Let’s Connect | |

So far, we have discussed user account creation, deletion, privileges, and associated folders and settings such as users profile and AppData folders, and user-specific environment variables.

The above information is essential for an investigator to identify the existing and deleted user accounts. …

Let’s Connect | |

As discussed in part 6, the user account forensics roadmap consists of three phases:, , and Deep-dive analysis.

The deep-dive analysis phase focuses on detailed analysis of user settings and behaviours to obtain information about:

User Account Forensics — Deep-Dive Analysis

This part…

Cybersecurity Hub

by Meisam Eslahi

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store