Windows 7: Current Events in the World of Windows Forensics
|
|
- Simon Thornton
- 8 years ago
- Views:
Transcription
1 Windows 7: Current Events in the World of Windows Forensics Troy Larson Senior Forensic Program Manager Network Security, Microsoft Corp.
2 Where Are We Now? Vista & Windows 2008 BitLocker. Format-Wipes the volume. EXFAT. Event Logging format, system, scheme. Virtual Folders & Registry. Volume Shadow Copy. Links, Hard and Symbolic. Change Journal. Recycle Bin. Superfetch.
3 Where Are We Now? Windows 7 & Window 2008 R2 Updated BitLocker. BitLocker To Go. VHDs Boot from, mount as Disks. XP Mode. Flash Media Enhancements. Libraries, Sticky Notes, Jump Lists. Service and Driver triggers. I.E. 8, InPrivate Browsing, Tab and Session Recovery. Even more Volume Shadow Copy.
4 Digital Forensics Subject Matter Expertise Stack Applications e.g., I.E., etc. OS Artifacts File Systems NTFS, FAT32, EXFAT Fvevol.sys Thanks to Eoghan Casey. Mount, Partition & Volume Managers Disk
5 Windows 7 Disk Note disk signature: 2E x1b8-1bb
6 Windows 7 Disk HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 \DiskController\0\DiskPeripheral\0 Diskpart >Automount scrub
7 Vista Disk HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\STORAGE\Volume\ 1&19f7e59c&0&Signature2E140032Offset100000Length114FD00000
8 Partitions and Volumes Applications e.g., I.E., etc. OS Artifacts File Systems NTFS, FAT32, EXFAT Fvevol.sys Mount, Partition & Volume Managers Virtual Hard Drives Create Attach Detach Delete Disk
9 BitLocker: Windows 7 During installing, Windows 7 creates a System Reserved volume enabling set up of BitLocker. In Vista, the System volume was generally 1.5 GB or more.
10 BitLocker: Vista Physical level view of the header of the boot sector of a Vista BitLocker protected volume: 0xEB D D D ër-fve-fs-
11 BitLocker: Windows 7 Physical level view of the header of the boot sector of a Windows 7 BitLocker protected volume: 0xEB D D D ëx-fve-fs-
12 BitLocker: Windows 7 Vista & Windows 2008 cannot unlock BitLocker volumes created with Windows 7 or 2008 R2. Forensics tools may not recognize the new BitLocker volume header. Must use Windows 7 or 2008 R2 to open (and image) BitLocker volumes from Windows 7 or 2008 R2.
13 BitLocker Review or Imaging User Mode Kernel Mode Application File System Driver Fvevol.sys Volume Manager FVEVOL.SYS sits underneath the file system driver and performs all encryption / decryption. Once booted, Windows (and the user) sees no difference in experience. The encryption / decryption happens at below the file system.
14 BitLocker Review or Imaging User Mode Kernel Mode Application File System Driver Fvevol.sys Volume Manager
15 BitLocker Review or Imaging The More/Less information button will provide the BitLocker volume recovery key identification.
16 BitLocker Review or Imaging BitLocker Recovery Key 783F5FF9-18D4-4C64-AD4A- CD3075CB8335.txt: BitLocker Drive Encryption Recovery Key The recovery key is used to recover the data on a BitLocker protected drive. To verify that this is the correct recovery key compare the identification with what is presented on the recovery screen. Recovery key identification: 783F5FF9-18D4-4C Full recovery key identification: 783F5FF9-18D4-4C64-AD4A- CD3075CB8335 BitLocker Recovery Key:
17 BitLocker Review or Imaging Enter the recovery key exactly.
18 BitLocker Review or Imaging Viewed or imaged as part of a physical disk, BitLocker volumes appear encrypted.
19 BitLocker Review or Imaging To view a BitLocker volume as it appears in its unlocked state, address it as a logical volume.
20 BitLocker Review or Imaging
21 File Systems Applications e.g., I.E., etc. OS Artifacts File Systems NTFS, FAT32, EXFAT Fvevol.sys Mount, Partition & Volume Managers Disk
22 File Systems Since Vista SP1, Format wipes while it formats. Diskpart.exe > Clean all
23 File Systems-Vista & Windows 7 NTFS Symbolic links to files, folders, and UNC paths. Beware the Application Data recursion loop. Cf. Link files. Hard links are extensively used (\Winsxs). Disabled by default: Update Last Access Date. Enabled by default: The NTFS Change Journal ($USN:$J). Transactional NTFS ($Tops:$T).
24 File Systems-Vista & Windows 7 The volume header of an EXFAT volume. Do your forensics tools read EXFAT?
25 OS Artifacts Applications e.g., I.E., etc. OS Artifacts File Systems NTFS, FAT32, EXFAT Fvevol.sys Mount, Partition & Volume Managers Disk
26 OS Artifacts Recycle.Bin [Volume]:\$Recycle.Bin $Recycle.Bin is visible in Explorer (view hidden files). Per user store in a subfolder named with account SID. No more Info2 files. When a file is deleted moved to the Recycle Bin it generates two files in the Recycle Bin. $I and $R files. $I or $R followed by several random characters, then original extension. The random characters are the same for each $I/$R pair. $I file maintains the original name and path, as well as the deleted date. $R file retains the original file data stream and other attributes. The name attribute is changed to $R******.ext.
27 OS Artifacts Recycle.Bin Note the deleted date (in blue).
28 OS Artifacts Recycle.Bin
29 OS Artifacts Folder Virtualization Part of User Access Control Standard user cannot write to certain protected folders. C:\Windows C:\Program Files C:\Program Data To allow standard user to function, any writes to protected folders are virtualized and written to C:\Users\[user]\AppData\Local\VirtualStore
30 OS Artifacts Registry Virtualization Virtualize (HKEY_LOCAL_MACHINE\SOFTWARE) Non-administrator writes are redirect to: HKEY_CURRENT_USER\Software\Classes\VirtualStore\MACHINE\SOFTWARE\ Keys excluded from virtualization HKEY_LOCAL_MACHINE\Software\Classes HKEY_LOCAL_MACHINE \Software\Microsoft\Windows HKEY_LOCAL_MACHINE \Software\Microsoft\Windows NT
31 OS Artifacts Registry Virtualization Location of the registry hive file for the VirtualStore Is NOT the user s NTUSER.DAT It is stored in the user s UsrClass.dat \Users\[user]\AppData\Local\Microsoft\Windows\UsrClass.dat Investigation of Vista - Windows 2008 R2 requires the investigator to examine at least two account specific registry hive files for each user account. NTUSER.DAT UsrClass.dat
32 OS Artifacts Libraries
33 OS Artifacts Libraries \Users\[account]\AppData\Roaming\Microsoft\Windows\Libraries.
34 OS Artifacts Libraries Libraries are XML files.
35 OS Artifacts Libraries
36 OS Artifacts Shell The Recent folder contains link files and two subfolders at \User\[Account]\AppData\Roaming\Microsoft\Windows\Recent.
37 OS Artifacts Shell
38 OS Artifacts Shell AutomaticDestination files are in the Structured Storage file format.
39 OS Artifacts Shell
40 OS Artifacts Shell
41 OS Artifacts Chkdsk Logs \System Volume Information\Chkdsk
42 OS Artifacts Superfetch \Windows\Prefetch
43 OS Artifacts Volume Shadow Copy Volume shadow copies are bit level differential backups of a volume. 16 KB blocks. Copy on write. Volume Shadow copy files are difference files. The shadow copy service is enabled by default on Vista and Windows 7, but not on Windows 2008 or 2008 R2. Difference files reside in the System Volume Information folder.
44 OS Artifacts Volume Shadow Copy Shadow copies are the source data for Restore Points and the Restore Previous Versions features. Used in backup operations. Shadow copies provide a snapshot of a volume at a particular time. Shadow copies can show how files have been altered. Shadow copies can retain data that has later been deleted, wiped, or encrypted.
45 OS Artifacts Volume Shadow Copy Volume shadow copies do not contain a complete image of everything that was on the volume at the time the shadow copy was made.
46 OS Artifacts Volume Shadow Copy The Volume Shadow Copy difference files are maintained in \System Volume Information along with other VSS data files, including a new registry hive.
47 OS Artifacts Volume Shadow Copy \System Volume Information\Syscache.hve
48 OS Artifacts Volume Shadow Copy
49 OS Artifacts Volume Shadow Copy
50 OS Artifacts Volume Shadow Copy vssadmin list shadows /for=[volume]:
51 OS Artifacts Volume Shadow Copy
52 OS Artifacts Volume Shadow Copy Shadow copies can be exposed through symbolic links. Mklink /d C:\{test-shadow} \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy3\
53 OS Artifacts Volume Shadow Copy Volume Shadows can be mounted directly as network shares. net share testshadow=\\.\harddiskvolumeshadowcopy11\
54 OS Artifacts Volume Shadow Copy >psexec \\[computername] vssadmin list shadows /for=c: >psexec \\[computername] net share testshadow=\\.\harddiskvolumeshadowcopy20\ PsExec v Execute processes remotely... testshadow was shared successfully. net exited on [computername] with error code 0. >robocopy /S /R:1 /W:1 /LOG:D:\VSStestcopylog.txt \\[computername] \testshadow D:\vssTest Log File : D:\VSStestcopylog.txt...
55 OS Artifacts Volume Shadow Copy Other ways to call shadow copies: \\localhost\c$\users\troyla\downloads ( Yesterday, July 20, 2009, 12:00 AM) \\localhost\c$\@gmt \?
56 OS Artifacts Volume Shadow Copy Shadow copies can be imaged. C:\Users\Troyla\Desktop\fau a\fau\FAU.x64>dd if=\\.\harddiskvolumeshadowcopy11 of=e:\shadow11.dd localwrt The VistaFirewall Firewall is active with exceptions. Copying \\.\HarddiskVolumeShadowCopy11 to E:\shadow11.dd Output: E:\shadow11.dd bytes records in records out bytes written Succeeded! C:\Users\Troyla\Desktop\fau a\fau\FAU.x64>
57 OS Artifacts Volume Shadow Copy Images of shadow copies can be opened in forensics tools and appear as logical volumes.
58 OS Artifacts Volume Shadow Copy Data that has been deleted can be captured by shadow copies and available for retrieval in shadow copy images.
59 OS Artifacts Volume Shadow Copy Every shadow copy data set should approximate the size of the original volume. Amount of case data=(number of shadow copies) x (size of the volume)+(size of the volume). 10 shadow copies = 692 GB
60 Applications I.E. 8 Applications e.g., I.E., etc. OS Artifacts File Systems NTFS, FAT32, EXFAT Fvevol.sys Mount, Partition & Volume Managers Disk
61 Applications I.E. 8 "C:\Program Files (x86)\internet Explorer\iexplore.exe" -private
62 Applications I.E. 8 Cache data appears to be written, then deleted.
63 Applications I.E. 8 Residual cache files from InPrivate browsing.
64 Applications I.E. 8 Tab and session recovery a new source for historical browsing information. \User\[Account]\AppData\Local\Microsoft\Internet Explorer\Recovery
65 Applications I.E. 8 Recovery file: Note the Structured Storage file format.
66 Applications I.E. 8
67 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
1! Registry. Windows System Artifacts. Understanding the Windows Registry. Organization of the Windows Registry. Windows Registry Viewer
1! Registry Understanding the Windows Registry! A database that stores hardware and software configuration information, network connections, user preferences, and setup information Windows System Artifacts
More informationEnCase 7 - Basic + Intermediate Topics
EnCase 7 - Basic + Intermediate Topics Course Objectives This 4 day class is designed to familiarize the student with the many artifacts left behind on Windows based media and how to conduct a forensic
More informationBackupAssist v6 quickstart guide
New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet
More informationUltraBac Documentation. UBDR Gold. Administrator Guide UBDR Gold v8.0
UltraBac Documentation UBDR Gold Bare Metal Disaster Recovery Administrator Guide UBDR Gold v8.0 UBDR Administrator Guide UBDR Gold v8.0 The software described in this guide is furnished under a license
More informationBackupAssist v6 quickstart guide
Using the new features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 2 Backing up VSS applications... 2 Restoring VSS applications... 3 System State backup and restore...
More informationIntroduction to BitLocker FVE
Introduction to BitLocker FVE (Understanding the Steps Required to enable BitLocker) Exploration of Windows 7 Advanced Forensic Topics Day 3 What is BitLocker? BitLocker Drive Encryption is a full disk
More informationUser Guide. CTERA Agent. August 2011 Version 3.0
User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission
More informationHow to Troubleshoot the Remote Backup Client log Error Message:
How to Troubleshoot the Remote Backup Client log Error Message: VSS open files Backup failed. Error: Connection is not established with the VSS Requestor, restart the client and try again later. In BCVssOpenFilesProcess
More information16.4.3 Lab: Data Backup and Recovery in Windows XP
16.4.3 Lab: Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment The
More informationHyper-V Protection. User guide
Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 2. Hyper-V protection features... 3 Windows 2012 R1/R2 Hyper-V support... 3 Custom
More informationSystem Image Backup and Recovery
System Image Backup and Recovery Enveloc s new System and Drive Imaging feature is an important part of an effective disaster recovery plan and can allow you to restore a machine after a complete crash
More informationNovaBACKUP. User Manual. NovaStor / November 2011
NovaBACKUP User Manual NovaStor / November 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without
More informationBACKUP & RESTORE (FILE SYSTEM)
Table of Contents Table of Contents... 1 Perform a Backup (File System)... 1 What Gets Backed Up... 2 What Does Not Get Backed Up... 3 Perform a Restore... 4 Perform a Backup (File System) The following
More informationEMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Release 3.0 User Guide P/N 300-999-671 REV 02 Copyright 2007-2013 EMC Corporation. All rights reserved. Published in the USA.
More informationFile System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1
File System Forensics FAT and NTFS 1 FAT File Systems 2 File Allocation Table (FAT) File Systems Simple and common Primary file system for DOS and Windows 9x Can be used with Windows NT, 2000, and XP New
More informationDetermining VHD s in Windows 7 Dustin Hurlbut
Introduction Windows 7 has the ability to create and mount virtual machines based upon launching a single file. The Virtual Hard Disk (VHD) format permits creation of virtual drives that can be used for
More informationChapter 5: Operating Systems Part 1
Name Period Chapter 5: Operating Systems Part 1 1. What controls almost all functions on a computer? 2. What operating systems will be discussed in this chapter? 3. What is meant by multi-user? 4. Explain
More informationHiva-network.com. Microsoft_70-680_v2011-06-22_Kat. Exam A
Exam A Microsoft_70-680_v2011-06-22_Kat QUESTION 1 You have a computer that runs Windows 7. The computer has a single volume. You install 15 applications and customize the environment. You complete the
More informationACTIVE@ UNDELETE 7.0 USER GUIDE
ACTIVE@ UNDELETE 7.0 USER GUIDE COPYRIGHT Copyright 27, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative
More informationForensically Determining the Presence and Use of Virtual Machines in Windows 7
Forensically Determining the Presence and Use of Virtual Machines in Windows 7 Introduction Dustin Hurlbut Windows 7 has the ability to create and mount virtual machines based upon launching a single file.
More informationManaging Applications, Services, Folders, and Libraries
Lesson 4 Managing Applications, Services, Folders, and Libraries Learning Objectives Students will learn to: Understand Local versus Network Applications Remove or Uninstall an Application Understand Group
More information10.3.1.6 Lab - Data Backup and Recovery in Windows XP
5.0 10.3.1.6 Lab - Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment
More informationBasic ShadowProtect Troubleshooting
Level 11, 53 Walker Street North Sydney NSW 2060 Australia t +61 2 9929 9770 f +61 2 9929 9771 w www.storagecraft.com.au Basic ShadowProtect Synopsis This article describes basic ShadowProtect troubleshooting
More informationEMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Version 9.0 User Guide 302-001-755 REV 01 Copyright 2007-2015 EMC Corporation. All rights reserved. Published in USA. Published
More informationJust EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012
Just EnCase Presented By Larry Russell CalCPA State Technology Committee May 18, 2012 What is e-discovery Electronically Stored Information (ESI) Discover or Monitor for Fraudulent Activity Tools used
More informationDIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
More informationNew Technologies File System (NTFS) Priscilla Oppenheimer. Copyright 2008 Priscilla Oppenheimer
New Technologies File System (NTFS) Priscilla Oppenheimer NTFS Default file system for Windows NT, 2000, XP, and Windows Server 2003 No published spec from Microsoft that describes the on-disk layout Good
More informationVSS installation and application
VSS installation and application Sam Lee Version 1.0 (DEC, 2010) 1 QSAN Technology, Inc. http://www.qsantechnology.com White Paper# QWP201010-P300H lntroduction This document introduces how to perform
More informationHW 07: Ch 12 Investigating Windows
1 of 7 5/15/2015 2:40 AM HW 07: Ch 12 Investigating Windows Click 'check' on each question or your score will not be recorded. resources: windows special folders ntfs.com Windows cmdline ref how ntfs works
More informationDesigning and Deploying Connected Device Solutions for Small and Medium Business
Designing and Deploying Connected Device Solutions for Small and Medium Business HPATA Connected Devices Study Guide Rev 1.1 Table of Contents 1.1 Describe and recognize common desktop virtualization technologies
More informationMicrosoft Diagnostics and Recovery Toolset 7 Evaluation Guide
Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide White Paper Descriptor This document provides administrators with information and steps-by-step technique for deploying Microsoft Diagnostics
More informationAdministering and Maintaining Windows 7 Course 50292C; 5 Days, Instructor-led
Administering and Maintaining Windows 7 Course 50292C; 5 Days, Instructor-led Course Description This five-day instructor-led course provides students with the knowledge and skills to successfully administer,
More informationWindows XP/Vista/7 Directory Structures
Windows XP/Vista/7 Directory Structures System Partition NTLDR boot.ini ntdetect.com bootsect.dos hiberfil.sys pagefile.sys Boot Partition Boot Documents and Settings (XP) Inetpub PerfLogs Program Files
More informationDOCUMENTATION SHADOWPROTECT - MICROSOFT WINDOWS SYSTEM BACKUP AND RESTORE OPERATIONS
DOCUMENTATION SHADOWPROTECT - MICROSOFT WINDOWS SYSTEM BACKUP AND RESTORE OPERATIONS Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited.
More informationCourse Outline. ttttttt
1300 86 87246 1300 TO TRAIN 50292 - Administering and Maintaining General Description This five-day instructor-led course provides students with the knowledge and skills to successfully administer, maintain,
More informationCTERA Agent for Windows
User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
More informationAcronis True Image 2015 REVIEWERS GUIDE
Acronis True Image 2015 REVIEWERS GUIDE Table of Contents INTRODUCTION... 3 What is Acronis True Image 2015?... 3 System Requirements... 4 INSTALLATION... 5 Downloading and Installing Acronis True Image
More informationSamsung Data Migration v.3.0 Introduction and Installation Guide
Samsung Data Migration v.3.0 Introduction and Installation Guide 2015.09 (Rev 3.0.) Legal Disclaimer SAMSUNG ELECTRONICS RESERVES THE RIGHT TO CHANGE PRODUCTS, INFORMATION AND SPECIFICATIONS WITHOUT NOTICE.
More informationCan Computer Investigations Survive Windows XP?
Can Computer Investigations Survive? An Examination of Microsoft and its Effect on Computer Forensics December 2001 by Kimberly Stone and Richard Keightley 2001 Guidance Software All Rights Reserved Executive
More informationRetrospect 7.7 User s Guide Addendum
Retrospect 7.7 User s Guide Addendum 2011 Retrospect, Inc. All rights reserved. Retrospect 7.7 Users Guide Addendum, first edition. Use of this product (the Software ) is subject to acceptance of the license
More informationCourse 50322B: Configuring and Administering Windows 7
Course 50322B: Configuring and Administering Windows 7 Length: Delivery Method: 5 Days Instructor-led (classroom) About this Course This five-day instructor-led course provides students with the knowledge
More informationIT Essentials v4.1 LI 11.4.5 Upgrade and configure storage devices and hard drives. IT Essentials v4.1 LI 12.1.3 Windows OS directory structures
IT Essentials v4.1 LI 11.4.5 Upgrade and configure storage devices and hard drives 2.3 Disk management tools In Windows Vista and Windows 7, use the following path: Start > Start Search > type diskmgmt.msc
More informationEMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Version 8.2 Service Pack 1 User Guide 302-001-235 REV 01 Copyright 2007-2015 EMC Corporation. All rights reserved. Published
More informationEMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Release 8.2 User Guide P/N 302-000-658 REV 01 Copyright 2007-2014 EMC Corporation. All rights reserved. Published in the USA.
More informationConfiguring and Administering Windows 7
Configuring and Administering Windows 7 Length: 5 days Overview This five-day instructor-led course provides students with the knowledge and skills to configure and administer Microsoft Windows 7 as a
More informationLenovo Online Data Backup User Guide Version 1.8.14
Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data
More informationActive @ UNDELETE Users Guide
Active @ UNDELETE Users Guide Contents 2 Contents Legal Statement...5 Active@ UNDELETE Overview... 6 Getting Started with Active@ UNDELETE... 7 Active@ UNDELETE Views And Windows... 7 Recovery Explorer
More informationCrystal Practice Management Encrypting the Database
Crystal Practice Management Encrypting the Database www.crystalpm.com 2013 Contents Overview... 1 Level of Encryption... 1 Why encrypt your Crystal Practice Management data?... 1 How to encrypt the database...
More informationQuick Start - Virtual Server idataagent (Microsoft/Hyper-V)
Page 1 of 19 Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine Data
More informationExchange Server Backup and Restore
WHITEPAPER BackupAssist Version 6 www.backupassist.com Cortex I.T. 2001-2007 2 Contents 1. Introduction... 3 1.1 Overview... 3 1.2 Requirements... 3 1.3 Requirements for remote backup of Exchange 2007...
More informationPractice Test CompTIA A+ 220-802 Domain 1 - Operating Systems
Practice Test CompTIA A+ 220-802 Domain 1 - Operating Systems Brought to you by RMRoberts.com The CompTIA A+ 220-802 certification test is much more in-depth than the CompTIA A+ 220-801. This is the first
More informationHyperoo 2 User Guide. Hyperoo 2 User Guide
1 Hyperoo 2 User Guide 1 2 Contents How Hyperoo Works... 3 Installing Hyperoo... 3 Hyperoo 2 Management Console... 4 The Hyperoo 2 Server... 5 Creating a Backup Array... 5 Array Security... 7 Previous
More informationNovaBACKUP. User Manual. NovaStor / May 2014
NovaBACKUP User Manual NovaStor / May 2014 2014 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.
More informationActive @ UNDELETE Users Guide
Active @ UNDELETE Users Guide Contents 2 Contents Legal Statement...5 Active@ UNDELETE Overview... 6 Getting Started with Active@ UNDELETE... 7 Active@ UNDELETE Views And Windows... 7 Recovery Explorer
More informationFAQ for USB Flash Drive
FAQ for USB Flash Drive 1. What is a USB Flash Drive? A USB Flash Drive consists of a flash memory data storage device integrated with a USB interface. USB Flash Drives are typically removable and rewritable.
More informationA+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
More informationHP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
More informationICT Professional Optional Programmes
ICT Professional Optional Programmes Skills Team are a Microsoft Academy with new training rooms and IT labs in our purpose built training centre in Ealing, West London. We offer a range of year-long qualifications
More informationClickfree Software Frequently Asked Questions (FAQ)
Clickfree Software (FAQ) Last Revised: Nov 2, 2011 Clickfree_backup_software_FAQ_v1.0 Clickfree and the Clickfree logo are trademarks or registered trademarks of Storage Appliance Corporation. Other product
More informationBoot Camp Installation & Setup Guide
Boot Camp Installation & Setup Guide Contents 4 Introduction 5 What You Need 6 Installation Overview 6 Step 1: Check for updates. 6 Step 2: Open Boot Camp Assistant. 6 Step 3: Install Windows. 6 Step 4:
More informationHelp System. Table of Contents
Help System Table of Contents 1 INTRODUCTION...1 2 GETTING STARTED!... 2 2.1 Installation...2 2.2 Wizard...3 2.3 Browse Method:...7 2.4 Search Method:...7 2.5 Surface Scan Method:... 8 3 RECOVERING DELETED
More informationHyper-V Protection. User guide
Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 Windows Server 2012 Hyper-V support... 3 2. Hyper-V protection features... 3
More information16.4.3 Optional Lab: Data Backup and Recovery in Windows 7
16.4.3 Optional Lab: Data Backup and Recovery in Windows 7 Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment
More informationOperating Systems Forensics
Operating Systems Forensics Section II. Basic Forensic Techniques and Tools CSF: Forensics Cyber-Security MSIDC, Spring 2015 Nuno Santos Summary! Windows boot sequence! Relevant Windows data structures!
More information2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12
USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...
More informationMS-50292: Administering and Maintaining Windows 7. Course Objectives. Required Exam(s) Price. Duration. Methods of Delivery.
MS-50292: Administering and Maintaining Windows 7 This five-day instructor-led course provides students with the knowledge and skills to successfully install, maintain, and troubleshoot Windows 7 computers.
More informationWho DIT It? Detecting and Mitigating Privilege Escalation Attacks on the Active Directory Data Store
Who DIT It? Detecting and Mitigating Privilege Escalation Attacks on the Active Directory Data Store Mike Middleton Justin Prosco Mandiant, A FireEye Company Mike Middleton Principal Consultant Joined
More informationKaseya 2. User Guide. Version 7.0. English
Kaseya 2 Backup User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated
More informationUniversity of Rochester Sophos SafeGuard Encryption for Windows Support Guide
Sophos SafeGuard Encryption for Windows Support Guide University Information Technology Security & Policy September 15, 2015 Version Date Modification 1.0 September 15, 2015 Initial guide 1.1 1.2 1.3 1.4
More informationCTERA Agent for Windows
User Guide CTERA Agent for Windows September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without
More informationTORNADO ONLINE BACKUP ADMINISTRATOR S GUIDE
TORNADO ONLINE BACKUP ADMINISTRATOR S GUIDE Version 6.5.4.0 CONTENTS Best Practices... 3 Recommended hardware specification... 3 JVM (Java Virtual Machine) memory allocation... 3 Storage size for user
More informationAdministration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201
Administration GUIDE SharePoint Server idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201 Getting Started - SharePoint Server idataagent Overview Deployment Configuration Decision Table
More informationHow to protect, restore and recover SQL 2005 and SQL 2008 Databases
How to protect, restore and recover SQL 2005 and SQL 2008 Databases Introduction This document discusses steps to set up SQL Server Protection Plans and restore protected databases using our software.
More informationGladinet Cloud Backup V3.0 User Guide
Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet
More informationChapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014
Chapter Contents Operating Systems and File Management Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup Security
More informationUSB Flash Memory TransMemory-EX II TM
USB Flash Memory TransMemory-EX II TM Security Software User Manual TOSHIBA Corporation Semiconductor & Storage Products Company Contents Chapter 1: Introduction... 2 Chapter 2: System Requirements...
More informationData Containers. User Guide
Data Containers User Guide Contents 1. Overview... 2 The backup... 2 The problem... 2 The solution... 2 Other advantages... 2 RDX granular restore... 2 Portable backups... 2 2. Creating a Data container
More informationMozyPro User Guide Version 1.8.14
MozyPro User Guide Version 1.8.14 Contents Preface: Preface...v Chapter 1: Overview...7 Chapter 2: Installing MozyPro...9 Downloading the MozyPro Client...9 Installing the MozyPro Client...9 Configuring
More informationHyper-V Cloud Practice Builder. Disaster Recovery Using DPM 2010
Hyper-V Cloud Practice Builder Disaster Recovery Using DPM 2010 The Hyper-V Cloud Practice Builder from Microsoft Enterprise Services can help Microsoft partners by: Accelerating practice development by
More informationAdministration Guide - Virtual Server idataagent (Microsoft Hyper-V)
Page 1 of 83 Administration Guide - Virtual Server idataagent (Microsoft Hyper-V) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine
More informationQuick Start - Generic NAS File Archiver
Page 1 of 19 Quick Start - Generic NAS File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method 2:
More information10.3.1.4 Lab - Data Backup and Recovery in Windows 7
5.0 10.3.1.4 Lab - Data Backup and Recovery in Windows 7 Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment
More informationGet Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Vendor: Microsoft Exam Code: 70-687 Exam Name: Microsoft Configuring Windows 8 Exam Version: Demo QUESTION: 1 A company has an Active Directory
More informationTPM. (Trusted Platform Module) Installation Guide V3.3.0. for Windows Vista
TPM (Trusted Platform Module) Installation Guide V3.3.0 for Windows Vista Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM...
More informationAcronis Backup & Recovery 11.5
Acronis Backup & Recovery 11.5 Installation Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows
More information(Exam 70-680): Configuring
Microsoft MCTS Self-Paced Training Kit (Exam 70-680): Configuring Windows? Ian McLean Orin Thomas Contents Introduction Lab Setup Instructions Hardware Requirements Using the DVD xxv How to Install the
More informationNetworking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
More informationilaw Installation Procedure
ilaw Installation Procedure This guide will provide a reference for a full installation of ilaw Case Management Software. Contents ilaw Overview How ilaw works Installing ilaw Server on a PC Installing
More information70-680 Q&A. DEMO Version
TS:Windows 7,Configuring Q&A DEMO Version Copyright (c) 2011 Chinatag LLC. All rights reserved. Important Note Please Read Carefully For demonstration purpose only, this free version Chinatag study guide
More informationTechnical Note P/N 300-011-099 REV A02 May 07, 2010
EMC NetWorker Microsoft Exchange 2010 Backup and Recovery Support with EMC NetWorker Technical Note P/N 300-011-099 REV A02 May 07, 2010 This technical note describes the backup and recovery procedure
More informationA+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 16 Fixing Windows Problems Objectives Learn what to do when a hardware device, application, or Windows component gives a problem Learn what to do
More informationComputer Forensics Principles and Practices
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 7: Investigating Windows, Linux, and Graphics Files Objectives Conduct efficient and effective investigations of Windows
More informationAhsay A-Click Backup. User s Guide. Ahsay Systems Co. Ltd. 2 August 2011
v6 Ahsay Systems Co. Ltd. 2 August 2011 Ahsay A-Click Backup Copyright Notice 2011 Ahsay Systems Co. Ltd. All rights reserved. The use and copying of this product is subject to a license agreement. Any
More informationAccuGuard Desktop and AccuGuard Server User Guide
AccuGuard Desktop and AccuGuard Server User Guide 1 2 Table of Contents Welcome 4 Backup Simplified 5 Features 6 Protection Plans 7 Archived Data Viewing 8 Archived Data Restoring 9 Best Practices 11 Getting
More informationUnderstanding Backup and Recovery Methods
Lesson 8 Understanding Backup and Recovery Methods Learning Objectives Students will learn to: Understand Local, Online, and Automated Backup Methods Understand Backup Options Understand System Restore
More informationDriveLock and Windows 7
Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
More informationWindows BitLocker Drive Encryption Step-by-Step Guide
Windows BitLocker Drive Encryption Step-by-Step Guide Microsoft Corporation Published: September 2006 Abstract Microsoft Windows BitLocker Drive Encryption is a new hardware-enhanced feature in the Microsoft
More informationADMINISTERING WINDOWS VISTA SECURITY: THE BIG SURPRISES
ADMINISTERING WINDOWS VISTA SECURITY: THE BIG SURPRISES Introduction. Chapter 1 Administering Vista Security: The Little Surprises. Restoring the Administrator. Making Your Own Administrator. Activating
More informationIntroduction to Windows 7 Feature Practice Examination (brought to you by RMRoberts.com)
Introduction to Windows 7 Feature Practice Examination (brought to you by RMRoberts.com) This practice examination consists of questions based on the most common Windows 7 features. As a professional,
More informationQuick Start Guide. Version R9. English
System Backup and Recovery Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
More information