

Honestly, I was not happy with the system impact that the agents had on system performance. As you might imagine, it required agents to be installed onto each monitored computer.

I looked at a commercial offering called "Spector 360" that was talking about this exact scenario. I do respect the community here and for that reason I apologize. Not that is important what you think of me rather it is important for me to respect the culture and demeanor of this forum. I do not apologize for my sense of humor, but I do regret the possibility that I offended anyone. I have left the original post exactly as it was, but would like to say that I never meant to bash any commercial product nor do I intend to promote myself or any third party products I happen to mention. " Reports USB Storage Devices (see when they were attached over time!) and RecentDocs" Clarifications Regarding the Original Post Pursue that at your own risk however, I will point out the bullet-point claim in the release notes. The tool, called Registry Recon, is a commercial tool and I can not vouch for it since I have not yet used it myself. I suggest you listen to the whole episode, but if you want to spot-check its relevance then I think that around 22:00/23:00 they say a few points that are relevant to your endeavor. If you are still looking into this, or want to go back to it, then you might be interested in listening to the CyberSpeak Podcast to hear about one forensic investigator's/firm's research. lnk files will be created only the suspect opens the file in question from the USB drive. You can even analyse MFT records and $Logfile which give you more information about the file structure.
MONITOR FILE COPY MACBOOK EXTERNAL HARD DRIVE SERIAL NUMBER
If the path refers to a USB then try to match user's SID, USB serial number and the time stamp information. lnk using FTK or Encase which will give you the path and the time stamp. If you use Encase or FTK search for key words (name of the file in question), analyse the. Go to NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2 and search for the GUID of the device. HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\USBīe very particular when checking the Mounted devices key as this information will be required in future analysisĪnalyse NTUSER.DAT file associated to that particular user in question. HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\USBSTOR First, try to get the information about the devices that were plugged into the computer from the following locations C:\Windows\inf\v
