±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 36783
New Yesterday: 0 Visitors: 126

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Videos

±Latest Jobs

Encase | How To Analyse "plain" Log-Files

Forensic software discussion (commercial and open source/freeware). Strictly no advertising.
Reply to topicReply to topic Printer Friendly Page
Forum FAQSearchView unanswered posts
 
  

neutralChaos
Newbie
 

Encase | How To Analyse "plain" Log-Files

Post Posted: Oct 04, 19 09:00

Hi,
I am fairly new to Encase and Forensic in general.
I've watched a few Tutorials regarding Encase and wanted to play around with some Logfile I have, because "learning by doing" is best imo. The Tutorials I've watched are using Disk-Images only.

So I was wondering if encase can just work with Log-Data (firewall logs, Windows event logs etc.) not within an Image File, but *.log Files.

When I create a new Case and want to add "new evidence" the only Format I can go with are Disk-Images, so I am guessing it won't let me work with "plain" Log-Data. But maybe I am wrong.

Thanks for teaching me, in advance.


Best Regards
Klara  
 
  

hommy0
Senior Member
 

Re: Encase | How To Analyse "plain" Log-Files

Post Posted: Oct 04, 19 09:43

Hi,

If you have log files (or any file) outside of an evidence (image) file, you can introduce those to EnCase as “single files” just by “dragging and dropping” them into EnCase.

They will be referenced as “Single Files”.

Regards  
 

Page 1 of 1