORD registry string to the key and set the value to 1:
HKEY_LOCAL_MACHINE\SOFTWARE\AccessData\Products | EnableACTTest
The AccessData License Service will know to expect a VCM when EnableACTTest is set to “1.”
A: Contact your AccessData product sales representative. They will provide you with a VCM confirmation code.
A: A VCM operates in almost exactly the same way as a hardware CodeMeter device, except that they exist as
a file stored on the hard disk. During activation, the VCM file (named with a WBB extension) is tied to the
hardware of the system using unique hardware identifiers. Those unique identifiers make VCMs non-portable.
When AccessData License Manager is launched, it will automatically load the VCM and display its license
information. From there, you can refresh, remove, add existing licenses, etc just the same you would with a
hardware security device.
A: No. Due to the fact that virtual machines are portable and VCMs are not, VCMs are not supported on virtual
machines. Currently it is recommended to use AccessData Network License Service (NLS) to license systems
running as virtual machines. CLICK HERE for more information.
A: The current release of NLS does not support using VCM as a network dongle. AccessData is considering this
support for a future release.
A: If you want to prevent License Manager from automatically loading the VCM you can "unplug" it by stopping
the CodeMeter Runtime Service server and then moving (cut and paste) the WBB file to a new location
(renaming the file does not suffice). By default the WBB file is located at:
32 bit systems:
C:\Program Files\CodeMeter\CmAct\
64 bit systems:
C:\Program Files (x86)\CodeMeter\CmAct\
Q: I have activated a VCM on my system, but now I need to activate it on a different system. What should I do?
Managing Security Devices and Licenses Virtual CodeMeter Activation Guide | 546
A: Since a VCM is uniquely tied to the system on which it is activated, it cannot be moved to any other system. If
you need to activate a VCM on a different system, you need to contact your AccessData Sales Representative.
Q: What if I need to reinstall Windows, format my drive, change my system's hardware, or back up my VCM in
case of a disaster? Will the VCM still work?
A: The VCM can be backed up by simply copying the WBB file to a safe location. It can be restored by copying
the WBB file to the CmAct folder. The VCM cannot be restored without a WBB file. If you do not have a backup
of your WBB file, you will need to get a new confirmation code from your AccessData Sales Representative.
Q: My AccessData product does not seem to recognize the license stored on a VCM. What am I doing wrong?
Managing Security Devices and Licenses Virtual CodeMeter Activation Guide | 547
Network License Server (NLS) Setup Guide
Introduction
This section discusses the installation steps and configuration notes needed to successfully setup an
AccessData Network License Server (NLS).
Note: Click on this link to access the latest version of this guide:
Preparation Notes
CodeMeter Runtime 3.30a or newer must be installed on all Client and Server systems
AccessData License Manager must be used to prepare the network dongle. The system running License
Manager must have internet access and have CodeMeter Runtime installed.
The current release of NLS supports the following versions of Windows:
Windows XP 32/64 bit
Windows Server 2003 32/64 bit
Windows Vista 32/64 bit
Windows Server 2008 R1 32/64 bit
Windows 7 32/64 bit
Windows Server 2008 R2 64 bit
Setup Overview
To setup NLS
1. Download the latest release of NLS located in the utilities section of the AccessData download page.
2. Extract contents of ZIP to a folder of your choice.
3. On the NLS server system, run through the NLS Installation MSI and accept all defaults.
4. Prepare network dongle:
4a. Provide the serial number to AD Support and request to have the “Network Dongle Flag” applied.
4b. Migrate any additional licenses to the network dongle
4c. Refresh the network dongle device using AccessData License Manager.
5. Launch the AccessData product on the NLS client system.
6. Enter the NLS server configuration information:
IP address or hostname of NLS server system
Port 6921
7. Click, OK.
If you encounter any problems, please read the notes below for troubleshooting information.
Managing Security Devices and Licenses Network License Server (NLS) Setup Guide | 548
Network Dongle Notes
AccessData License Manager 2.2.6 or newer should be installed in order to manage licenses on the
network dongle.
Network dongles can hold up to 120 physical licenses. Each License has a capacity to hold thousands of
sub licenses (i.e. Client count or worker count).
Contact AccessData Technical Support to have your CodeMeter device flagged as a Network Dongle
(required for NLS).
The following products support the ability to lease a license from a NLS server:
FTK 2.2.1 and newer
FTK 1.81.2 and newer
Managing Security Devices and Licenses Network License Server (NLS) Setup Guide | 549
FTK Pro 3.2 and newer
PRTK 6.4.2 and newer
DNA 3.4.2 and newer
Registry Viewer 1.5.4 and newer
AD Enterprise 3.0.3 and newer
AD Lab 3.0.4 and newer
AD Lab Lite 3.1.2 and previous
Mobile Phone Examiner 3.0 and newer
Explicit Image Detection (EID) Add-on
Glyph Add-on
Use AccessData License Manager (ver. 2.2.4 or newer) to migrate licenses off other devices and onto a
network device.
When running AccessData products on Windows Vista, 7, or Server 2008 you must choose Run as
administrator at least once in order to lease a license from a NLS server.
If the NLS client application is having trouble leasing a license either from the NLS server, AccessData
recommends that you reset the licensing configuration to default.
To reset the licensing configuration, delete and recreate the NLS registry key located at:
HKEY_LOCAL_MACHINE\SOFTWARE\AccessData\Products\Common
Managing Security Devices and Licenses Network License Server (NLS) Setup Guide | 550
Chapter 41
Configuring a Multi-box Setup
Some configuration changes must be performed manually by the system administrator to properly configure a
multi-box installation. Please note that a multi-box setup requires that all computers be in the same domain.
Configuration Overview
The following steps are required before you can perform multi-box case back ups and restoration.
Create a service account common to all systems involved. See Create a Service Account on page 551.
Share the case folder and assign appropriate permissions. See Share the Case Folder on page 552.
Configure the database services to run under service account. See Configure Database Services on
page 552.
Share back up destination folder with appropriate permissions. See Share the Backup Destination Folder
on page 553.
Note: When prompted to select the backup destination folder, always use the UNC path of that shared folder,
even when the backup destination folder is local.
Choose (or create) a domain user account that will function as the service account. Verify that the chosen
domain user has local administrator privilege on both the Examiner host system and the database host system.
For this example, it is located at the root of the Windows system volume, and the pathname is:
C:\FTK-Cases.
or
postgresql-x86-9.0
3. Open the properties of the service and click the Log On tab.
4. Choose This account.
5. Click Browse to locate the service account username on the local system or domain. Ensure that “From
this location” displays the appropriate setting for the user to be selected. Note that “Entire Directory” is
used to search for a domain user account, while the name of your system will be listed for a workgroup
system user.
6. In the object name box, type in the first few letters of the username and click Check Names. Highlight
the desired username. Click OK when finished.
7. Enter the current password for this account and then enter it again in the Confirm Password box. Click
Apply and then OK.
8. Repeat Steps #3-8 for each database service.
9. Restart database service(s) when finished.
Note: The path to the backup location must be formatted as a UNC path.
The Data Processing window opens, and when the progress bar turns green, the backup is complete. If the Data
Processing window results in a red progress bar (sometimes accompanied by “Error 120”), the most likely cause
is that the database service does not have permission to write to the backup location. Please double check all
the steps listed in this document.
Distributed Processing allows the installation of the Distributed Processing Engine (DPE) on additional
computers in your network, allowing you to apply additional resources of up to three additional computers at a
time to the processing of your cases.
Distributed Processing may not help reduce processing times unless the number of objects to be processed
exceeds 1,000 times the number of cores. For example, on a system with eight cores, the additional distributed
processing engine machines may not assist in the processing unless the evidence contains greater than 8,000
items.
Note: AccessData recommends that you write down the IP addresses for all machines on which the
DPE will be installed.
1g. At the prompt, type exit and press Enter to close the cmd.EXE box.
Note: The domain listed here is not necessarily the correct one to use in installation. To find the correct
domain or workgroup name, right-click My Computer (On Vista or Server 2008, click Computer),
click Properties > Computer Name. The Domain or Workgroup name is listed midway down the
page. Please make a note of it for future use.
To configure Distributed Processing to work with the local Lab Processing Engine
1. In Case Manager, click Tools > Processing Engine Config.
2. In the Configuration tab, enter the appropriate information in each field, according to the following
guidelines:
Hostname/IP: Enter the IP address of the computers where the Distributed Processing Engine is
installed. The computer name can also be used if the name can be resolved.
Port: The default port is 34097. This is the port the processing host will use to communicate with the
remote processing engines.
Add: Adds the computer and port to the list. You can add up to three remote processing engines (for
a total of 4 engines). When the maximum number of DPE machines is reached, the Add button will
become inactive.
Remove: Removes a processing engine from the list of available engines. The localhost engine
cannot be removed.
Enable: Enables the engine for use by the processing host. Until implemented, each engine you add
will be set to enabled (Disabled = False) by default. When implemented, you will be able to change
the selected computer’s status from Disabled to Enabled.
Disable: Makes the engine unavailable for use in processing. When implemented, you will be able to
change the selected computer’s status from Enabled to Disabled. The disabled remote engine will
remain on the list, but will not be used.
Disabled = True: Displays for that engine in the DPE list.
Maintain UI performance while processing: Allows you to decide whether processing speed or UI
performance is more important.
Note: This will slow processing, and when selected, applies to all Remote DPEs.
3. When all DPE machines have been added to the Processing Engine Configuration dialog, click Close.
If you have not yet configured the Distributed Processing Engine on the remote computers, or if you have, but it
is not working properly, you will see a warning.
To correct this
1. On the remote computer having the Distributed Processing Engine installed, click Start.
1a. Right-click My Computer.
1b. Click Manage.
1c. Under System Tools, click Local Users and Groups.
1d. Click Groups.
1e. Double-click Administrators.
1f. Verify that the user account name that was used in installation is in this group.
1g. Click OK to close this dialog.
Note: If a case was originally processed using distributed processing, when a reviewer conducts a live search,
the system will first attempt to use the computer with the distributed processing engine, but if it is not
available, it will use the reviewer’s local computer to conduct the search.
Case ID
Evidence
Job Type
Processes
Job Path
To refresh this information, click the Refresh Now button.