Encase 24.2 Investigator
Encase 24.2 Investigator
Encase 24.2 Investigator
Investigator
User Guide
ISEEI240200-UGD-EN-1
OpenText™ EnCase™ Endpoint Investigator
User Guide
ISEEI240200-UGD-EN-1
Rev.: 2024-Apr-24
This documentation has been created for OpenText™ EnCase™ Endpoint Investigator CE 24.2.
It is also valid for subsequent software releases unless OpenText has made newer documentation available with the product,
on an OpenText website, or by any other means.
Tel: +1-519-888-7111
Toll Free Canada/USA: 1-800-499-6544 International: +800-4996-5440
Fax: +1-519-888-0677
Support: https://support.opentext.com
For more information, visit https://www.opentext.com
Disclaimer
Every effort has been made to ensure the accuracy of the features and techniques presented in this publication. However,
Open Text Corporation and its affiliates accept no responsibility and offer no warranty whether expressed or implied, for the
accuracy of this publication.
Table of Contents
1 Introduction to OpenText EnCase Endpoint Investigator ... 29
1.1 The SAFE server ............................................................................ 29
1.2 The EnCase Examiner .................................................................... 29
1.3 Agents ............................................................................................ 30
18.4.6 Samsung devices with Android OS 4.0 – 14.x (MTP) ....................... 586
18.4.6.1 Preparing device for acquisition - Samsung devices with Android
OS 4.0 – 14.x (MTP) ..................................................................... 586
18.4.6.2 Data acquisition - Samsung devices with Android OS 4.0 – 14.x
(MTP) ........................................................................................... 586
18.4.6.3 Acquired data - Samsung devices with Android OS 4.0 – 14.x (MTP) 587
18.4.6.4 Supported models - Samsung devices with Android OS 4.0 – 14.x
(MTP) ........................................................................................... 587
18.4.7 Android Spreadtrum devices .......................................................... 587
18.4.7.1 Preparing environment for acquisition - Spreadtrum ........................ 587
18.4.7.2 Data acquisition - Spreadtrum ........................................................ 588
18.4.7.3 Acquired data - Spreadtrum ........................................................... 589
18.4.7.4 Supported models - Spreadtrum ..................................................... 589
18.4.8 Android MTK (MediaTek) devices .................................................. 589
18.4.8.1 Preparing environment for acquisition - MediaTek ........................... 589
18.4.8.2 Data acquisition - MediaTek ........................................................... 590
18.4.8.3 Acquired data - MediaTek .............................................................. 591
18.4.8.4 Supported models - MediaTek ....................................................... 591
18.4.9 Android Qualcomm devices ........................................................... 591
18.4.9.1 Preparing environment for acquisition - Qualcomm .......................... 591
18.4.9.2 Data acquisition - Qualcomm ......................................................... 594
18.4.9.3 Acquired data - Qualcomm ............................................................ 595
18.4.9.4 Supported models - Qualcomm ...................................................... 595
18.5 Acquiring data from Tizen devices .................................................. 595
18.5.1 Preparing device for acquisition - Tizen .......................................... 595
18.5.2 Data acquisition - Tizen ................................................................. 596
18.5.3 Acquired data - Tizen .................................................................... 596
18.5.4 Supported models - Tizen .............................................................. 597
18.5.5 Tizen devices FAQ ........................................................................ 597
18.6 Acquiring data from RIM BlackBerry devices ................................... 597
18.6.1 Data acquisition - BlackBerry ......................................................... 597
18.6.2 Acquired data - BlackBerry ............................................................ 598
18.6.3 Supported models - BlackBerry ...................................................... 599
18.6.4 RIM BlackBerry FAQ ..................................................................... 599
18.7 Acquiring data from Symbian OS smartphones ............................... 600
18.7.1 About data acquisition from Symbian OS smartphones .................... 600
18.7.2 Symbian OS6.0 devices ................................................................ 600
18.7.2.1 Data acquisition - Symbian 6.0 ....................................................... 600
18.7.2.2 Acquired data - Symbian 6.0 .......................................................... 601
18.7.2.3 Supported models - Symbian 6.0 ................................................... 601
18.7.3 Symbian OS6.1 devices ................................................................ 601
18.7.3.1 Data acquisition - Symbian 6.1 ....................................................... 601
The Examiner uses agents to remotely discover, preview, and acquire data.
1.3 Agents
After a command from the Examiner is authorized by the SAFE server and verified
by the network device, an agent is deployed to target machines to execute the
command. The agent runs as a process or service with administrative privileges and
has access to each target machine at the bit level.
Work with your network administrator to determine the best methods for deploying
agents, taking into account your network topology, network operating system, and
management tools.
This chapter lists the default locations of installation directories and files and also
provides information about configuring EnCase settings.
• WinEn64
• WinAcq
• LinEn
The prior product licensing solution, License Manager, is a legacy application used
to serve licenses to EnCase products. As of release 21.1 of EnCase products, the
CodeMeter License server replaces License Manager as the primary licensing service
used by EnCase products. If you currently have License Manager installed, you can
continue to use it to serve licenses to existing versions of EnCase products until
License Manager is deprecated. If you want to retire License Manager, you must
generate new electronic licenses for your EnCase products. Newly generated
electronic licenses will use CodeMeter licensing service instead of License Manager.
When you run EnCase on a computer, it first searches for a physical security key or
local software license for licensing information unless network-based licensing is
enabled. To enable an Examiner computer to use software licensing through
CodeMeter license server, you must first install and configure it and point Examiner
For more information about installing and configuring CodeMeter license server, see
“Install and configure CodeMeter license server” on page 44.
First, select machines on your network to install the SAFE and CodeMeter license
server. You can use a dedicated machine, such as a server, or a machine that is also
used as an EnCase Examiner. Select the appropriate installation option below:
This section describes how to use portal filters to view different subsets of your
content. It then shows how to identify and download a specific version of EnCase
Endpoint Investigator.
Note: The quickest way to see the products and services to which you’re entitled is
to select My Products & Services once you’ve signed in.
2. Sign in with your OpenText User ID and password. The My Support Portal
opens to the My open cases page.
3. Click the arrow beside Knowledge to expand the menu. Then click Home. A
screen showing all content to which you’re entitled is displayed.
4. You can select a product or a content type. Products are divided into families.
Scroll down to the Load More link and click it. Another set of product families
is displayed.
5. EnCase products are divided into three families. Click the + beside EnCase to
see these families.
6. Click the + beside Investigation and Forensic to see the EnCase products within
that family.
8. Click the + beside Content type to see all types of EnCase Forensic content.
10. Select Software. All versions of software to which you are entitled are
displayed.
11. Click the + beside Version to see a list of available versions of EnCase Forensic.
12. Select the version you want. The result list is filtered by that version.
13. Click the file to be downloaded. A screen with a download link is displayed.
1. Open the EnCase Examiner installation file. If you have a physical security key,
do not insert it until after installation is complete.
2. Accept the default installation path (C:\Program Files\EnCase[version year]),
or enter your own installation path and click Next.
Note: To ensure the registration of installed DLL files and enable the
drivers, you must reboot before running the application.
• If you are using a physical security key, insert it into a USB port on your
computer. The CodeMeter icon in the Windows system is now active.
EnCase Endpoint Investigator was designed to run on machines for users with
administrator privileges. OpenText strongly recommends granting all users admin
privileges to users of the EnCase application. Users running the EnCase application
without admin privileges may encounter one or more of the following issues:
• Non admin users may encounter error messages due to access permissions.
• When opening evidence, the picture tab and doc tab do not render data.
• The Evidence Processor may fail when run, and may result in missing artifact
data.
• Indexing does not work without admin privileges.
• Viewing or collecting from local devices or mobile devices require administrator
permissions.
• Some SAFE menu options and configuration will not work without
administrative privileges.
3. Click Allow.
The ARM template file (deployment.json) and install script (install.ps1) are
included with EnCase Endpoint Investigator during product installation. Both files
can be found in the following default location: C:\<EnCase install dir>\ARM
Templates\Deploy EnCase on VM.
2. Type template in the search bar, and select the Deploy a custom template
service.
3. From the Custom deployment page, click the Build your own template in the
editor link.
4. Click Load file, and use file explorer to navigate to and open the deployment.
json file.
5. Click Save. The Custom deployment page is displayed after the template is
saved.
6. Fill out all the required fields and click Review + Create. If all information
entered is valid, the Validation passed message is displayed.
The required azure resources are then created, including the VM with installed
EnCase Endpoint Investigator application.
Note: You can also use the EnCert license utility to license your product.
See “Manage EnCase licenses via the command line” on page 50.
3. From within EnCase Endpoint Investigator, click the help icon in the right
corner of the menu bar, then click Activate Electronic License from the list. The
Activate Electronic License dialog is displayed.
Note: You can look up your product serial numbers on the OpenText My
Support My Activations and Keys page under the Guidance product
section.
The license request file will be generated at the conclusion of this step. A path to
the file is displayed in the License Request file box.
6. Click Open Destination Folder to display the folder containing the license
request file and return to the Activate Electronic License dialog. You will need
the license activation file once it has been generated.
7. Click Next. The license activation file is generated. The third Activate Electronic
License dialog is displayed.
The license key and email address entered in step 4 are displayed. The License
Activation File field is blank and the Finish button is inactive. You will need to
submit the *WibuCmRaC license request file on the OpenText My Support My
Activations and Keys page and retrieve the license activation file.
Note: The Finish button will become active when you have completed
steps 9-16 below.
10. Click the arrow beside My Products & Services. Then select My activations &
keys.
11. Click the + sign to the right of Guidance. A blue bar is displayed with each of
your license numbers.
12. Click anywhere in the blue bar. A list of certificates for that license number is
displayed.
13. Each item has one or more associated actions, indicated by the icons at the right.
Download Key Returns to you the last download file that was
generated by the Rehost Key
Rehost Key Lets you upload a RAC file and retrieve a RAU file.
14. To get a new license file, click the Rehost Key icon in the CertGenElectronic
row under your product serial number. The Rehost License Key dialog is
displayed.
• Click Add attachments, locate the .WibuCmRaC license request file in the
folder you opened in step 6, and attach it.
• Click Submit. A dialog is displayed, indicating that the license has been
successfully created.
• Download the .WibuCmRaU license file.
Note: If the above process was performed on a separate machine from the
one designated to run EnCase Endpoint Investigator, copy
your .WibuCmRaU license file to the machine running the license activation
process.
15. Return to the Activate Electronic License dialog.
16. Enter the path and *.WibuCmRaU filename or browse to the location and select
the license update file that was downloaded.
Your machine is now licensed and may be used as a CodeMeter license server.
Configure the CodeMeter client to act as a CodeMeter license server.
1. Select the CodeMeter Control Center icon from the system tray. Select the
WebAdmin button. The CodeMeter WebAdmin page opens in a browser.
2. Select Configuration > Server > Server Access.
3. Select the Network Server Enable radio button and click Apply. Open EnCase,
and the license should be active.
Make note of the hostname or IP address of your CodeMeter license server as
you will need either value to enable licensing for EnCase products installed on
your network.
You can confirm the server is working by Selecting Diagnosis > Events from the
CodeMeter WebAdmin page. Events will appear, indicating that configuration
is complete.
The CodeMeter license server works independently from the installed EnCase
application. If you uninstall the EnCase application on the machine the
CodeMeter license server will continue to serve licenses.
Any loss in network connectivity between the CodeMeter license server and the
machines running CodeMeter license may cause your client applications to lose
functionality.
2. Enter the application name, followed by the desired flag and argument, if any.
The application executes the command and provides details of the action it has
taken.
For example, to generate a new EnCase license request file, enter the following
command from the EnCase License directory:
The EnCert application generates a *.WibuCmRaC file with the specified user email
at the specified location and indicates what it has done in the command window.
For installation instructions, see section 2 “Installing the SAFE” in OpenText EnCase
SAFE - User Help (ISSAFE-H-UGD).
Note: You can also use the EnCert license utility to license your product.
See “Manage EnCase licenses via the command line” on page 50.
3. From within EnCase Endpoint Investigator, click the help icon in the right
corner of the menu bar, then click Activate Electronic License from the list. The
Activate Electronic License dialog is displayed.
4. Enter your EnCase Endpoint Investigator product serial number in the License
Key field and email in the Email Address field.
Note: You can look up your product serial numbers on the OpenText My
Support My Activations and Keys page under the Guidance product
section.
The license request file will be generated at the conclusion of this step. A path to
the file is displayed in the License Request file box.
6. Click Open Destination Folder to display the folder containing the license
request file and return to the Activate Electronic License dialog. You will need
the license activation file once it has been generated.
7. Click Next. The license activation file is generated. The third Activate Electronic
License dialog is displayed.
The license key and email address entered in step 4 are displayed. The License
Activation File field is blank and the Finish button is inactive. You will need to
submit the *WibuCmRaC license request file on the OpenText My Support My
Activations and Keys page and retrieve the license activation file.
Note: The Finish button will become active when you have completed
steps 9-16 below.
10. Click the arrow beside My Products & Services. Then select My activations &
keys.
11. Click the + sign to the right of Guidance. A blue bar is displayed with each of
your license numbers.
12. Click anywhere in the blue bar. A list of certificates for that license number is
displayed.
13. Each item has one or more associated actions, indicated by the icons at the right.
Download Key Returns to you the last download file that was
generated by the Rehost Key
Rehost Key Lets you upload a RAC file and retrieve a RAU file.
14. To get a new license file, click the Rehost Key icon in the CertGenElectronic
row under your product serial number. The Rehost License Key dialog is
displayed.
• Click Add attachments, locate the .WibuCmRaC license request file in the
folder you opened in step 6, and attach it.
• Click Submit. A dialog is displayed, indicating that the license has been
successfully created.
• Download the .WibuCmRaU license file.
Note: If the above process was performed on a separate machine from the
one designated to run EnCase Endpoint Investigator, copy
your .WibuCmRaU license file to the machine running the license activation
process.
15. Return to the Activate Electronic License dialog.
16. Enter the path and *.WibuCmRaU filename or browse to the location and select
the license update file that was downloaded.
3. Click the arrow beside My Products & Services. Then select My activations &
keys.
4. Click the + sign to the right of Guidance. A blue bar is displayed with each of
your license numbers.
5. Click anywhere in the blue bar. A list of certificates for that license number is
displayed.
6. Each item has one or more associated actions, indicated by the icons at the right.
Download Key Returns to you the last download file that was
generated by the Rehost Key
Rehost Key Lets you upload a RAC file and retrieve a RAU file.
Note: If the above process was performed on a separate machine from the
one designated to run EnCase Endpoint Investigator, copy
your .WibuCmRaU license file to the machine running the license activation
process.
1. On the EnCase Home page, click the question mark in the upper right corner of
the application toolbar, then click Activate Electronic License.
The Activate Electronic License dialog is displayed.
2. Click Back.
3. In the dialog that is displayed, make the corrections to the license key number
or the email address, then click Next.
Click OK to remove the active license or Cancel to retain the current active license.
To install and configure a CodeMeter license server see “Install and configure
CodeMeter license server” on page 44.
1. Select the CodeMeter Control Center icon from the system tray. The
CodeMeter Control Center dialog is displayed.
4. Select add new Server and enter the hostname or IP address of the machine
configured as your CodeMeter License Server.
5. Verify that the port matches the one specified on your CodeMeter license server.
Click the Add button and Apply button.
When you open the EnCase application the license should be active. You can
confirm that licensing is active from the CodeMeter web application by clicking on
Diagnosis > Events, where you will see events begin to appear.
If you used License Manager to serve licenses to your desktop application and you
want to upgrade to use CodeMeter license server, check your License Manager
settings in your desktop application. See “License Manager options” on page 68
To uninstall EnCase:
1. Make backups of evidence and case files prior to making modifications to any
software on an examination machine.
3. Open the Windows Control Panel and click Uninstall a Program under
Programs.
5. The EnCase uninstall wizard runs and the first screen is displayed.
6. Enter or navigate to the installation location in the Install Path field. The default
for the current version is C:\Program Files\EnCase[version year].
7. Click Next.
8. Select Uninstall and click Next. A progress bar is displayed during the uninstall
process.
9. The last page of the uninstall wizard is displayed. Select Reboot Later or
Reboot Now and click Finish. A reboot completes the uninstallation process.
• Application files
• Registry keys
• Needed user files
• Default configuration files
Note: Any modified EnScript files are overwritten during reinstallation. If you
want to keep modified EnScript files, move them to another folder prior to
reinstallation.
• Licenses
• Certificates
• User settings
When reinstalling EnCase, make sure that your security key is inserted. If support
on the security key has expired, a warning message is displayed.
The SAFE uses a public and private key encryption system to authenticate users.
Keys are generated by users or SAFE administrator, authorized by the keymaster,
and then are distributed to enable users to log on to the SAFE.
2. To create user accounts, which are added to the SAFE by the keymaster or a
user with the Administer Users role. See section 3.6 “Setting up user accounts
and permissions” in OpenText EnCase SAFE - User Help (ISSAFE-H-UGD).
• Users cannot log on to the SAFE until their respective accounts have been
added to the SAFE and assigned a role. See section 3.6 “Setting up user
accounts and permissions” in OpenText EnCase SAFE - User Help (ISSAFE-H-
UGD) and section 3.5 “Setting up roles” in OpenText EnCase SAFE - User Help
(ISSAFE-H-UGD).
• Secondary authentication methods can be added to a user account if the
primary authentication method is SAFE Logon. See section 3.6 “Setting up
user accounts and permissions” in OpenText EnCase SAFE - User Help
(ISSAFE-H-UGD).
The SAFE installer can generate keymaster keys. To generate other encryption keys,
use the SAFE web application or the desktop investigation application (see section
3.9 “Generating encryption keys” in OpenText EnCase SAFE - User Help (ISSAFE-H-
UGD)).
1. From the Encryption Keys tab, highlight a key, and click Edit. The Edit screen is
displayed with a path to the selected key and an empty Password field.
2. Enter the existing password for the key and click Next.
If users forget their password or lose their private key file, assign a new key pair to a
user account:
Note: The name of the new key must match the user name. Either the
newly created public key must match the name in the Name field, or you
must manually change the value in the Name field to match the name of
the public key file.
2. Log on to the SAFE using the keymaster account, or another account that has
the permissions to edit users.
4. Right-click the user name and select Edit. The Edit User dialog is displayed.
5. Browse to or enter the location of the new public key file, then click OK.
In the Picture Options box, Enable Picture Viewer allows graphics to be displayed
in various views.
Enable ART Image Display determines whether to display legacy ART image files.
When EnCase Endpoint Investigator encounters corrupt ART image files,
application problems can occur. Enabling this setting minimizes the impact of
corrupted ART files.
Invalid Picture Timeout (seconds) indicates the amount of time EnCase Endpoint
Investigator attempts to read a corrupt image file before timing out. After a timeout
occurs, the corrupt file is sent to the cache and no attempt is made to re-read it.
Force ordered rendering in Gallery forces images to display in order, from left to
right, sequentially by row. If you leave this box cleared, images display in a gallery
view as they become available. Although images display in order, the former view
takes longer to complete, whereas images that display when rendering is not forced
but not in order display more rapidly.
In the Code Page box, Change Code Page lets you change the default value of the
code page from Western European (Windows) to another available code page. Set
the global code page to display foreign language characters correctly.
In the Authentication box, select the authentication method the user will use to log
on to the SAFE. Select one of five options:
• SAFE User logs on to the SAFE using native SAFE user authentication
• Current Windows User logs on to the SAFE using Windows Active Directory
authentication for the current Windows user
• Windows prompt opens a Windows Active Directory dialog and prompts the
user to select a user or group to log onto the SAFE
• Smart Card User logs on to the SAFE using smart card credentials
• RSA SecurID User logs on to the SAFE using RSA SecurID authentication
Show True indicates a value of true in table columns displayed in the Table tab of
the Table pane. The default indicator is a bullet.
Show False indicates a value of false in table columns displayed in the Table tab of
the Table pane. The default indicator is a blank space.
Default Char is the character that EnCase Endpoint Investigator uses to indicate that
a box or cell is checked. The default character is a middle dot.
Flag Lost Files specifies whether the disk map shows lost clusters. Lost clusters are
clusters that EnCase Endpoint Investigator cannot determine as being used even
though the file system indicates them as being used.
Detect FastBloc Hardware search for legacy FastBloc hardware write blockers with
this option selected.
Detect Tableau Hardware search for Tableau write blockers with this option
selected.
Run Shell Extensions for LNK Files enables EnCase to extract more data from .lnk
files, which is displayed as IDList Data in the Report tab. Be aware that this option
extracts LNK data locally, not from the acquired evidence. If you want to use this
option on evidence data, you must run EnCase on the machine that contains the
LNK files of interest.
Require Case Information ensures that you can only log into the SAFE if all open
and active cases contain a case number. If you have unsaved cases, SAFE login fails
and an error message is displayed until all cases are saved.
Save Blue Checks causes blue checks to persist after closing a case or exiting EnCase
Endpoint Investigator. Selecting this option may affect performance depending on
how many blue checks are active when you close the case.
Prepare evidence for use with Artifact Explorer Enables causes EnCase Endpoint
Investigator so it can prepare evidence files to work with EnCase Artifact Explorer.
An application restart is required when this option is changed.
Display time zone on dates includes the time zone in date/time columns.
• MM/DD/YY (07/25/21)
• DD/MM/YY (25/07/21)
• Other lets you customize the date in the date Format field.
• Current Day displays the current date in the specified date format.
Month Month Day Format Day Output Year Format Year Output
Format Output
M/dd/yy 4/23/21 MM/yy 04/21 MM/dd 04/08
MM/dd/yy 04/08/21 MM/d/yy 04/8/21 MM/dd/y 04/08/21
MMM/dd/yy Apr/08/21 MM/dd/yy 04/08/21 MM/dd/yy 04/08/21
MMMM/dd/y April/08/21 MM/ddd/yy 04/Thu/21 MM/dd/yyy 04/08/2021
y
mMMMM/dd mApril/08/21 MM/dddd/yy 04/ MM/dd/Yyyy 04/08/Y2021
/yy Thursday/21
MM/ 04/ yyyy/dddd/ 2021/
Ddddd/yy DThursday/2 MMMM Tuesday/
1 April
Licensing through CodeMeter license server does not use License Manager. If you
want to use CodeMeter license server, clear the Use License Manager for licensing
check box and follow the instructions to configure licensing in “Configure
CodeMeter desktop license” on page 60.
Use License Manager for licensing: Select this box to indicate use of License
Manager to run the copy of EnCase on your computer.
License Manager Key Path: Specifies the full path of the user's licensing file. The
license file for general licensing of EnCase is default.nas.
License Manager .SAFE Key Path: Enter the full path of the location of the EnCase
SAFE public key file. This SAFE token file has a file signature of .SAFE and is found
on the License Manager.
License Manager Address: Enter the IP address or machine name of the computer
running the License Manager. If you are using a port other than 4446, precede the
port number with the computer's IP address (for example, 192.168.1.34:4446).
Status: Displays the name or IP address of the computer on which the EnCase
licensing files currently reside.
Create User Key...: Opens the Create User Key dialog. Do not use this button unless
you are creating separate licenses for each computer belonging to your License
Manager setup. For more information about using individual licenses, see the SAFE
User Guide.
4. Click OK to accept the color change or Cancel to revert to the previous color.
Note: Choice of color applies to the cell in the table. It does not affect the color
of the font.
2. In the Font dialog, select your options and click OK. The text box previews the
current font options.
• Shared Files: Location of folder containing files that require shared access.
• User/Application Paths: Location of folders used to store user data, user
application data, and global application data.
With the exception of the global application data folder, these paths are
configurable. For detailed information, see “EnCase folders” on page 79.
There are three ways Help can be delivered, as shown on the Help Service tab in the
Options dialog:
• Online: This is the default option for users with an Internet connection. The
online help for this product is delivered using the OpenText Global Help Server
(GHS) system, which provides users with live access to the latest version of the
help.
• Private Help Server URL: Use this option if your site does not have access to
Internet and you have installed a Private Help Server (PHS) in your local
network, to host a version of the product online help. Specify the path to the PHS
in the text box below, in the following format:
http://<phs-server>:<port>/OTHelpServer/<mapper>
Where <phs-server> and <port> are the Private Help Server host name and port,
and <mapper> is the name of the mapping application (either mapperapi or
mapper) used by your application.
Note: For information about installing and configuring the Private Help
Server, see “Providing the online help on a local help server (Private Help
Server)” on page 74.
• PDF User Guide Path: Use this option if your site does not have access to
Internet and you have not installed a Private Help Server (PHS) in your local
network. Download a version of the EnCase Endpoint Investigator User Guide
(PDF) from My Support on your local network, and specify the path to this
document in the box below.
2.14.7.1 Providing the online help on a local help server (Private Help
Server)
The online help for this module is delivered using the OpenText Global Help Server
(GHS) system, which provides your users with live access to the latest version of the
help. If you cannot use the GHS system, for example, if your site does not have
Internet access, you can install the OpenText Private Help Server (PHS), a local
version of the help system that can host your OpenText online help on your
organization’s network. After the PHS is installed, you can then configure your
OpenText module(s) to forward all online help requests to your PHS. For detailed
information about installing the PHS, see OpenText Help System - Private Help Server
Administration Guide (OTHS-AGD).
Notes
• The Private Help Server can support multiple OpenText modules. If the
Private Help Server has already been installed within your organization to
support another OpenText module, you can add additional OpenText
module online helps to that installation.
• If you are replacing a previous PHS installation, see OpenText Help System -
Private Help Server Administration Guide (OTHS-AGD).
• If the server you want to use for the PHS installation cannot connect to the
Internet, see OpenText Help System - Private Help Server Administration Guide
(OTHS-AGD).
Once the PHS is installed or upgraded, you can use its Online Help Deployer to
download online helps from the GHS system by entering the help deployment codes
listed in “Help deployment codes” on page 74. For more information about using
the codes, see OpenText Help System - Private Help Server Administration Guide (OTHS-
AGD).
Code Product
ISEEI240200-UGD OpenText™ EnCase™ Endpoint Investigator
CE 24.2
The Startup panel displays operating system, application, and session information
about your computer and about EnCase.
If the pane is empty, click Show Startup Log to show the log for troubleshooting
purposes.
Click Show Logging to open the Logs screen, where you can view, filter, and select
log categories from a list. You can also select the destination for log messages.
Options include save in memory, display in debug output, display in console, or
write to a file.
System Cache specifies the amount of physical memory for caching reads and
writes of files on disk. The default value is 20 percent of the computer's physical
memory (RAM).
• Minimum (MB): The minimum size of the system cache in Megabytes; the
default value is 1.
• Maximum (MB): The maximum size of the system cache in Megabytes. The
default value depends on the amount of physical memory available on the
computer. You can manually set this value up to the maximum amount of
physical memory available (although this is not recommended).
• Controlled by EnCase: Clicking this box allows EnCase to control the size of the
system cache (recommended).
• Do not warn at startup: With this box selected, EnCase will not display warning
messages when possible system memory issues occur.
• Set Defaults: Click this button to reset the system cache values to their default
values.
Debug Logging allows you to select which logging action to take in the event of a
crash:
Note: For the quickest debugging of the crash, we recommend selecting the
Heap option.
Private Key Caching is the length of time EnCase Endpoint Investigator keeps the
private key password in memory. This allows you to log in and out of the SAFE
without having to re-enter passwords for the specified time period.
• Closing EnCase Endpoint Investigator clears the cache, so you need to enter your
password again.
• The value is set in minutes.
• A value of 0 denotes no caching.
• A value of -1 allows for infinite key caching.
• The value is set to 60 by default.
Auto Reconnect Intervals is the time, in seconds, that EnCase Endpoint Investigator
waits between each reconnect attempt if the connection is lost to the agent node.
Evidence Processor options shows all the Evidence Processor options available in
the selected folder location. Only EnCase Processor settings (.EnProc) files are listed.
Use Select Folder to indicate where the Evidence Processor options are stored.
EnCase Endpoint Investigator will populate the Evidence Processor Options drop-
down box with all .EnProc files in the selected folder.
Use the Change Time Zone button to select or change the existing time zone where
the evidence originated. The time zone will be set automatically for newly added
evidence. No time zone information is selected by default.
• The Perform this process every time evidence is added to a case check box.
• Use the Don’t notify me again check box if you don’t want the user to be notified
of the settings when adding evidence. EnCase Endpoint Investigator will apply
the current settings to all new evidence.
See “Automating evidence processing when adding new evidence” on page 238 for
more details.
1. In a case, click the Evidence tab to view a list of your devices in the Table tab.
2. Click the link in the Name column of the device you want to modify to open the
evidence in the Entries view.
3. From the Device menu select Modify time zone settings. The Time Properties
dialog is displayed.
5. If the time zone supports Daylight Savings Time, and there are different rules
for different years, EnCase automatically applies the proper rules for the
particular year. To override this behavior, select Use single DST offset. This
causes a single offset and enables you to choose the year for the correct bias.
6. Click OK. The time zone is listed in the Report tab for that device.
Devices with File Allocation Table filesystems (FAT12, FAT16, FAT32, exFAT) such
as thumb drives and memory cards do not support time zones. For these devices, the
term “Local Time” is displayed by default instead of a time zone. This may cause
potential confusion with a user who selects the Display time zones on dates check
box on the Options dialog Date tab and sees ‘Local Time' listed instead of a time
zone. OpenText recommends not changing time zone for FATxx devices using either
the Device > Modify time zone settings or the Options dialog Auto Evidence
Processor tab Time Zone settings.
• Application folder
• Shared files folder
• User data folder
• User application data location folder
• Global application data location
On Windows operating systems, the default path for the application folder is
\Program Files\EnCase[version year].
Note: User data and user configuration settings are not saved in this location.
• Shared scripts
• Filters
• Searches
• Conditions
• Keywords
1. Select the Shared Files Location check box on the Data Paths tab of the Options
dialog.
2. Click Browse on the right side of the text box to open a file browser and
navigate to the location of your choice and click OK.
The selected path is shown in the Shared Files Location text box.
On Windows operating systems, the default path for the user data folder is: \Users
\<username>\Documents\EnCase.
The current path used to store user data is displayed on the EnCase Options dialog,
Data Paths tab.
• From the Options dialog, Data Paths tab, click the Open Path button on the
right side of the User Data Folder text box.
The selected path is displayed in a file browser.
To modify the user data folder location, see “Configuring a Windows override path”
on page 83.
On Windows operating systems, the default path for the user application data folder
is: \Users\<username>\AppData\Roaming\EnCase\EnCase[version year]-<#>
\Config.
The current path used to store user application data is displayed on the Data Paths
tab of the Options dialog.
• In the Data Paths tab of the Options dialog, click the Open Path button on the
right side of the User Application Data Folder text box.
The selected path is displayed in a file browser.
To modify the user application data folder location, see “Configuring a Windows
override path” on page 83.
EnCase requires that these data locations have both read and write access. If
Windows is set up so that either of these locations is on a read-only network share,
or on a hard drive which is read-only and at a separate location, EnCase cannot store
its settings correctly and cannot function properly.
To accommodate situations where you cannot change these locations, and the
Windows store locations are read-only, EnCase allows you to change these locations
on the Data Paths tab of the Options dialog).
1. In the Data Paths tab of the Options dialog, select the User Data Folder check
box.
2. Click the Browse button to open a file browser, then navigate to the location of
your choice and click OK.
The selected path is displayed in the User Data Folder text box. This is the
location where all user data (such as cases, conditions, filters, logs, and
templates) will be saved.
1. In the Data Paths tab of the Options dialog, select the User Application Data
Folder check box.
2. Click the Browse button to open a file browser, then navigate to the location of
your choice and click OK.
The selected path is displayed in the User Application Data Folder text box.
This is the location where all user application data (such as program settings
and other configuration files) will be saved.
Item Description
Logos Default report logo
Config Licensing and other global configuration files
ParseCache Parse cache files
Storage EnScript configuration files
On Windows operating systems, the default path for the global application data
folder is: \ProgramData\EnCase\EnCase[version year]-<#>.
The path used to store global application data is displayed on the Data Paths tab of
the Options dialog box. This path is not configurable.
• In the Data Paths tab of the Options dialog box, click the Open Path button next
to the Global Application Data Folder text box.
A file browser opens to the selected path.
You can process evidence on any machine on your network, including other
examiner machines. To enable a machine as an evidence processor, open the EnCase
Processor Node executable file. This file installs the following two components:
Installing the evidence processor node on your local machine enables it to be used as
a node by another examiner machine on your network.
Once installed and configured, the machine will appear as an available node in your
EnCase Examiner processor manager.
Note: Exit all instances of EnCase before running the Evidence Processor Node
installer.
1. Download the EnCase Processor Node zip file and extract its contents.
2. Open the Evidence Processor Node executable file. The self-extractor dialog is
displayed.
3. Click Setup. The Setup dialog is displayed.
4. Click Next. The Destination Folder dialog is displayed.
5. Accept the default path or click Change to enter another path, then click Next.
The Configuration dialog is displayed.
• Give the node a meaningful name. This name is displayed in the Processor
Node column of the Processor Manager tab.
• Enter the number of the port you want to use. The default is 443.
• You can execute multiple processing jobs simultaneously on a single
processor node. We recommend leaving the Max Jobs number set at 1.
• Specify the drives for the Evidence File Destination, the Evidence File Cache,
and the Case File Destination.
All paths must be specified in UNC format.
For the Evidence File Cache, use the fastest I/O available.
For detailed information about system requirements, see “System
requirements” on page 31.
Note: You can change these configuration settings after installation using
the processor node Edit dialog. See “Configuring processor nodes”
on page 282.
After installing the EnCase processor node, the wizard begins the EnCase Processor
Server (EnServer) installation process.
1. The EnCase Server Edition dialog is displayed after the processor node is
installed.
Note: The EnCase Server Edition dialog may display behind another open
dialog. If the process seems to be stuck after installing the processor node,
look for the EnCase Server Edition dialog.
2. Accept the default install path or browse to another path, then click Next. The
End User License dialog is displayed.
3. Select I agree and accept, then click Next. The Options dialog is displayed.
– If you are using License Manager, click Use License Manager and enter a
License Manager Key Path, License Manager .SAFE Key Path, and
License Manager Address.
• Select Run service as user if you do not want to run the service as a local
system account.
6. Click Finish. A dialog is displayed showing License Manager files are being
copied, then the Evidence Processor Node Setup dialog is displayed, indicating
the setup is complete.
7. Click Finish.
You may also see an error stating “...restarting script...EnServer.” This is displayed
when you manually start the EnCase Processor Server service.
All of the logs listed above should be present; if not, EnCase Processor Server
started, then stopped, and is offline.
Pathways provide step by step guidelines to walk you through specific workflow
scenarios. Each Pathway contains links that take you to individual steps in the
workflow process.
You can access Pathways from the EnCase Home page or application toolbar. If you
exit the Pathway, or your workflow navigates you away from the Pathway, you can
always return to the Pathway from one of these two access points.
Upon installation, users are provided with two predefined pathways that will assist
them to:
Users can further customize these two pathways and create more custom pathways
that can be shared with other users.
Getting started
To get started with a Full Investigation, the pathway suggests five steps:
• Create a case
• Add evidence
• Audit your drive space
• Determine the time zone of your evidence
• Apply a hash library to your case
2. You can follow the steps for the case you have open, or you can start a new case
by clicking Create a new Case. For more information, see “Creating a new case”
on page 118.
3. Once you create a case, the next step is to add evidence to it. Back on the Full
Investigation page, click Add Evidence to Your Case.
The Add Evidence page is displayed.
4. Click the appropriate link and follow the instructions to perform any of the
available “add evidence” actions. This must be done before any processing is
done on the evidence. For more information, see “Adding evidence to a case”
on page 121.
5. After evidence is added, the next step is to audit the space of all devices in the
case. This must be done before any processing is performed on the evidence.
This process builds a summary table in the bookmarks tab showing the space
used for all devices in the case. Additional tables are built in the bookmarks tab
for each device, to account for all space on each drive. For more information, see
“Audit drive space” on page 220.
6. Now that your drive space is audited, the pathway leads you towards setting a
time zone for your evidence. This step parses the System Registry Hive, to
determine the current control set, and then parses the current control set, to
retrieve the time zone information for each of the selected evidence files. To
preserve the forensic accuracy of the data, this must be done before any
processing is done on the evidence. On the Full Investigation page, click
Determine the Time Zone of the Evidence. For more information, see
“Determining the time zone of your evidence” on page 327.
7. On the Full Investigation page, click Apply Hash Library to Your Case. For
more information, see “Adding hash libraries to a case” on page 422.
The Apply Hash Library to Your Case dialog opens.
Processing evidence
Once you have set up your case and added evidence, you can process it in a variety
of ways. Once you have processed your evidence with one of the processing profiles
listed below, you will be unable to reprocess it with another Pathway Profile. Any
further processing should be done using the Custom profile option.
Once a processing profile is selected, you can view its progress by double clicking
the progress bar on the bottom right of the screen.
– System Info Parser (no live registry, includes all advanced folders)
– All Windows artifacts (including unallocated sectors)
Once you process your evidence files, you can now find information in a variety of
ways.
– All Files over specified Size Filter enables you to specify a logical size value
and find all files exceeding that value
– All Files by file Extension Filter enables you to define specific extensions to
search for
• Select the view options to see different aspects of your evidence. These options
only work if email messages and/or internet artifacts were selected during
processing. Selecting either one of these options takes you to the Artifacts tab.
– View emails
– Search Index enables you to perform an index search. Indexing must have
been included in the selected processing option.
Generating reports
After you have found the information you need, you can generate reports in a
variety of ways.
• Create a customized report using report templates. See “Using report templates”
on page 499.
• Generate an HTML Triage report, to easily share your findings in HTML format.
See “Triage report” on page 492.
Getting started
To get started with a triage case, the pathway suggests three steps:
• Create a case
• Add evidence
• Apply a hash library to your case
1. On the EnCase application toolbar, click Pathways > Preview and Triage.
The Preview and Triage page is displayed.
2. You can follow the steps for the case you have open, or you can start a new case
by clicking Create a new Case. For more information, see “Creating a new case”
on page 118.
3. Once you create a case, the next step is to add evidence to it. Back on the
Preview and Triage page, click Add Evidence to Your Case. The Add Evidence
page is displayed.
4. Click the appropriate link and follow the instructions to perform any of the
available add evidence actions. For more information, see “Adding evidence to
a case” on page 121.
5. On the Preview and Triage page, click Apply Hash Library to Your Case. For
more information, see “Adding hash libraries to a case” on page 422.
The Apply Hash Library to Your Case dialog opens.
Quick analysis
Once you have set up your case and added evidence, you can process it in a variety
of ways:
Once you process your evidence files, you can now find information in a variety of
ways.
– View emails
Generating reports
After you have found the information you need, you can:
• Generate an HTML Triage report, to easily share your findings in HTML format.
See “Triage report” on page 492.
Note: Help files are text files. For details about how to create a help file,
see “Using custom pathway headers” on page 100.
– Save your pathway
• Edit and delete a custom pathway
• Create and edit a custom pathway header (help file)
• Share custom pathways with other users
• The left pane displays all available options (alphabetically) that can be
added to a custom pathway.
The list is populated with standard options. It can be augmented with
additional script files (EnScript or EnPack), filters, conditions, and help files.
• The right pane displays the steps selected from the available options for
your new custom pathway.
2. To add options to your custom pathway, select an item from the left pane and
click Add.
3. To remove options from your custom pathway, select an item from the right
pane and click Remove.
4. Use the Up and Down buttons to rearrange options in the custom pathway you
are building. You can arrange options in a pathway in any order.
• Enter a descriptive name in the Option Name field. This is the name that
will be displayed when the custom pathway is activated.
• Click the Browse button, on the right side of the Option Path field, to
open a file browser, then navigate to the existing EnScript, EnPack,
condition, filter, or help file that you want to use for this new option.
7. When you finish building your custom pathway, click Save As.
The Save Pathway dialog opens.
• On the EnCase application toolbar, click Pathways then click the name of the
custom pathway you created.
The <Pathway Name> page is displayed.
The options included in the pathway display as links. Action links require a
case to be open for them to be active; if no case is open, the links are not
clickable. Action link types are:
• EnScripts (*.EnScript)
• EnPacks (*.EnPack)
• Conditions (*.EnCondition)
• Filters (*.EnFilter)
Notes
1. On the EnCase application toolbar, click Pathways > Edit / Delete Pathway >
Edit Pathway.
If only one pathway exists, the Pathway dialog opens, displaying the custom
pathway you have selected. Continue with step 3.
If multiple pathways exist, the Select Pathway dialog opens. Continue with step
2.
2. In the Select Pathway dialog, select the pathway you want to edit and click OK.
The Pathway dialog opens, displaying the custom pathway you have selected.
4. When done, click Save As to create a new pathway with your updated changes,
or click Save to save the changes to your original pathway.
1. On the EnCase application toolbar, click Pathways > Edit / Delete Pathway >
Delete Pathway.
The Delete Pathway dialog opens.
The header name displays within the structure of the pathway. When you click the ?
icon next to the header name, the associated help file displays in a dialog box.
Header files are .txt files that can contain some basic formatting.
The formatting of this template creates a header help dialog that looks like this:
1. Use the sample template to create each header file you need to add to your
custom pathway.
2. Edit the header file to include helpful information about the sequences of
options that are grouped under this pathway header.
3. Save the header file to a location of your choice, for example: C:\Users
\<username>\Documents\EnCase\Pathways\Help\.
Pathway header files are .txt files which can be added to custom pathways in the
same way as other custom options.
4. Click the Browse button, on the right side of the Option Path field, to open
a file browser, then navigate to the existing header file that you want to use.
This is the header help file associated with the pathway header.
5. When done, click OK.
The new option displays in the left pane of the Pathway dialog.
6. Select the newly-added option from the Options list and click Add to add the
header to your custom pathway.
7. Use the Up and Down buttons to place the header in custom pathway structure,
as needed.
8. Click Save to save the changes to your custom pathway.
9. Click Close to close the Pathway dialog.
The header is now displayed in your custom pathway structure.
Important
EnCase updates the PathwayOpts.ini and Pathways.ini files as necessary,
when custom pathways are added, edited, or removed from your system. No
File Type Default File Location in EnCase 22.1 Default File Location in EnCase 22.3
and Earlier or Later
PathwayO C:\ProgramData\EnCase\ C:\Users\<username>\Documents\
pts.ini EnCase<major.minor>-<install_ EnCase\Pathways
number>\Storage
(see Note 1)
Pathways C:\ProgramData\EnCase\ C:\Users\<username>\Documents\
.ini EnCase<major.minor>-<install_ EnCase\Pathways
number>\Storage
(see Note 1)
<name>.p C:\Users\<username>\Documents\ C:\Users\<username>\Documents\
athway EnCase\Custom Pathways EnCase\Pathways
(see Note 2)
Condition C:\Users\<username>\Documents\ C:\Users\<username>\Documents\
s EnCase\Condition EnCase\Condition
(see Note 2)
Pathway No default location C:\Users\<username>\Documents\
header EnCase\Pathways\Help
help
1. Copy the pathway file (<name>.pathway) and all its related resources (that is,
EnScript and EnPack scripts, filters, conditions, and text files containing the
header help) into the C:\Users\<username>\Documents\EnCase\Import folder.
Important
PathwayOpts.ini and Pathways.ini files are internally used by EnCase
and should not be copied.
2. Log in to EnCase and click Pathways on the application toolbar.
EnCase moves the files from the C:\Users\<username>\Documents\EnCase\
Import folder into the locations expected for pathway files. Upon a successful
import, the newly-added custom pathway is listed in the Pathways menu on
the application toolbar.
– If a resource file with the name as referred in the pathway had been
provided with the imported pathway in the import directory.
– If a resource file by that name already exists in the C:\Users
\<username>\Documents\EnCase\<related-resource>, where
<related-resource> is one of : Condition, Filter, Enscript, or
Pathways\Help.
• Pre-existing file are not overwritten during the import. In case of name
collision with files already existing in the relevant folders, the new files
are renamed by appending to the suffix “_nnn“ , where
“nnn“ represents a numeric sequence number that starts from 001. For
example, given a file named abc.pathway and if there is a file by the
same name in the Documents\EnCase\Pathways folder, the new file is
imported into this folder under the name abc_001.pathway.
Subsequently if abc.pathway is to be imported again, the new name
becomes abc_002.pathway. However, if you try to import abc_001.
pathway, the new name becomes abc_001_001.pathway.
This chapter describes how to use EnCase to create and start work on a case. It
explains the major components of the user interface, and how to use them to take
full advantage of EnCase features.
The purpose of this chapter is to get you started with EnCase case creation. This
chapter:
• Explains how to use the main features of this digital forensic tool.
• Describes the process of adding evidence to a case and setting case options.
• Shows how to work with cases.
The Home page contains several elements, each with a specific set of functions. In
descending order, they are:
Application toolbar Displays below the title bar and provides menus to access the major
areas of functionality. The menus and their selections remain static
throughout your investigation. Later sections in this chapter
describe them in more detail.
Tabs Displays a page that groups a portion of EnCase functions, similar to
tabs in web browsers. When you first open EnCase, only the Home
tab is displayed.
Tab toolbar Contains menus and buttons specific to the selected tab. Includes
back and forward arrows, which function the same as in a web
browser.
Page body Displays content according to the tab you are viewing.
2. If no users display, right-click Users and change the root path to point to the
current encryption key location for users and keymaster.
3. Select the desired user and enter the password for that user. Click Next.
The SAFE page appears.
4. If no SAFE servers display, right-click SAFEs and change the root path to point
to the location of the desired SAFE file.
5. Right-click the SAFE for which you want to set the options and click Edit.
The Edit <SAFE name> dialog opens.
• The Port selector enables you to change ports from the default 4445.
– When using a remote SAFE, select the Inbound Port that should be used
when communicating with the remote SAFE.
• Select Enable Nagle if you have a slow or bad connection and have
problems updating the agent. The Nagle algorithm improves the efficiency
of TCP/IP networks, although it increases latency. This selection applies to
all connections to nodes through this connection to the SAFE.
– Select None when the target system cannot establish a connection with a
client. All traffic is redirected through the SAFE server to increase
communication times. It also provides the investigator the ability to
obtain data otherwise not available.
– Enable Client to Node (Local) when the client (desktop application) and
the node (agent) reside on the same network, and the SAFE resides on a
different network. This allows data to transfer directly from the node to
the client, after the client successfully authenticates through the SAFE.
Note that the client uses the IP address that the node believes it has,
rather than the IP address the SAFE has for the node. In this
configuration, design the network so that all the company’s employees
are located on the corporate desktop network, and employ routing and
Network Address Translation (NAT).
– Client to Node (SAFE) enables Network Address Translation (NAT),
where a private IP address is mapped to a public IP address. Typically,
the SAFE and node reside on the same subnet, and the client on another.
This allows data to transfer directly from the node to the client, after the
client successfully authenticates through the SAFE. The client also uses
the IP address that the SAFE believes the node has, rather than the IP
address the node reports it has to allow a direct connection between the
client and node machine. This option is enabled by default.
– Node to Client is similar to the Client to Node (SAFE), except that the
node attempts the direct connection to the client. Use this option when
you want direct data transfer between the node and the client, and where
NAT or a firewall prohibits the node from sending data directly to the
local IP or default port of the client. Once you select this option, the client
return address configuration box and port selector become available to
enter the NAT IP address and custom port.
• Priority raises or lowers an agent’s resource usage for the thread that
controls the connection conducting a preview, acquisition, or sweep. Note
that this does not affect the agent process itself. This feature is useful for
investigating machines when the examination is very sensitive, or with
production servers constantly running CPU-intensive processes.
• When in Node to Client mode, provide the return address (Client return
address) and port (Port), so that the node connects to the client directly,
bypassing the firewall/policy restriction.
6. Click Finish.
The Choose Role dialog opens.
1. On the EnCase application toolbar, click SAFE > Logoff > Logoff.
A confirmation dialog opens.
2. Click Yes to confirm logging off the selected <SAFE name> (<User name> : <User
role>).
1. On the EnCase application toolbar, click SAFE > SAFE configuration (web).
Your default web browser will open a new page and point to the SAFE User
Login: <SAFEname:port>/Account/Login.
Where <SAFEname> is the name or IP address of the SAFE and <port> is the port
number of the SAFE you want to configure. The SAFE Sign in page and SAFE
User Login box are displayed.
2. Sign in via the default SAFE User Login method, or click the Sign In link in the
top right of the window to select a different sign in authentication method from
the drop-down list.
• Login - SAFE User Login is the default SAFE authentication method and
requires the user Private Key file, username, and password.
• Active Directory Login - This authentication method requires username and
domain for the Username field and password.
• RSA SecurID Login - This authentication method requires the username for
the RSA SecurID User field.
Note: Sign in via the Smart Card authentication method is not supported
via a web browser.
a. For SAFE User Login, click the Choose File button to open a file chooser
dialog box.
c. Enter the password and click Login to access the SAFE configuration page.
The SAFE configuration home page displays SAFE details and current
logged in user.
When the keymaster or administrative user is successfully signed in to the SAFE, all
SAFE configuration options are available from the menu. SAFE configuration
options will not be visible to other users.
• View
Lists details about the SAFE as well as the username of the active user.
SAFE Configuration menu options:
– Select Users to open the SAFE Users page, where authorized users can set up
user accounts to use the SAFE. For more information, see section 3.6 “Setting
up user accounts and permissions” in OpenText EnCase SAFE - User Help
(ISSAFE-H-UGD).
– Select Roles to open the Roles page, where authorized users can set up roles
for SAFE users. For more information, see section 3.5 “Setting up roles” in
OpenText EnCase SAFE - User Help (ISSAFE-H-UGD).
– Select Network Plugin Repository to open the Network Plugin Repository
page, where authorized users can install and configure SAFE agent plug-ins.
For more information, see section 3.8 “Configuring the Network Plugin
Repository” in OpenText EnCase SAFE - User Help (ISSAFE-H-UGD).
– Select Network to open the Network page, where authorized users can view
and edit the network of endpoints where agents are deployed.
– Select Event Logs to open the SAFE Event Logs page, where authorized users
can access event logs. For more information, see section 3.7 “Accessing event
logs” in OpenText EnCase SAFE - User Help (ISSAFE-H-UGD).
• Tools
– Select Generate Encryption Key to open the Generate Encryption Key page
where encryption keys can be generated for use with the SAFE. For more
information, see section 3.9 “Generating encryption keys” in OpenText EnCase
SAFE - User Help (ISSAFE-H-UGD).
• Backup
– Select the Backup button to create a SAFE backup. For more information, see
section 3.10 “Backing up the SAFE” in OpenText EnCase SAFE - User Help
(ISSAFE-H-UGD).
– Select SAFE Configuration Package to initiate the creation of a SAFE
Configuration Package. For more information, see section 3.11 “SAFE
configuration package” in OpenText EnCase SAFE - User Help (ISSAFE-H-
UGD).
– Select Auto Backup to open the Backup Configuration page and create a
backup schedule. For more information, see section 3.11 “SAFE configuration
package” in OpenText EnCase SAFE - User Help (ISSAFE-H-UGD).
– Select Mirror Settings to open the SAFE Mirror page, where you can view
members of a SAFE mirror set, add or remove members, or promote a
Secondary SAFE to be the new Primary SAFE of the mirror set. For more
information, see section 3.12 “Configuring and managing a SAFE mirror set”
in OpenText EnCase SAFE - User Help (ISSAFE-H-UGD).
– Select CheckIn Settings to open the Check In Settings page, where
administrative users can set and modify agent check in option. For more
xxx
• Enterprise:
– Network: Click this button to open the Network tab, where you can view and
edit the network of endpoints on which the agent is deployed.
– Roles: Click this button to open the Roles tab, which allows you to set up
roles for user accounts used to log on to SAFE. For more information, see
section 3.5 “Setting up roles” in OpenText EnCase SAFE - User Help (ISSAFE-H-
UGD).
– Users: Click this button to open the Users tab, which allows you to set up
user accounts used to log on to SAFE. For more information, see section 3.6
“Setting up user accounts and permissions” in OpenText EnCase SAFE - User
Help (ISSAFE-H-UGD).
– Events: Click this button to open the Events tab, which allows you to access
event logs. For more information, see section 3.7 “Accessing event logs” in
OpenText EnCase SAFE - User Help (ISSAFE-H-UGD).
– Network Plugin Repository: Click this button to open the Network Plugin
Repository tab, which allows you to access plug-ins installed in the SAFE
Network Plugin Repository. For more information, see section 3.8
“Configuring the Network Plugin Repository” in OpenText EnCase SAFE -
User Help (ISSAFE-H-UGD).
– Mirror Set: Click this button to open the Mirror Set tab, where you can view
members of a SAFE mirror set, add or remove members, or promote a
Secondary SAFE to be the new Primary SAFE of the mirror set. For more
information, see section 3.12 “Configuring and managing a SAFE mirror set”
in OpenText EnCase SAFE - User Help (ISSAFE-H-UGD).
• SAFEs: Displays the list of SAFE machines you are logged on to, when multiple
connections are available.
• Tools:
– Allow Remote Logon: Click this button to open the Allow Remote
Connection dialog, which allows you to grant access to a SAFE user without
the user having the permission in specific role.
– Generate Encryption Key: Click this button to open the Generate Encryption
Key wizard and generate encryption keys within the desktop application.
– Remote job monitor: Click this button to open the Remote job monitor tab,
which allows you to view and manage remote acquisition jobs.
• Details: Displays detailed information about the selected SAFE.
For detailed information about configuring the SAFE, see the SAFE User
Guide.section 3.12 “Configuring and managing a SAFE mirror set” in OpenText
EnCase SAFE - User Help (ISSAFE-H-UGD)
Templates contain specific, pre-defined case information fields for use in your
case. See “Case templates” on page 120 to create new templates or customize
existing templates that include the case information Name fields for your needs.
3. Enter values in the Case information table.
Case information items are user-configurable Name-Value pairs that document
information about the current case. Primarily, you use this user-configurable
information to insert into a Report.
To create case information items, click New on the Case information toolbar. To
edit case information items, select an item and click Edit on the Case
information toolbar. Double-click the Value of a Name field to add or edit that
value. Enter the value in the dialog box that opens and click OK to accept the
value.
4. Enter case name and location:
• Name: A text string to identify the case file. A case is a folder containing
many components, such as folders for temporary directories, tags, and
search results. The name specified in this field is used to name the case
folder, as well as components contained in that folder.
• Full case path: The folder where the case file is stored. This path is
determined by the Base case folder, followed by a subfolder with the case
name.
• Base case folder: The location where the above case folder is created. By
default, EnCase uses a folder beneath your My Documents folder.
5. Enter evidence cache locations:
• Use base case folder for primary evidence cache: Select this box if you want
to use the base case folder specified above for the case's primary evidence
cache. If you select this option, the Primary evidence cache folder field is
disabled.
• Primary evidence cache: EnCase uses cache files to speed up application
responsiveness, enhance stability, and provide scalability across large data
sets. The primary evidence cache folder is where EnCase saves and accesses
these files. You can create cache files in advance through the Evidence
Processor, and you can point to the folder that contains this cache data.
Although there is an evidence cache for each device in a case, the evidence
cache does not need to be stored with the evidence files. If cache files were
not created for a device, they are stored in this folder when the Evidence
Processor is run.
• Secondary evidence cache: EnCase allows you to specify a secondary
location for a previously created evidence cache. This allows you to specify a
folder on a network share or other location to store cache files. Unlike the
primary evidence cache folder, EnCase reads previously created files from
this location only. Evidence caches which do not exist in the Secondary
folder are stored in the Primary folder. Previously existing evidence caches
in the Secondary folder continue to be stored in the Secondary folder.
When you create a new case, the Options dialog displays a list of available
templates. Five standard templates are included with EnCase by default and have a
pound sign (#) prefix. Any additional templates will be listed in the Templates list.
You can create your own templates by saving any case as a template. The new
template will be displayed in the Templates list the next time a new case is created.
If you intend to create a number of cases with a similar structure, save one of them
as a template and use it to generate other cases. You can share case templates with
other users by sending them the case template file. When they install the template
file in the Templates folder, it will be available for use.
Although you can configure a new case using the blank template None, we
recommend using a template, as it simplifies the case creation process. Each case
template contains a uniquely configured set of the following elements:
If you click the Add Evidence link on the case page, the Add Evidence page is
displayed. At any time, you can use the back or forward buttons to help navigate
through the different Home tab pages.
The Add Evidence menu contains three sections: Add, Preview, and Acquire.
• Local Device: Initiates the process of adding a local device attached directly to
your local computer. This can be the main system drive, a device attached
through a Tableau write blocker, any other device connected to an internal bus
connection, optical media, card readers, or any device connected to a USB port.
You can also create a directory preview of a local device. For more information,
see “Adding a local device” on page 140.
• Evidence File: Specifies an evidence file to add to the active case. The following
formats are supported:
– EnCase Evidence files: Legacy Evidence File (*.E01) or Current Evidence File
(*.Ex01)
– Logical Evidence files: Legacy Logical Evidence File (*.L01) or Current Logical
Evidence File (*.Lx01)
– Apple Disk Image (*.dmg)
– Logical (AFF4–L) and physical AFF4 files: Advanced Forensic Format v4
(*.aff4) or Advanced Forensic Format v4 (Directory) (*.turtle)
Note: Both zip container (typically file extension *.aff4) and directory
container are supported and can be added as evidence to EnCase.
Multi-volume parsing is supported. Segments following the initial AFF4
file are expected to have an extension *.A01, *.A02, etc. appended to the
full file name of the original file. The parser stops reading at the first
segment that is missing.
– SafeBack File (*.001)
– VirtualBox Disk Image (*.vdi)
– Virtual PC File (*.vhd)
– Virtual Hard Disk v2 (*.vhdx)
– VMWare File (*.vmdk)
For more information, see “Adding other types of supported evidence files”
on page 228.
• Raw Image: Adds a raw or DD image file of a physical device to the active case.
For more information, see “Adding raw image files” on page 231.
• Network Share Using UNC Path: Select this option to add a directory preview of
a Universal Naming Convention (UNC) server and path. For more information,
see “Adding a UNC preview” on page 141.
• Network Target Using SAFE Agent: Select this option to add a directory
preview using the SAFE Network Preview workflow. For more information, see
“Creating a live directory preview” on page 142.
• Rapid Preview Using SAFE Agent: Select this option to conduct a rapid preview
and acquire data on a specific remote machine, on a common network. For more
information, see “Conducting a rapid preview using the SAFE agent”
on page 157.
• Check In Network Preview Job: Select this option to add a check in preview job
of an off network machine. For more information, see “Check in preview”
on page 143.
• Network Target Using Direct Agent: Select this option to add a direct network
preview device. For more information, see “Adding a direct network preview”
on page 161.
• Computer Using Crossover Cable: Select this option to add a crossover cable
preview. For more information, see “Crossover cable preview or acquisition”
on page 741.
Crossover cable acquisitions require both a subject and examiner machine. This
type of acquisition also negates the need for a hardware write blocker. It may be
desirable in situations where physical access to the subject machine’s internal
media is difficult or is not practical. This selection is the recommended method
for acquiring laptops and exotic RAID arrays.
• Email: Acquire a user’s email from a central email source (such as Microsoft
Exchange or Google Gmail), from on premises and cloud servers. For more
information, see “Acquiring from Microsoft Exchange” on page 161 and
“Acquiring email from Gmail” on page 176.
• Storage: Acquire a user’s files from a central file repository (such as Microsoft
SharePoint, Dropbox, or Google Drive), from on premises and cloud servers. For
more information, see “Acquiring from Microsoft SharePoint” on page 170,
“Acquiring evidence from Google Drive” on page 178, and “Acquiring from
cloud-based services” on page 182.
• Check In Remote Collection Job: Acquire evidence from remote collection jobs
for target machines that are off-network, such as laptop computer connecting
from a remote location. For more information, see “Check in remote collection”
on page 144.
• Social Media: Opens the Cloud Data Import Wizard, which allows you to pull
data from cloud-based services (such as Facebook, Google, or Twitter), provided
you have authentication tokens or the user’s account credentials. For more
information, see “Importing cloud data” on page 699.
• Mobile Device: Opens the Acquisition wizard, which detects the mobile device
you have plugged in to your computer and walks you through the acquisition
process. For more information, see “Acquiring mobile device data” on page 532.
• Mobile Backup File: Opens the Import wizard, which allows you to import a
backup file from a mobile device. For more information, see “Importing data”
on page 689.
Access the Case home page by opening a case from the home page or main menu.
The Case home page displays common links on the left side of the page. A summary
of categories found in evidence files in the case is shown on the right. The summary
shows a category when at least one example in that category was found in opened or
processed evidence files of a case. Once an evidence file is processed, the list of
categories may change as processing reveals greater details about artifacts.
Modify Case Information by clicking Case > Options or by selecting Options from
the Case home page. The Options dialog is displayed.
To add or edit case information items, click the appropriate button from the Case
information menu.
You cannot change the case name, full case path, or cache location from this view. To
change cache location see “Changing evidence cache location” on page 318.
Save Save the current case file. The default file extension for a case
file is .case. The default extension for a backup case file
is .cbak.
Save As Template Save the case as an EnCase template to use when creating new
cases.
Create Package Package a case to share with other users or environments.
Case Backup Create a backup of the current case. Alternately, it allows you to
specify a different case file or a case backup location.
Options Edit the case options for the active case.
Hash Libraries Open the Hash Libraries dialog box. Use this dialog box to view
a list of hash libraries and hash sets used in the current case or
to change, enable, or disable hash libraries or hash sets.
Close Close the active case file.
Open with Artifact Close the active case file, and opens the case with Artifact
Explorer Explorer. This option is only visible when the Prepare evidence
for use with Artifact Explorer check box is selected, See menu
Tools > Options, Global tab.
Open Open a case file. Note that you can have more than one case file
open at a time.
New Case Open the Case Options dialog, and create a new case file.
Open cases are listed below the New Case option. The current active case is
indicated with an orange arrow. Keyboard shortcuts can be used to switch between
cases.
Click OK. You can then re-associate the evidence to the new location when you drill
into the evidence or view the evidence for the first time. Saving the case commits the
change.
1. On the Evidence tab, click the check box for the evidence file where you want to
change the path, then click Update Paths.
2. In the Update Paths dialog, choose an existing path from the list.
4. Click OK.
An EnCase package can contain the entire contents of a case, including the evidence
and cache files, or a subset of case-related items. You can select which case items to
include when saving a case package.
2. The Create Package dialog offers several options for including case-related
material in an EnCase case package:
• The default Copy option includes only the Required Items for the case file
and the Primary Evidence Cache.
• If you click the Archive option, all Packaged Items are automatically
checked. Although you gain the advantage of packaging all evidence files
and the secondary evidence cache, the package size can be extremely large.
• If you click the Customize option, in the list of Packaged Items you can
manually check any combination of packaged items you want to include in
the case package.
3. Save the case package to a folder. Either use the default folder path or click the
browse button to navigate to a different folder.
1. On the Case page, click Application > Change case page logo.
The Change case page logo dialog is displayed.
2. Navigate to your desired image and change the display size if desired.
3. Click OK.
This chapter describes how to back up your cases and their related items, and how
to restore a case from backup.
• Name
• Created
• Size
• Custom Name (if available)
• Comment (if available)
The dashboard shows a list of all available case backups and sorts them by the
following types:
• Custom: This is a user created backup where you can provide a custom name
and comments. Custom backups are retained until explicitly deleted.
• Scheduled: A scheduled backup is created when you open a new case or
schedule a backup manually using the Create Scheduled option.
• Daily: Every scheduled backup that is closest to that day's local midnight time is
copied and stored as a daily backup.
• Weekly: Every daily backup that is closest to that week's Sunday local midnight
time is copied and stored as a weekly backup.
• Monthly: Every daily backup that is closest to that month's first day at local
midnight time of the next month is copied and stored as a monthly backup.
• 48 scheduled backups
• Seven daily backups
• Five weekly backups
Monthly backups are kept until the maximum size allowed is exceeded. The oldest
monthly backups are then deleted to stay under the maximum size allowed.
You can access the dashboard in three ways from the Case Backup option in the
Case menu:
• Use Current Case: Uses the backup location from the currently open and active
case.
• Specify Case File: Reads from and uses the backup location from an unopened
case file through an open file dialog.
• Specify Backup Location: Uses the backup location specified by the user
through a folder dialog.
The last backup folder location, maximum amount of disk space, and enable/disable
backup are saved in the global settings and automatically populated when you
create a new case.
• If you create a case with backup disabled, a dialog asks if you are sure you want
to disable backup for this case.
• A warning is displayed if the backup location is not a valid path.
• Choosing a backup and case folder on the same drive letter displays a warning
asking if you are sure you want to back up the case on the same drive as the case.
• Choosing a backup and evidence cache folder on the same drive letter displays a
warning asking if you are sure you want to back up the case on the same drive as
the evidence cache.
Note: It is good practice to have your backup in a different location from your
current data.
2. Enter needed information in the Name and location and Evidence cache
locations areas.
• Select or clear the Backup every 30 minutes check box. The box is selected
by default.
• Enter a Maximum case backup size (GB). The default is 50.
• Enter or browse to the Backup location.
4. Click OK.
To modify case backup options, click Case > Case Backup > Use Current Case. For
more information, see “Changing case backup settings” on page 131.
5. After the backup is scheduled, the Create Scheduled Backup dialog closes.
1. Click Case > Case Backup > Use Current Case. The dashboard is displayed.
4. To verify the custom backup was created, click the Custom folder in the
Backups directory.
1. Go to the dashboard using any of the options in the Case > Case Backup menu.
In the Backups directory, open the folder containing the backup you want to
delete.
2. Blue check the backup or backups you want to delete, then click Delete.
2. On the dashboard, click Change Settings. The Change Case Backup Settings
dialog is displayed.
3. You can:
1. Click Case > Case Backup > Specify Case File. The Open File dialog is
displayed.
2. Select the case file you want, then click Open. The dashboard is displayed for
the case file you selected.
1. Click Case > Case Backup > Specify Backup Location. The Browse for Folder:
Case Backup Location dialog is displayed.
2. Navigate to the location you want for the backup, then click OK.
• Case file
– Export folder
– Temp folder
• Primary evidence cache (only those evidence caches referenced in the case)
• Secondary evidence cache (only those evidence caches referenced in the case)
1. Open EnCase.
2. At the top left of the screen, click Case > Case Backup > Specify Backup
Location.
4. Select the case name in the left pane and click OK.
5. In the dashboard, select the folder in the Backups directory containing the
backup you want to restore.
7. The Restore Backup dialog is displayed. Click either Restore to original case
locations (default) or Restore to new locations, then click Next.
• If you click Restore to original case locations, the Name, Location, and Full
case path fields populate automatically and you cannot edit them. All other
options are disabled.
• If you click Restore to new locations, the Name, Location, and Full case
paths fields populate and you cannot edit them. However, all other options
are enabled, and you can change any of them.
With EnCase, you can directly process and analyze storage device and evidence file
previews with some limitations; however, if you want to use all of EnCase’s
processing and analysis features, you need to perform a storage device or evidence
file acquisition and save the evidence in a standard format.
With EnCase, you can reacquire and translate raw evidence files into EnCase
evidence files that include CRC block checks, hash values, compression, and
encryption. You can also add EnCase evidence files created in other cases. EnCase
can read from and write to current or legacy EnCase evidence files and EnCase
logical evidence files.
When you are logged into a SAFE, you can acquire storage devices from a network
preview. With the LinEn utility, you can perform disk-to-disk acquisitions, and
when you couple LinEn with EnCase, you can perform network crossover
acquisitions.
This chapter provides detailed information about all types of EnCase acquisitions.
• Previewed memory or local devices such as hard drives, memory cards, or flash
drives.
Note: It is not uncommon on live systems to have the on disk image of a file
system to differ from its current state. In this event, we recommend
flushing the operating system disk cache using the Sync command.
• Previewed devices connected to a SAFE such as hard drives, memory cards, or
flash drives.
• Devices on machines that check in to the SAFE from remote locations through
the internet.
• Evidence files collected using the Rapid Preview functionality.
• Evidence files supported by EnCase, including current EnCase evidence files
(.Ex01), current logical evidence files (.Lx01), legacy EnCase evidence files (.E01),
legacy logical evidence files (.L01).
• Logical (AFF4–L) and physical AFF4 files: Advanced Forensic Format v4 (*.aff4)
or Advanced Forensic Format v4 (Directory) (*.turtle).
• DD images, SafeBack images, VirtualBox Disk Image file (.vdi), VMware files
(.vmdk), Virtual PC files (.vhd), and Virtual Hard Disk v2 files (.vhdx). You can
use these to create legacy EnCase evidence files and legacy logical evidence files,
or you can reacquire them as EnCase .Ex01 or .Lx01 format, adding encryption,
new hashing options, and improved compression.
• Single files dragged and dropped onto the EnCase user interface. These include
ISO files, which create .L01 or .Lx01 logical evidence files.
• Mobile devices, using the Add Evidence > Acquire > Mobile Device menu.
• Mobile backup files, using the Add Evidence > Acquire > Mobile Backup File
menu.
• Network crossover using LinEn and EnCase to create .E01 files or .L01 files. This
strategy is useful when you want to preview a device without disassembling the
host computer. This is usually the case for a laptop, a machine running a RAID,
or a machine running a device with no available supporting controller.
• Online email, communication and collaboration platforms, and file storage
repositories, such as Amazon S3, Box, Dropbox, Facebook information file,
Google Workspace, Instagram, Microsoft Azure Blob, Microsoft Exchange,
Microsoft SharePoint, Microsoft Teams, Slack, Twitter, and Zoom.
• LinEn for disk-to-disk acquisitions that do not require a hardware write blocker.
• WinEn for acquiring physical memory from a live Windows computer.
• Tableau Forensic Duplicators (TD1, TD2, and TD3).
In addition to acquiring sources, you can also create a directory preview from the
following sources:
• Local device
• UNC path
• SAFE network preview
Live directory previews use the target operating system to create the preview. You
can browse the file structure, review files, and use conditions and filters. To avoid
errors, do not run directory previews through the evidence processor. Acquire the
evidence you want to process first.
1. From the table view of the Evidence tab, select the check box next to the item
you want to acquire.
– Current (Ex01): Ex01 is the default evidence file format. Ex01 files can be
encrypted. To select an encryption key, click the Encryption button and
select an encryption key from the Encryption Key dialog.
– Legacy (E01): E01 is the evidence file format used prior to EnCase
Version 7. E01 files can be password protected but not encrypted. To
password protect a file in the E01 format, click the optional Password
button, enter and confirm a password in the Password dialog box and
click OK.
• Select a hashing algorithm from the Verification Hash list:
– None
– MD5
– SHA-1
– SHA256
– SHA512
– All
• Specify Compression as Enabled or Disabled.
• Specify the File Segment Size (MB) (minimum: 30 MB, maximum:
8,796,093,018,112 MB, default: 2048 MB).
• Specify block size (minimum: 64, maximum: 1024). Higher block sizes allow
slightly faster acquisitions and smaller evidence files, but if an evidence file
becomes damaged, a larger block of data can be lost.
• Specify error granularity (what portion of the block is zeroed out if an error
is encountered):
– Reader Threads (enabled only if the file format is .E01) allow you to
control how many threads are reading from the source device (1-5
available, default is 0).
– Worker Threads (enabled for both EnCase Evidence file formats, .E01
and .Ex01) allow you to control data compression calculation (1-20
available, default is 5).
The status bar at the bottom of the page displays the progress of each acquisition
and processing. Once an acquisition completes, the Evidence Processor processes
that acquired image before it begins acquiring the next item.
1. At the bottom right corner of the main window, double click the Thread Status
line. The Thread Status dialog is displayed.
2. Click Yes. The acquisition is canceled. You can restart it at a later time.
You can also cancel remote acquisitions using the Remote Acquisition Monitor. See
“Monitoring a remote acquisition” on page 143.
EnCase evidence files provide forensic-level metadata, the device-level hash value,
and the content of an acquired device.
Drag and drop an .E01 or .Ex01 file anywhere in the EnCase interface to add it to the
currently opened case.
Legacy logical evidence files (.L01) are created from previews, existing evidence
files, or mobile device acquisitions. These are typically created after an analysis
locates some files of interest. For forensic reasons, they are kept in a forensic
container. Encryption is not available for legacy logical evidence files. You can create
and save logical evidence files in the .L01 format in order to be compatible with
legacy versions of EnCase (versions prior to EnCase 7).
When an .L01 or .Lx01 file is verified, the stored hash value is compared to the
entry's current hash value.
• If the hash of the current content does not match the stored hash value, the hash
is followed by an asterisk (*).
• If no content for the entry was stored upon file creation, but a hash was stored,
the hash is not compared to the empty file hash.
• If no hash value was stored for the entry upon file creation, no comparison is
done, and a new hash value does not populate.
Before you can acquire raw image files, you must add them to a case. Raw image
files are converted to EnCase evidence files during the acquisition process, adding
CRC checks and hash values if selected.
Note: If you encounter difficulty adding single files from a mapped drive, try
dragging and dropping the file from the UNC path.
1. From an open case, select Add Evidence > Add > Local Device from the menu
bar.
The Local Device dialog is displayed.
2. Select the check boxes of the corresponding local device choices you want to
view on the subsequent dialog. Available options are:
3. Click Next.
The Local Device dialog displays all local devices that match the selected
options.
Note: You can also select a live directory preview of available devices.
Live preview has the Live Device label and the BIOS Access type.
Before you begin your investigation, verify that the local drive to be acquired was
added to the case.
1. To protect the local machine from changing the contents of the drive while its
content is being acquired, use a write blocker. See “Using a write blocker”
on page 221.
2. Verify that the device being acquired shows in the Tree pane or the Table pane
as write protected.
1. From an open case, select Add Evidence > Preview > Network Share Using
UNC Path from the menu bar.
The Network Share Using UNC Path dialog is displayed.
2. Enter a UNC path using the standard path format for the operating system you
are accessing: \\hostname\sharename\path.
The Evidence tab is displayed, and a UNC preview entry is added to the
evidence table. The UNC path is displayed in the evidence Name field with the
icon followed by the UNC path. The Drive Type field indicates Live Device.
3. Click on the UNC path in the Name column to view the contents in Entries
view.
Note: The nature of a live preview means that the content on which the
preview is based can change until the actual evidence is acquired.
Before you begin, verify that the network device to be acquired has been added to
the case.
To protect the machine from changing the contents of the device while its content is
being acquired, use a write blocker. See “Using a write blocker” on page 221.
1. From an open case, select Add Evidence > Preview > Network Target Using
SAFE Agent from the menu bar.
The Network Target Using SAFE Agent dialog is displayed.
Live directory previews use the target operating system to create the preview. You
can browse the file structure, review files, and use conditions and filters but cannot
process evidence on directory previews. You must acquire the evidence you want to
process before you can invoke the evidence processor.
1. From the EnScript menu, select Remote Acquisition Monitor. The Remote
Acquisition Monitor is displayed.
• To see the current completion status of the acquisition of a device, select the
device and click Check Status.
• To cancel an acquisition, select the device and click Cancel Acquisition.
Configuration of the SAFE and agents is required to take advantage of this feature.
For details, see section 3.14.1 “Agent check-in configuration and management” in
OpenText EnCase SAFE - User Help (ISSAFE-H-UGD).
Targets initially indicate Awaiting Connection in the Status column. When a target
checks in, the SAFE holds open the connection, and the field in the Status column
changes to Available.
1. Navigate to the Remote job monitor tab and select a target machine with Ready
to Preview status.
4. Click Next.
The Add SAFE Network Preview dialog displays available network devices on
the target machine.
5. Select the device(s) on the target machine you want to preview and click Finish.
The selected previewed devices are added to the Evidence tab.
Configuration of the SAFE and agents is required to take advantage of this feature.
See the Check in Configuration section of the SAFE User Guide for details.
2. Navigate to the Evidence tab and select Add Evidence > Acquire > Check In
Remote Collection Job.
The Check In Remote Collection Job – Machines dialog is displayed.
3. Select one or more targets to collect from or click the Add Text List button to
enter the FQDN of one or more targets.
4. Click Next.
The Check In Remote Collection Job - Conditions dialog is displayed.
• Live (Rapid Collection) uses the cross-platform enhanced agent and can
collect from Windows and macOS (writes AFF4–L file format).
• Physical or logical (Windows only) uses the legacy enhanced agent and
collects from Windows OS only (writes Lx01 file format).
6. If the Live (Rapid Collection) is selected, the Scan folders for rapid collection
box is active. Enter folders to scan and collect.
If Physical or logical is selected, specify the drives to collect from and the
conditions to apply to the collection job. By default, all non-removable drives
are included in the check in remote collection job.
• If drives are specified in the Include drives text box, only those drives are
collected.
• If drives are specified in the Exclude drives text box, those drives are
excluded from the collection job.
• Select the Collect removable drives check box to include them in your
collection job.
• Use the Select or create a search condition box to select an existing or create
a new condition.
7. Apply a search condition from the Select or create a search condition box.
Note: Depending on the condition you choose, the search condition may
take more than one step to complete. For example, the Search File
Extension condition, shown below, takes two steps.
1. Navigate to the Remote job monitor tab to view the status of collection jobs.
2. Right-click on a completed job to view the context menu. Select from the Action
sub-menu:
• Copy Result copies the collection file from the SAFE machine to the
investigator machine.
• Delete deletes the file from the SAFE machine.
Notes
Before you can acquire data remotely using the enhanced agent, you must first add a
SAFE network preview.
1. Navigate to the Evidence tab and select Add Evidence > Preview > Network
Target Using SAFE Agent from the menu bar.
The Network Target Using SAFE Agent dialog is displayed.
2. Select one or more systems to preview. Click Next to display the devices within
each system.
Before you can store the acquisition result to Azure, you need to generate a SAS
(Shared Access Signature) Connection string from your Azure storage account.
1. Log in to Microsoft Azure portal with your Azure account and go to your
storage account.
a. In the Azure portal, in the Security + networking area, select Azure Access
Signature.
b. Select the following check boxes in the Allowed resource types area:
Service, Container, and Object.
3. Save the Connection string value for later use. This information is required for
configuring the SAS Connection string for the remote acquisition job (see step
8).
1. After adding a SAFE network preview, navigate to the Evidence tab and select a
target machine.
4. Click Next.
The Acquisition Criteria dialog is displayed.
5. Select the device(s) you want to acquire from the target machine.
6. Select an existing search condition or New to create a new search condition. See
“Conditions” on page 322.
Note: The following user condition options will not produce results when
acquiring data remotely using the enhanced agent: HashValue,
isProcessed, WasProcessed, IsIndexed, Hash Set Names, Hash Sets,
Evidence File, Tag, Item Type, From, Recipient, File Acquired, GUID,
Symbolic Link, IsHardlinked.
– Enter Domain Name, User Name, and Password to use to save the
output file in the specified location.
– The UNC Output Path must be valid and writable. Click Verify Path to
confirm that the enhanced agent has access to the UNC path.
• If you selected Azure, you must also configure the SAS Connection string
to access the Azure blob storage location. This value is generated from your
Azure storage account (see “To generate a SAS Connection string from
Azure:“ on page 148). SAS is usually time-bound; you must ensure that the
Connection string is valid long enough to perform the acquisition and
upload the results.
Click Verify SAS to confirm that the enhanced agent has access to the Azure
storage.
Important
When both Use job name for output LEF and Azure are selected, the
job name is used as the container name of the Azure storage. Azure has
special requirements for container names. If these requirements are not
satisfied, an error message is displayed when you click Finish.
When uploading evidence files to Azure storage blobs, the job name
must be unique, otherwise existing job in Azure storage blobs are
overwritten.
• Specify the maximum size allowed for the file, in terms of percentage of free
disk space of the remote machine.
Note: The amount of free disk space available on the remote machine
is displayed in the Free Space field. Use this number to inform your
selection of the maximum disk space the enhanced agent can use to
store the acquisition.
• Specify the maximum size allowed for the file, in gigabytes.
• Specify the output file segment size, in megabytes.
• Specify the Enhanced Agent Timeout, in hours.
9. Click Finish.
A result log file is also created in the same location as the acquisition job. It is a tab-
separated value (.tsv) file that lists the path to each file in the collection, whether or
not the file was successfully collected and, if an error was encountered, what
problem was encountered.
Rapid preview uses conditions following the same logic as remote data acquisition.
The cross-platform enhanced agent supports entry conditions for the following
operators:
Equal To
Not Equal To
Integer Equal To
Not Equal To
Greater Than
Greater Than Or Equal To
Less Than
Less Than Or Equal To
Matches
Range
Datetime Has A Value
Has No Value
Range
String Has A Value
Has No Value
Equal To
Not Equal To
Matches
Find
Contains
Logical Or
And
Not
Options
Fields
Description String
To manage remote acquisition jobs, navigate to View > Remote Job Monitor. The
Remote job monitor tab is displayed.
• The Remote Job Monitor is set to Auto Refresh job status every five minutes by
default. Click Refresh to update the job status immediately. Click Auto Refresh
to display the Auto refresh configuration dialog, where you can disable auto
refresh or change the auto refresh interval.
1. From the Remote job monitor tab, select a job to copy the results to a specified
location.
2. Click Action on the tab menu bar and select Copy Result. A system dialog is
displayed.
2. Click Action on the tab menu bar and select Stop. A stop request is sent to the
enhanced agent.
2. Click Action on the tab menu bar and select Delete. A request is sent to the
enhanced agent to delete any files on the node that were acquired as part of the
job.
2. Click Remove Job on the tab menu bar. The remote acquisition job is removed.
Note: If a job has failed, you must delete the files before the job can be
removed.
Status Description
Unknown This is the initial job state, before an update
was received from the remote agent.
Running A job is in progress and presently running.
Collection complete A collection job was successfully completed.
Status Description
Copying results A collection job was completed. The results
are presently being copied to the specified
location. This copy operation can be either
directly initiated from the monitor, or
scheduled when the job was created to take
place automatically upon successful
completion.
Results copied The copy operation was successfully
completed.
Stopping A Stop command was issued to a running
job. The agent has been informed of the
request, but the job has not stopped yet.
Stopped A Stop command was issued and the agent
has successfully stopped a formerly running
job. Files associated with the job may remain
on the node, but are likely incomplete.
Deleted A Delete command was issued to the agent
and it successfully deleted all files on the
node associated with the job.
Action canceled A Cancel Copy command was issued while
results were in the process of being copied.
The copy operation was canceled.
Job failed The job failed. Additional information
should be available in the Last Error column.
Agent unavailable EnCase attempted to contact the agent but
received no response. This can occur for
variety of reasons (for example, the node is
offline, network problems, node IP change,
etc.).
Agent communication error A remote agent was successfully contacted
about a status update, but EnCase did not
receive a reply; or, there was a problem with
the received data. More information might be
available in the Last Error column.
Fatal error A nontrivial and unexpected error occurred.
More information might be available in the
Last Error column.
Status Description
Job missing An agent was successfully contacted about a
job update, but responded that no such job
exists on the node. This can occur if job files
have been manually deleted (for example,
outside of EnCase), or if for some reason in a
multi-node configuration, IP addresses have
changed in such manner that the node being
contacted is different from the node on
which the job was created. In the latter case,
the user can utilize the Reconnect command
to resolve the situation.
Rapid preview can preview and collect from any machine with the standard EnCase
agent installed. The agent installed on macOS machines requires additional
configuration to access all folders. See section 4.10.4 “Enabling full disk access for
macOS agents” in OpenText EnCase SAFE - User Help (ISSAFE-H-UGD).
1. From an open case, select Add Evidence > Preview > Rapid Preview Using
SAFE Agent from the application toolbar.
If you are connected to a SAFE, the Rapid Preview page is displayed.
If you are not connected to a SAFE, follow the instructions provided in
“Logging on to a SAFE” on page 108, to log on to a SAFE.
2. On the Rapid Preview page toolbar, click Connect to connect to the machine
where you want to conduct the rapid preview.
The EnCase - Select Target dialog opens.
3. Enter the target FQDN or IP address (IPv4 or IPv6), and click OK.
Note: When no port is specified, the default port (defined by the SAFE) is
used. To specify a port for FQDN or IPv4, append a colon and add the
port number. To specify a port for IPv6, enclose the IP address in square
brackets, then append a colon and the port number.
You are now connected to the target machine. The Rapid Preview page now
shows the folders and files available for collection on the target machine.
The Rapid Preview page appears. Navigate the contents of the target machine from
the left tree pane. View the contents of a selected folder in the right pane.
1. On the Rapid Preview page, browse the folders displayed in the Tree view (left
pane).
The Table view (right pane) displays sub-folders and files in the selected folder.
2. Blue check the folders and files that you want to collect from the target machine.
4. Optional – In the top section, select an existing search condition, or create a new
condition to apply to the collection job. Optionally select or create search
conditions to apply to the collection.
5. Use the middle Scan Options section to indicate which files or folders to collect.
• All files and folders – Use this option to collect all files and folders from the
target machine. This option overrides any specific selected folders and files,
• Selected files and folders – Use this option to collect only those folders and
files selected from the Rapid Preview tab.
• Specific files and folders – Select this option to activate the Specific files
and folders text box and enter the files and folders to collect. Enter one file
or folder path per line. This option might be used where you know what
folders you want to collect from or do not want to use the tree view to
manually select items.
6. Use the field at the bottom of the window to enter the name of the collection file
and navigate to the desired location for the evidence file.
7. Enter the name of the collection evidence file in the field ad the bottom of the
window or navigate to the desired location for the evidence file, and click OK.
The collection process begins and runs in the background. The EnCase status
bar indicates the collection progress and the number of items collected. The
number of files to be collected is unknown in advance. If the collection is taking
too long, you can cancel the collection or navigate away from the Rapid
Preview page to perform other tasks.
When the data collection is complete or cancelled, the acquisition file is created
and the Rapid Preview page returns to a connected state. You can continue to
navigate the folders on the target machine to collect additional evidence files or
disconnect from the target machine when you are done with the data
collections.
If the collection is interrupted due to a lost connection with the target, the
application automatically attempts to reconnect and complete the collection
until an explicit cancel request is made by clicking the Cancel button. A
“Reconnect” message is displayed in the EnCase status bar to indicate the
interruption along with the number of reconnect attempts made. The collection
is paused until the application can reconnect to the agent.
A result log file is also created in the same location as the collection evidence
file. It is a tab-separated value (.tsv) file that lists the path to each file in the
collection, whether or not the file was successfully collected and, if an error was
encountered, what problem was encountered.
1. If the data collection is taking too long, click Cancel on the Rapid Preview page
toolbar.
A confirmation dialog opens.
1. Click Tools > Create Direct Agent. The first Logon dialog is displayed.
2. Select the public key you want to insert into the agent, then click Next. The
second Logon dialog is displayed.
Note: If the desired public key does not display, right-click in the dialog
and select Change Root Path, then browse to the location containing the
public key you want to use.
3. In the Agent List area, select the operating systems you want to create agents
for.
5. Enter an output path or browse to the destination folder you want to use.
6. Click Finish.
A status bar is displayed indicating the progress of the agent creation. When agent
creation is complete, the dialog closes.
1. From an open case, select Add Evidence > Preview > Network Target Using
Direct Agent from the menu bar.
The first Logon dialog is displayed.
2. Select the key you used to create the agents, enter the password, then click Next.
The Network Target Using Direct Agent dialog is displayed.
Note: If the desired public key does not display, right-click in the dialog
and select Change Root Path, then browse to the location containing the
public key you want to use.
• Get all physical memory enables the acquisition of the target’s RAM.
• Get all process memory breaks up the memory usage by process. Process
memory includes the processes currently stored in RAM.
3. Enter an IP address or machine name and select a port number, then click Next.
4. Select the device you want to add to the evidence image table, then click Finish.
EnCase Endpoint Investigator collects the emails from these services into a logical
evidence file, which can be imported directly into your case.
Configuration for your collection varies depending on version and whether the
repository is cloud-based or on-premises. Credentials used for authentication are for
the service account, not the user whose emails you are collecting.
For the latest versions of all supported software, refer to the most current EnCase
Endpoint Investigator Release Notes.
Mail is collected from the top level folders and their subfolders, including user-
defined folders. The predefined folders include: Inbox, Outbox, Sent, Drafts, Deleted
Items, Junk Email, Quarantine, and Archive. In-place Archives may also optionally
collected.
1. Create or open a case and click Add Evidence > Acquire > Email from the case
home page.
The Acquire Email dialog is displayed.
2. Select Exchange Server 2013 or Later from the drop down box.
Note: To acquire data from a cloud repository you must select the check
box to acknowledge that additional authorization may be needed to
acquire data from cloud-based sources.
3. Click Next.
The Email Properties dialog is displayed.
4. Double-click the name or value in each row of the table to set or change a value.
• Service URL - The address of your Exchange server. Enter the address of
your Exchange server if your organization has Exchange server on premises.
Use the default value if your Exchange server is hosted by Microsoft in the
cloud.
5. When you have set all values, click Test Connection. A valid connection is
required.
When a connection is confirmed, the Next button becomes active.
6. Click Next.
The Output Options dialog is displayed.
7. Enter or browse to the path for the folder you want the output files to be saved
in. Clicking the browse button displays the Output Evidence File dialog.
9. Select the Add Evidence To Case check box if you want to add evidence to the
active case. Click Finish.
EnCase Endpoint Investigator opens the Evidence tab and begins the
acquisition process.
• Add the service account via the command line. The following command adds
serviceaccount1 to the Discovery Management role group:
3. Select the admin roles tab above the list view on the right.
4. Click the plus + button to create a new role. The Role Group dialog is displayed.
6. In the Write scope drop-down, select Default to give members of this role
impersonation privilege over all the user accounts in the organization. You can
also select a custom scope that limits impersonation privilege to user accounts
in a certain group.
7. Click the plus button + above the Roles box to add a role and enter
ApplicationImpersonation as the role name.
9. Click Save. The service account now has the impersonation privilege.
The waiting period can be configured in the Email Properties dialog when setting
up an acquisition from Microsoft Exchange 2013 or Later. The initial and maximum
throttling delays are set to default values of 5 and 315 seconds, respectively, and are
the optimal values for most collections.
Data Types
Mail is collected from the top level folders and their subfolders, including user-
defined folders. The predefined folders include: Inbox, Outbox, Sent, Drafts, Deleted
Items, Junk Email, Quarantine, and Archive. The collector also retrieves Recoverable
Items, including its subfolders, excluding Audits. It may optionally collect In-Place
Archives and its subfolders Top of Information Store, and Recoverable Items and
their subfolders.
You can collect the following item types from Office 365 Exchange servers:
• Events on calendars
• Attachments to email and events, including:
– File attachments
– Outlook Item attachments.
– OneDrive attachments (OneDrive files attached as links)
– Reference attachments (links). Content and URL are currently not available.
The following data types are not supported: meeting messages, meeting requests,
meeting cancellations, and meeting responses.
1. Create or open a case and click Add Evidence > Acquire > Email from the case
home page.
The Acquire Email dialog is displayed.
2. Select Exchange Server on Office 365 or Exchange Server on Office 365 with
Archive from the drop down box.
Note: To acquire data from Microsoft Office 365 you must select the check
box to acknowledge that additional authorization may be needed to
acquire data from cloud-based sources.
3. Click Next.
The Email Properties dialog is displayed.
4. Double-click the name or value in each row of the table on the right to set or
change a value.
The box to the right of the table provides information about the highlighted
name, its description, whether or not a value is required or optional, and the
name of the connector used by the service.
Obtain the Client ID and Client Secret by registering a new application on the
portal.azure.com site. The Client ID is called Application (client) ID within
Azure and has the format, xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx.
Once the application is ready, use the Client ID, Client Secret, and Tenant value to
collect from email accounts and/or sites in this tenant.
When collecting from an Exchange Server and Exchange Server with Online Archive
it is possible for the server to delay, or throttle, the data requests. Throttling is
governed by set policies and parameters on the server. These policies and
parameters can be modified for the on-premises servers. For cloud-based
repositories, however, Microsoft alone decides what the governing policies for
throttling will be. To collect complete data sets from Exchange servers without
interruption, the throttling functionality waits for a set period of time before retrying
a given call if it encounters a throttling error. After the initial delay has expired, the
connector tries the throttled call again. If it is throttled again, the second wait period
is twice the size of the initial delay. Once the second wait period has expired, the
connector tries the throttled call yet again. This pattern continues until maximum
delay is reached, which is the total amount of wait time. If the call is still throttled
once the maximum delay has been reached, an error message is returned. Otherwise
the entire throttling functionality works transparently.
The waiting period can be configured in the Email Properties dialog when setting
up an acquisition from Exchange Office 365. The initial and maximum throttling
delays are set to default values of 5 and 315 seconds, respectively, and are the
optimal values for most collections.
EnCase supports several ways of collecting data from Exchange Server on Office 365
when a proxy server is used. The following proxy credentials must be configured in
the Email Properties dialog, when setting up acquisition from Exchange Server on
Office 36:
EnCase Endpoint Investigator collects the files from these services into a logical
evidence file, which can be imported directly into your case.
You can also preview a Microsoft SharePoint Office 365 OneDrive repository.
A preview enables the user to quickly view and evaluate files in the repository and
make decisions on what to collect.
Configuration for your collection varies depending on version and whether the
repository is cloud-based or on-premises. Credentials used for authentication are for
the service account, not the user whose documents you are collecting.
For the latest versions of all supported software, see the latest EnCase Endpoint
Investigator Release Notes.
You can collect document and picture libraries, and their subtypes, from SharePoint
2013 or later. Both online and on-premises servers are supported.
If the user does not have Administrative privileges (Full Access), the SharePoint
administrator must give the user the following permissions (by adding a new
Permission Policy Level):
List Permissions:
• Add Items
• Edit Items
• Delete Items
• View Items
• Open Items
• View Versions
• Delete Versions
Site Permissions:
• Browse Directories
• View Pages
• Use Remote Interfaces
• Open
When collecting from on-premises SharePoint 2013 and SharePoint 2016 servers, you
can use integrated Windows authentication for the current logged in user. Clicking
the Default Authorization check box means the security context of the current
Windows logged in user is used to authenticate access to the SharePoint server.
These are the Windows credentials (user name, password, and domain) of the user
running the application.
1. Create or open a case and click Add Evidence > Acquire > Storage from the case
home page.
The Acquire Storage dialog is displayed.
Note: To acquire data from a cloud repository you must select the check
box to acknowledge that additional authorization may be needed to
acquire data from cloud-based sources.
3. Click Next.
The Storage Properties dialog is displayed.
4. Double-click the name or value in each row of the table to set or change a value.
The box to the right of the table provides information about the highlighted
name, its description, whether or not a value is required or optional, and the
name of the connector used by the service.
• Service Address - The address of your SharePoint server. Enter the address
of your Exchange server if your organization has Exchange server on
premises. Use the default value if your Exchange server is hosted by
Microsoft in the cloud.
• Login - Enter the login of the service account.
• Password - Enter the password of the service account.
• Collect Document Versions - Collect all versions of the document (Yes/No).
• Is Online Repository - Is the repository you are collecting online? (Yes/No).
• Default Authorization - Use the default authorization? (Yes/No).
• Use SSL - Use Secure Socket Layer protocol (Yes/No).
• Repository URL - The URL of the repository you are collecting. (for
example, /sites/teamsite1)
• Ignore Certificate Errors - Ignore certificate errors encountered when
connecting to the server (Yes/No).
5. When you have set all values, click Test Connection. A valid connection is
required.
When a connection is confirmed, the Next button becomes active.
6. Click Next.
The Output Options dialog is displayed.
7. Enter or browse to the path for the folder you want the output files to be saved
in. Clicking the browse button displays the Output Evidence File dialog.
9. Select the Add Evidence To Case check box if you want to add evidence to the
active case. Click Finish.
EnCase Endpoint Investigator opens the Evidence tab and begins the
acquisition process.
You can also preview a Microsoft SharePoint Office 365 OneDrive repository. A
preview enables the user to quickly view and evaluate files in the repository and
make decisions on what to collect.
You can collect document and picture libraries, and their subtypes, from SharePoint
Office 365 OneDrive.
1. Create or open a case and click Add Evidence > Acquire > Storage from the case
home page.
The Acquire Storage dialog is displayed.
2. Select SharePoint Office 365 OneDrive from the drop down box.
Note: To acquire data from a cloud repository you must select the check
box to acknowledge that additional authorization may be needed to
acquire data from cloud-based sources.
3. Click Next.
The Storage Properties dialog is displayed.
4. Double-click the name or value in each row of the table to set or change a value.
The box to the right of the table provides information about the highlighted
name, its description, whether or not a value is required or optional, and the
name of the connector used by the service.
5. When you have set all values, click Test Connection. A valid connection is
required.
When a connection is confirmed, the Next button becomes active.
button will be inactive until you click the Test Connection button and
establish a valid connection. Clicking Finish with the Preview Cloud
Repository check box selected, closes the dialog box. For more information
about previews, see “Previewing evidence files from cloud-based sources”
on page 218.
6. Click Next.
The Output Options dialog is displayed.
7. Enter or browse to the path for the folder you want the output files to be saved
in. Clicking the browse button displays the Output Evidence File dialog.
8. Enter a name for the evidence file and click Save.
The Output Evidence File dialog is closed.
9. Select the Add Evidence To Case check box if you want to add evidence to the
active case. Click Finish.
EnCase Endpoint Investigator opens the Evidence tab and begins the
acquisition process.
You can collect document and picture libraries, and their subtypes, from SharePoint
Office 365.
1. Create or open a case and click Add Evidence > Acquire > Storage from the case
home page.
The Acquire Storage dialog is displayed.
2. Select SharePoint Office 365 from the drop down box.
Note: To acquire data from a cloud repository you must click the check
box to acknowledge that additional authorization may be needed to
acquire data from cloud-based sources.
3. Click Next.
The Storage Properties dialog is displayed.
4. Double-click the name or value in each row of the table to set or change a value.
The box to the right of the table provides information about the highlighted
name, its description, whether or not a value is required or optional, and the
name of the connector used by the service.
5. When you have set all values, click Test Connection. A valid connection is
required.
When a connection is confirmed, the Next button becomes active.
6. Click Next.
The Output Options dialog is displayed.
7. Enter or browse to the path for the folder you want the output files to be saved
in. Clicking the browse button displays the Output Evidence File dialog.
9. Click the Add Evidence To Case check box if you want to add evidence to the
active case. Click Finish.
EnCase Endpoint Investigator opens the Evidence tab and begins the
acquisition process.
To collect from SharePoint Office 365 and OneDrive, permissions are set in Microsoft
Azure using the Client Credentials (OAuth2 Client Credentials flow) security model.
An Access Token is created when you provide Tenant, Client ID, and Client Secret
values. This token is included with every SharePoint Office 365 API call for
collection.
Obtain the Client ID and Client Secret by registering a new application on the
portal.azure.com site. The Client ID is called Application (client) ID within
Azure and has the format, xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx.
Add a permission to your application. Select the Microsoft Graph API, and the
Application permissions type. Add the following permissions: Files.Read.All,
Sites.Read.All, and User.Read.All. Once the permissions are added, grant admin
consent to the application.
Once the application is ready, use the Client ID, Client Secret, and Tenant value to
collect from sites and/or user accounts.
• Use the Gmail workflow to acquire email, calendar events, labels, email
attachments, and calendar attachments.
• Use the Google Drive workflow to acquire files.
EnCase Endpoint Investigator collects from these services into a logical evidence file,
which can be imported directly into your case.
Files collected from Google Workspace services require specific permissions and
configuration. The same authorization and authentication workflow is used across
Google Workspace. This enables the collection from a target across multiple Google
Workspace services within an organization.
For the latest versions of all supported software, please refer to the most current
EnCase Endpoint Investigator Release Notes.
You can collect the following item types from Gmail servers:
In order to acquire from Gmail you must first connect to Google Gmail servers. See
“Connecting to Google Workspace” on page 179.
1. Create or open a case and click Add Evidence > Acquire > Email from the case
home page.
The Acquire Email dialog is displayed.
Note: To acquire data from a Google Gmail you must select the check box
to acknowledge that additional authorization may be needed to acquire
data from cloud-based sources.
3. Click Next.
The Email Properties dialog is displayed.
4. Double-click the name or value in each row of the table to set or change a value.
The box to the right of the table provides information about the highlighted
name, its description, whether or not a value is required or optional, and the
name of the connector used by the service.
• Private Key File - Enter the private key file of the service account.
• Private Key File Password - Enter the private key file password of the
service account. The default value is notasecret.
• Use SSL - Select Yes to use HTTPS or No to use HTTP to connect to the
server (Yes/No).
5. When you have set all values, click Test Connection. A valid connection is
required.
When a connection is confirmed, the Next button becomes active.
6. Click Next.
The Output Options dialog is displayed.
7. Enter or browse to the path for the folder you want the output files to be saved
in. Clicking the browse button displays the Output Evidence File dialog.
9. Select the Add Evidence To Case check box if you want to add evidence to the
active case. Click Finish.
EnCase Endpoint Investigator opens the Evidence tab and begins the
acquisition process.
In order to acquire from Google Drive you must first connect to Google Drive
servers. See “Connecting to Google Workspace” on page 179.
1. Create or open a case and click Add Evidence > Acquire > Storage from the case
home page.
The Acquire Storage dialog is displayed.
2. Select Google Drive from the drop down box.
Note: To acquire data from a cloud repository you must select the check
box to acknowledge that additional authorization may be needed to
acquire data from cloud-based sources.
3. Click Next.
The Storage Properties dialog is displayed.
4. Double-click the name or value in each row of the table on the right to set or
change a value.
The box to the right of the table provides information about the highlighted
name, its description, whether or not a value is required or optional, and the
name of the connector used by the service.
• Cloud Service Account - The service account created to access Google Drive.
See “Connecting to Google Workspace” on page 179.
• Private Key File - Enter the private key file of the service account.
• Private Key File Password - Enter the private key file password of the
service account. The default value is notasecret.
• Administrator Email - Enter the email of the administrator.
• Account to investigate - Enter the email address of the account to
investigate.
• Use SSL - Select Yes to use HTTPS or No to use HTTP to connect to the
server (Yes/No).
• Ignore Certificate Errors - Ignore certificate errors encountered when
accessing the server (Yes/No).
5. When you have set all values, click Test Connection. A valid connection is
required.
When a connection is confirmed, the Next button becomes active.
6. Click Next.
The Output Options dialog is displayed.
7. Enter or browse to the path for the folder you want the output files to be saved
in. Clicking the browse button displays the Output Evidence File dialog.
9. Select the Add Evidence To Case check box if you want to add evidence to the
active case. Click Finish.
EnCase Endpoint Investigator opens the Evidence tab and begins the
acquisition process.
To collect from the Google Drive cloud-based file storage system and Gmail, you
need to:
1. Log into:
• https://admin.google.com/
• https://console.cloud.google.com/
2. Create a Project
• https://console.cloud.google.com/projectcreate
• Give the project a name: New-Project
• https://console.cloud.google.com/apis
Select “ENABLE APIS AND SERVICES” at top of page
• In the API Library that opens, enable:
https://console.cloud.google.com/apis/library/gmail.googleapis.com
– Google Workspace: Google Calendar API
https://console.cloud.google.com/apis/library/calendar-
json.googleapis.com
• Admin SDK API
– Make sure the Google Drive API is enabled for the Google Drive
Connector as well as the Gmail Connector.
– Make sure the Gmail API is enabled for the Gmail Connector.
– Make sure the Google Calendar API is enabled for the Gmail Connector.
• https://console.cloud.google.com/iam-admin/serviceaccounts
• Select Project: New Project.
• Select “Create Service Account” at top of page.
○ Select Continue
– Step 3: Grant users access to this service account (optional)
○ Select Done
Note: While on the Consent screen, make your application type “internal.”
• https://console.cloud.google.com/iam-admin/serviceaccounts
• Actions: Edit Service Account
• Under Service account status, Show Domain-Wide Delegation
• Check box: Enable Google Workspace Domain-wide Delegation
• Product Name: EnCase
• Save
• Keys are needed for Google Suite Source in the EnCase product.
• https://console.cloud.google.com/iam-admin/serviceaccounts
• Actions: Create Key
• Radio Button: P12
• Create
• Private Key File auto downloads; note the password: notasecret
Note: You will need this when creating the Google Suite Source in
EnCase Information Assurance.
• https://console.cloud.google.com/iam-admin/serviceaccounts
• Under Domain wide delegation column, View Client ID and copy details.
Note: Make a note of the email address of the service account. You
will need this when creating the Google Suite Source in EnCase
Information Assurance.
• https://admin.google.com/
• Go to: Security.
• Go to: Advanced settings.
• Go to: Manage Domain Wide Delegation.
• API clients: Add New
The service account now grants domain-wide access to the Google Drive API and
Gmail APIs for all users of the domain.
• Amazon S3
• Box
• Dropbox
• Facebook
• Facebook information file
• Instagram
• Microsoft Azure Blob
• Microsoft Teams
• Slack
• Twitter
• Zoom
EnCase Endpoint Investigator collects the files from these services into a logical
evidence file, which can be imported directly into your case.
In order to collect files from Box, Dropbox, Instagram private accounts, Slack, and
Twitter (direct messages only) you must first get authorization from these
applications to access the user account(s) from where the information is collected.
You can obtain this authorization by using the Authorization Service. For
information about installing and configuring this service, see “Installing the
Authorization Service” on page 198 and “Configuring the Authorization Service to
run with HTTPS” on page 199.
For the latest versions of all supported software, please refer to the most current
EnCase Endpoint Investigator Release Notes.
You can also preview an Amazon S3 repository. A preview enables the user to
quickly view and evaluate files in the repository and make decisions on what to
collect.
1. Create or open a case and click Add Evidence > Acquire > Storage from the case
home page.
The Acquire Storage dialog is displayed.
Note: To acquire data from a cloud repository you must select the check
box to acknowledge that additional authorization may be needed to
acquire data from cloud-based sources.
3. Click Next.
The Storage Properties dialog is displayed.
4. Double-click the name or value in each row of the table to set or change a value.
The box to the right of the table provides information about the highlighted
name, its description, whether or not a value is required or optional, and the
name of the connector used by the service.
• AccessKey - The Amazon Web Services (AWS) access key to log into the
Amazon S3 account.
• SecretAccessKey - The AWS secret access key to log into the Amazon S3
account.
• Repository - The name of the Amazon S3 repository you are collecting from.
Enter * to collect all the repositories that the specified user owns.
• Collect Document Versions - Collect all versions of the document (Yes/No).
Enter Yes to collect all versions of a document or No to collect only the latest
version of a document.
• Use SSL - Use SSL/HTTPS to connect to the server (Yes/No).
• Secure String For Secret Key - Use a secure string to store the secret access
key (Yes/No).
• Maximum Number of Retry - Maximum number of times Amazon S3
service retries the request before returning an error.
• Service URL - (Optional) The endpoint to access with the AWS client. This
property is ignored when left blank or when Region is set.
• Region - (Optional) Allows you to access AWS services that are physically
located in a specific geographic region (for example,
RegionEndpoint.USEast1). This property is ignored when left blank.
5. When you have set all values, click Test Connection. A valid connection is
required.
When a connection is confirmed, the Next button becomes active.
6. Click Next.
The Output Options dialog is displayed.
7. Enter or browse to the path for the folder you want the output files to be saved
in. Clicking the browse button displays the Output Evidence File dialog.
9. Select the Add Evidence To Case check box if you want to add evidence to the
active case. Click Finish.
EnCase Endpoint Investigator opens the Evidence tab and begins the
acquisition process.
• Requires read permission to all the buckets and objects across all AWS accounts
from which data is collected.
• Needs to delegate read permission to the user so that the user can access all the
buckets and objects.
If there are resource-based policies assigned to buckets and objects to control access
to them, these policies need to allow read access to both the user and the AWS
account.
You can also preview a Box repository. A preview enables the user to quickly view
and evaluate files in the repository and make decisions on what to collect.
Before you can connect to a Box repository, you must first authorize your Box
application for content collections (see “Connecting to Box” on page 200).
1. Create or open a case and click Add Evidence > Acquire > Storage from the case
home page.
The Acquire Storage dialog is displayed.
2. Select Box from the drop down box.
Note: To acquire data from a cloud repository you must select the check
box to acknowledge that additional authorization may be needed to
acquire data from cloud-based sources.
3. Click Next.
The Storage Properties dialog is displayed.
4. Double-click the name or value in each row of the table to set or change a value.
The box to the right of the table provides information about the highlighted
name, its description, whether or not a value is required or optional, and the
name of the connector used by the service.
5. When you have set all values, click Test Connection. A valid connection is
required.
When a connection is confirmed, the Next button becomes active.
6. Click Next.
The Output Options dialog is displayed.
7. Enter or browse to the path for the folder you want the output files to be saved
in. Clicking the browse button displays the Output Evidence File dialog.
9. Select the Add Evidence To Case check box if you want to add evidence to the
active case. Click Finish.
EnCase Endpoint Investigator opens the Evidence tab and begins the
acquisition process.
Note: Artifacts collected from a Box repository are displayed in the Artifacts
tab. For detailed information about these artifacts, see section 3.1.1.2 “Box” in
OpenText EnCase - Artifact Reference Help (ISEA-H-URE).
You can also preview a Dropbox repository. A preview enables the user to quickly
view and evaluate files in the repository and make decisions on what to collect.
Before you can connect to a Dropbox repository, you must first authorize your
Dropbox application for content collections (see “Connecting to Dropbox”
on page 203).
1. Create or open a case and click Add Evidence > Acquire > Storage from the case
home page.
The Acquire Storage dialog is displayed.
Note: To acquire data from a cloud repository you must select the check
box to acknowledge that additional authorization may be needed to
acquire data from cloud-based sources.
3. Click Next.
The Storage Properties dialog is displayed.
4. Double-click the name or value in each row of the table to set or change a value.
The box to the right of the table provides information about the highlighted
name, its description, whether or not a value is required or optional, and the
name of the connector used by the service.
5. When you have set all values, click Test Connection. A valid connection is
required.
When a connection is confirmed, the Next button becomes active.
6. Click Next.
The Output Options dialog is displayed.
7. Enter or browse to the path for the folder you want the output files to be saved
in. Clicking the browse button displays the Output Evidence File dialog.
9. Select the Add Evidence To Case check box if you want to add evidence to the
active case. Click Finish.
EnCase Endpoint Investigator opens the Evidence tab and begins the
acquisition process.
Note: Acquiring user data from Facebook cloud services requires prior
installation of the Mobile Driver Pack. See “Installing the Mobile Driver Pack”
on page 527.
1. Create or open a case and click Add Evidence > Acquire > Social Media from
the case home page.
The Output File settings dialog is displayed.
2. Enter Name, Evidence Number, Case Number, Examiner Name, and Notes.
The default Output Folder can be changed by clicking on the ellipsis button and
navigating to a different location.
8. Select the optional date range check box to activate the date range chooser and
choose a date range, or leave the check box cleared to return files with any
available date.
You can run the resulting evidence file through the Social Media parser in the
evidence processor in order to view the acquired Facebook evidence in the Social
Media Artifacts tab. See “Parsing social media artifacts” on page 257.
1. Create or open a case and click Add Evidence > Acquire > Storage from the case
home page.
The Acquire Storage dialog is displayed.
3. Click Next.
5. Enter the full path to the Facebook information file, or browse to the location
where the file was downloaded and select the file. Click OK.
7. Click Next.
The Output Options dialog is displayed.
8. Enter the full path of the output evidence file (including the “.Lx01” extension).
Alternatively, click the browse button and use the Output Evidence File dialog
to navigate to the location where the output evidence file (“.Lx01”) should be
saved.
9. Select the Add Evidence To Case check box if you want to add this evidence to
the active case. Click Finish.
EnCase Endpoint Investigator starts parsing the Facebook information file.
When the parsing is complete, the resulting evidence is displayed in the
Evidence tab.
A Logical Evidence File (LEF) is created.
Note: Artifacts collected from a Facebook information file are displayed in the
Artifacts tab. For detailed information about these artifacts, see section 3.2.3.2
“Facebook (Information File)” in OpenText EnCase - Artifact Reference Help
(ISEA-H-URE).
You can also preview an Instagram repository. A preview enables the user to
quickly view and evaluate files in the repository and make decisions on what to
collect.
Before you can connect to a private Instagram repository, you must first authorize
your Instagram application for content collections. To collect from a public
Instagram repository, you need to be logged in to any Instagram account. For more
information, see “Connecting to Instagram” on page 205.
1. Create or open a case and click Add Evidence > Acquire > Storage from the case
home page.
The Acquire Storage dialog is displayed.
Note: To acquire data from a cloud repository you must select the check
box to acknowledge that additional authorization may be needed to
acquire data from cloud-based sources.
3. Click Next.
The Storage Properties dialog is displayed.
4. Double-click the name or value in each row of the table to set or change a value.
The box to the right of the table provides information about the highlighted
name, its description, whether or not a value is required or optional, and the
name of the connector used by the service.
5. When you have set all values, click Test Connection. A valid connection is
required.
When a connection is confirmed, the Next button becomes active.
6. Click Next.
The Output Options dialog is displayed.
7. Enter or browse to the path for the folder you want the output files to be saved
in. Clicking the browse button displays the Output Evidence File dialog.
9. Select the Add Evidence To Case check box if you want to add evidence to the
active case. Click Finish.
EnCase Endpoint Investigator opens the Evidence tab and begins the
acquisition process.
You can also preview a Slack repository. A preview enables the user to quickly view
and evaluate files in the repository and make decisions on what to collect.
1. Create or open a case and click Add Evidence > Acquire > Storage from the case
home page.
The Acquire Storage dialog is displayed.
Note: To acquire data from a cloud repository you must select the check
box to acknowledge that additional authorization may be needed to
acquire data from cloud-based sources.
3. Click Next.
The Storage Properties dialog is displayed.
4. Double-click the name or value in each row of the table to set or change a value.
The box to the right of the table provides information about the highlighted
name, its description, whether or not a value is required or optional, and the
name of the connector used by the service.
5. When you have set all values, click Test Connection. A valid connection is
required.
When a connection is confirmed, the Next button becomes active.
6. Click Next.
The Output Options dialog is displayed.
7. Enter or browse to the path for the folder you want the output files to be saved
in. Clicking the browse button displays the Output Evidence File dialog.
9. Select the Add Evidence To Case check box if you want to add evidence to the
active case. Click Finish.
EnCase Endpoint Investigator opens the Evidence tab and begins the
acquisition process.
You can also preview a Twitter repository. A preview enables the user to quickly
view and evaluate files in the repository and make decisions on what to collect.
1. Create or open a case and click Add Evidence > Acquire > Storage from the case
home page.
The Acquire Storage dialog is displayed.
Note: To acquire data from a cloud repository you must select the check
box to acknowledge that additional authorization may be needed to
acquire data from cloud-based sources.
3. Click Next.
The Storage Properties dialog is displayed.
4. Double-click the name or value in each row of the table to set or change a value.
The box to the right of the table provides information about the highlighted
name, its description, whether or not a value is required or optional, and the
name of the connector used by the service.
• Dev Label - An optional label used to collect public tweets, in the following
format:
30day/<ENV>: To collect only the tweets from the most recent 30 days (for
example: 30day/ProdEnvRecent30Day).
fullarchive/<ENV>: To collect the full archive between 2006 and the current
date (for example: fullarchive/ProdEnvFullArchive).
where <ENV> is the Dev environment label of your custom Dev
environment.
• From Date - Enter the earliest date to collect, in the format YYY-MM-DD.
Default is 30 days before To Date (when specified), or from the current date
(when To Date is empty).
• To Date - Enter the most recent date to collect. Default is today.
• Initial Throttling Delay - The initial delay (in seconds) for timeouts in
exponential backoff. (Default: 0)
• Maximum Throttling Delay - The maximum delay (in seconds) for timeouts
in exponential backoff. (Default: 0)
• Public and private channel conversations in which the target Zoom user
participated. This includes conversation metadata, the messages within the
conversation (both content and metadata), audio and video message attachments
(except for message reactions).
• Direct messages in which the target Zoom user participated.
• Group chats in which the target Zoom user participated.
• Meetings in which the target Zoom user participated. This includes the audio
(.m4A), video recordings (.mp4), chat (.txt), and audio transcripts (.vtt) (if they
are enabled) for every meeting instance of a meeting.
Tip: A meeting instance refers to any time a meeting started and ended.
The target user must first authorize the Zoom application for content collections. For
more information, see “Connecting to Zoom” on page 211.
You can also preview a Zoom repository. A preview enables the user to quickly
view and evaluate files in the repository and make decisions on what to collect.
1. Create or open a case and click Add Evidence > Acquire > Storage from the case
home page.
The Acquire Storage dialog is displayed.
Note: To acquire data from a cloud repository you must select the check
box to acknowledge that additional authorization may be needed to
acquire data from cloud-based sources.
3. Click Next.
The Storage Properties dialog is displayed.
4. Double-click the name or value in each row of the table to set or change a value.
The box to the right of the table provides information about the highlighted
name, its description, whether or not a value is required or optional, and the
name of the connector used by the service.
• Account Key - The Zoom access key to log into the Zoom account.
• Client ID - Enter the Client ID associated with the Zoom account.
• Client Secret - Enter the Client Secret associated with the Zoom account.
5. When you have set all values, click Test Connection. A valid connection is
required.
When a connection is confirmed, the Next button becomes active.
6. Click Next.
The Output Options dialog is displayed.
7. Enter or browse to the path for the folder you want the output files to be saved
in. Clicking the browse button displays the Output Evidence File dialog.
9. Select the Add Evidence To Case check box if you want to add evidence to the
active case. Click Finish.
EnCase Endpoint Investigator opens the Evidence tab and begins the
acquisition process.
The Authorization Service is hosted by Internet Information Service (IIS) and enables
you to gain authorization to a Box, Dropbox, Instagram, Slack, or Twitter
application, for content collection.
Before you install the Authorization Service, make sure the machine on which the
service is installed:
• Confirm the EnCase machine has Internet access using a supported browser.
• Make sure the Windows Administrator account has sufficient permissions for
accessing IIS.
• Login to your target installation machine using a local or domain administrator
account. Make sure the account has Read/Write permissions for IIS.
• For optimal security, OpenText recommends running the Authorization Service
using HTTPS.
The installer checks for .NET Framework 4.7.2. The Authorization Service
installation wizard is displayed. Click Next.
2. On the End-User License screen, click I agree and accept, then click Next.
The Custom Setup dialog is displayed.
3. Browse to another installation path or accept the default. Click Next to proceed.
The Database Connection Configuration dialog is displayed.
4. Specify a domain/local user. This user should be the person configuring the
service to get authorization. When done, click Next.
A confirmation dialog is displayed.
5. If desired, check the Install SSL certificate for HTTPS to enable certificate
installation.
Select a PFX file, and enter a password for the file. Then click Next.
A confirmation dialog is displayed.
1. Open IIS.
If you installed an SSL certificate during the Authorization Service installation, you
may skip this section.
1. From your Start menu, navigate to Control Panel > Administrative Tools >
Internet Information Service Manager.
2. Click the Server Certificates icon. All installed certificates are displayed.
6. Click OK.
For best security, OpenText recommends that you use the HTTPS version of the
Authorization Service shortcut (if not already configured to use HTTPS by default).
2. Modify the URL field by changing http to https, and assign the correct port
number.
3. Click OK.
For best security, OpenText recommends that you remove unused HTTP binding.
1. From your Start menu, navigate to Control Panel > Administrative Tools >
Internet Information Service Manager.
You can also optionally request that notification suppression be enabled for the
application and the admin/co-admin account. This ensures that download
notification emails to collaboration users are not sent when documents are
downloaded during collections.
If you want to collect from managed users’ trash through an admin (or a co-admin)
account, you need to have “GCM scope” enabled for your Box application. GCM
stands for Global Content Management. When GCM scope is enabled for an app, it
means the app is whitelisted to allow admins (and co-admins with “View Users’
Content” privilege) access to trash content owned by other users. You need to call
Box Customer Support and have the scope enabled for your app. Since this is an app
setting rather than an enterprise setting, you will need to enable “GCM scope” for
every app you create.
Note: Co-admin accounts cannot collect from other co-admin and admin
accounts. If such an account cannot be created, you can collect from any
existing Box.com account by logging into that account during the authorization
process.
– Manage Users
– Manage Groups
• Files and Folders:
• The statement that you are requesting As-User privileges be granted to your
admin account.
• Optional: Include notification suppression in the request to suppress
download notification emails generated from collection activities.
• The statement that the purpose of this request is to allow the admin to
collect from the managed accounts.
A sample email might read: “We need As-User privilege [and notification
suppression] for our admin account. Our API key is [API key]. Our admin email
address is [admin email address]. Our application is used for electronic
discovery. In this use case, a duly authorized administrative user collects
folders and files (and their associated metadata) from various managed user
accounts.”
Once the privilege is granted, Box.com will inform you directly via email.
When collecting from Box.com, the server may delay, or throttle, the data requests.
Throttling is governed by set policies and parameters on the server. As a cloud-
based repository, Box.com decides what the governing policies for throttling are. To
collect complete data sets from Box.com without interruption, the throttling
functionality waits for a set period of time before retrying a given call if it
encounters a throttling error. After the initial delay has expired, the connector tries
the throttled call again. If it is throttled again, the second wait period is twice the
duration of the initial delay. Once the second wait period has expired, the connector
tries the throttled call yet again. This pattern continues until maximum delay is
reached, which is the total amount of wait time. If the call is still throttled once the
maximum delay has been reached, an error message is returned. Otherwise the
entire throttling functionality works transparently.
The waiting period is configurable through the Initial Delay and Maximum Delay
parameters, and is optimized for most collections.
• Copy/paste the App key and App secret values into the appropriate
fields, then click Set App key and App secret.
a. Copy the URL on the authorization page and paste it into the Authorization
Service Location setting in your application.
b. Click OK.
Your Box.com application is ready for use.
In certain situations, you may have to go through the authorization process again.
For example:
• Your token expires after 60 days of inactivity. If you do not collect from Box.com
for over 60 days, you need to reauthorize your Box application to be able to
collect again.
• If your settings are cleared, you need to reset the client ID and client secret, and
then reauthorize your Box application.
Box SSO (Single Sign On) is supported through OKTA management service. The
authorization process remains the same, whether Box SSO is being used or not.
You can collect from both business team and personal Dropbox accounts.
To collect from either type of account, an Access Token must be generated and a set
of permissions (called “scopes”) must be enabled.
Each member of a Dropbox business team has his or her own team account. The
team can have one or more Admins. The access token created by the Admin account
can be used to collect from all the team member accounts including the Admin team
account. However, this access token cannot be used to collect from any member’s
personal account. To collect from a personal account, you need to log in as the
owner of the personal account and create a separate application.
Note: For collecting from a business team account, you must log into
an Admin account of the team.
b. Select the Scoped access and Full Dropbox options while creating the
application.
c. Provide a unique name for the application (for example, “EnCase - your
name”).
d. If you have a personal and business team account linked, select the account
(Personal or Team) that will own the application.
e. Click Create app.
f. Configure the application. These are minimal instructions. You will need to
complete the configuration per your organization’s requirements.
a. Copy the URL on the authorization page and paste it into the Authorization
Service Location setting in your application.
b. Click OK.
Your Dropbox application is ready for use.
To collect from a public Instagram account, you need to know the following
information:
• The username of the Instagram public account from which you are collecting
evidence (“target account”). This is the Instagram Handle to Collect field in the
Storage Properties dialog.
• The username of the Instagram account where you must be logged in (“sample
account”), during the collection from the target account. This the Instagram
Handle to login field in the Storage Properties dialog.
• The password of the Instagram account where you must be logged in, during the
collection from the target account. This the Instagram Password field in the
Storage Properties dialog.
Note: You do not need to know the password for the Instagram target account.
The Instagram “sample account” should not be locked. If Instagram has locked
this account, you must unlock it before you can start collecting the evidence.
Before you can collect from a private Instagram account, you must first authorize
your Instagram application for content collections, through developer.facebook.com.
This authorization requires the installation of the Instagram Authorization Service
(see “Installing the Authorization Service” on page 198) and configuring it to run
with HTTPS (see “Configuring the Authorization Service to run with HTTPS”
on page 199). Once installed, this service specifically assists you with the Instagram
authorization process.
A web page opens in your browser to walk you through the steps.
Copy/paste the URL into the Valid OAuth Redirect URIs field.
• Copy/paste the URL to your localhost/machine name (for example,
https://localhost (or) https://machinename) into the Deauthorize
Callback URL and Data Deletion Request URL fields.
e. Add the Instagram account to Instagram Testers.
• Navigate to Roles > Roles, click Add Instagram Testers and add the
target Instagram account.
• In your Instagram account, under Settings > Apps and Websites >
Tester Invites, approve the application.
f. Save the application.
g. Copy/paste the Instagram App ID and Instagram App Secret values into
the appropriate fields, then click Set Instagram App ID and Secret.
a. Copy the URL on the authorization page and paste it into the Authorization
Service Location setting in your application.
a. Copy the URL on the authorization page and paste it into the Authorization
Service Location setting in your application.
b. Click OK.
Your Slack application is ready for use.
To collect direct messages, the target user (that is, the account from which you are
collecting evidence) must first authorize the Twitter application for content
collections.
To collect public data (for example, tweets, retweets, replies, and likes), the
authorization is not needed.
Note: If you do not have a Twitter developer account, create one using
this link: X Developer Platform (https://developer.twitter.com/en/
products/twitter-api). Data collection on Twitter requires a paid Basic
developer account or higher.
2. Create and configure a Twitter standalone application. For details, see “To
create and configure a Twitter standalone application:“ on page 209.
3. To collect tweets from a specific time frame, create and configure a Dev
Environment using the Twitter Developer Portal. For details, see “To create and
configure a Twitter development environment:“ on page 209.
You can now use EnCase to collect public data from Twitter.
Note: Twitter is providing direct messages only for the most recent 30
days.
Twitter has an automated system that detects spam. If your application is
marked as spam, its functionality becomes limited, and the Twitter
Authorization Service can no longer be configured to collect direct
messages. If the service is already configured, you can continue to collect
direct messages.
1. In your Twitter developer account, expand Project & Apps and click Overview.
Note: Your developer account must have a Basic access level or higher.
Important
These credentials are shown only once and they cannot be later recovered
from the developer account. Save this information, as it is required by the
Authorization Service and EnCase application.
Note: Your developer account must have a Basic access level or higher.
2. In the left pane, expand Products and click Dev Environments under Premium.
The Dev Environments page opens. The following types of environments are
available by default:
If you start with a Full Archive environment and you define the Dev
environment label as ProdEnvFullArchive, the Dev Label will be fullarchive/
ProdEnvFullArchive).
5. From the App Name list, select the name of the Twitter standalone application
you created in “To create and configure a Twitter standalone application:
“ on page 209.
6. Click Complete set up.
Your Dev environment is now configured.
• In the Settings tab, click Edit beside App permissions. Select Read +
Write + Direct Messages and click Save.
• Click Edit beside Authentication settings, and enable enable 3-legged
OAuth.
• Copy the Authentication Settings > Callback URL provided by the
Twitter Authorization Service and paste it in your application in the
Authentication settings > callback URL. For example: https://test.
opentext.net:8086/TwitterAuthService.svc/AuthorizationCode.
a. Copy the URL on the authorization page and paste it into the Authorization
Service Location setting in your application.
b. Click OK.
Your Twitter application is ready for use.
Note: If you do not have a Zoom admin account, you need to create one
using the App Marketplace (https://marketplace.zoom.us/).
2. Ensure that your Zoom account has the following permissions enabled.
• To collect data about user lists, groups, and contacts: Under User
Management > Roles > Role Settings > User and Permission Management,
enable the following permissions:
Setting Permission
Users View
Groups View
Contacts View
• To create apps for development: Under User Management > Roles > Role
Settings > Advanced Features, enable the following permissions:
Setting Permission
Zoom for developers: JWT, OAuth, and Edit
Server-to-server OAuth app
Marketplace View
• To collect data from meeting recordings: Under User Management > Roles >
Role Settings > Account Management, enable the following permissions:
Setting Permission
Account profile Edit
Account settings Edit
Webinar settings Edit
Recording management Edit
View the recording content View
• To collect data from chat messages: Under User Management > Roles > Role
Settings > Chat Management, enable the following permissions:
Setting Permission
Chat channels View
Chat messages View
• To collect data archived chat messages: Under User Management > Roles >
Role Settings > Reports, enable the following permission:
Setting Permission
User activity reports: Chat history View
• To collect metadata about meetings and chats: Under User Management >
Roles > Role Settings > Dashboard, enable the following permissions:
Setting Permission
Meetings View
Zoom Chat View
a. Click Develop > Build an App, select the Server-to-Server OAuth app type
and enter a name for the application.
b. Review the following information auto-generated for your application: App
ID (Account Key), Client ID, and Client Secret. Save this information, as it is
required by the EnCase application (see step 4).
c. Fill in the following information for your application: field descriptions and
email address.
d. In the Scopes tab, add the following scopes: account:read:admin,
chat_channel:read:admin, chat_message:read:admin, contact:read:admin,
dashboard_im:read:admin, group:read:admin, meeting:read:admin,
recording:read:admin, report_chat:read:admin, user:read:admin.
e. Click Activate to activate the application.
Your Zoom application is ready for use. You can now use EnCase to collect data
from a Zoom target account.
Note: EnCase collects audio, video recordings, transcripts, and chat logs
only if the meeting was recorded. Any chat sent outside of the recording is
not captured in the chat log text file.
EnCase doesn’t collect message reactions, it only displays the channel
message stating that a reaction (GIF). The actual reaction (GIF) can be
viewed through the Zoom App.
For private and public channels, EnCase collects the past six months of
messages. This is a Zoom API limitation.
EnCase doesn’t collect meeting chat attachments. This is a Zoom API
limitation.
You can also preview an Azure Blob repository. A preview enables the user to
quickly view and evaluate files in the repository and make decisions on what to
collect.
1. Create or open a case and click Add Evidence > Acquire > Storage from the case
home page.
The Acquire Storage dialog is displayed.
2. Select AzureBlob from the drop down box.
Note: To acquire data from a cloud repository you must select the check
box to acknowledge that additional authorization may be needed to
acquire data from cloud-based sources.
3. Click Next.
The Storage Properties dialog is displayed.
4. Double-click the name or value in each row of the table to set or change a value.
The box to the right of the table provides information about the highlighted
name, its description, whether or not a value is required or optional, and the
name of the connector used by the service.
• Client ID - Enter the Client ID associated with the tenant account. The
format is xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx.
• Client Secret - Enter the Client Secret associated with the tenant account.
• Subscription - Enter the name or the ID of the subscription of Azure Blob
from which you are acquiring files. Enter * to acquire from all the
subscriptions to which the specified application has access.
5. When you have set all values, click Test Connection. A valid connection is
required.
When a connection is confirmed, the Next button becomes active.
Note: Artifacts collected from an Azure Blob repository are displayed in the
Artifacts tab. For detailed information about these artifacts, see section 3.1.1.4
“Microsoft Azure Blobs” in OpenText EnCase - Artifact Reference Help (ISEA-H-
URE).
Obtain the Client ID and Client Secret by registering a new application on the
portal.azure.com site. The Client ID is called Application (client) ID within
Azure and has the format xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx.
Grant access to the storage account (part of the resource groups/subscriptions) from
which you need to collect data. Add permissions to your application, as necessary,
and the Reader/Contributor role. Once the permissions are added, grant Owner role
to the application.
Once the application is ready, use the Client ID, Client Secret, and Tenant value to
collect from email accounts and/or sites in this tenant.
You can also preview a Microsoft Teams repository. A preview enables the user to
quickly view and evaluate files in the repository and make decisions on what to
collect.
1. Create or open a case and click Add Evidence > Acquire > Storage from the case
home page.
The Acquire Storage dialog is displayed.
2. Select Microsoft Teams from the drop down box.
Note: To acquire data from a cloud repository you must select the check
box to acknowledge that additional authorization may be needed to
acquire data from cloud-based sources.
3. Click Next.
The Storage Properties dialog is displayed.
4. Double-click the name or value in each row of the table to set or change a value.
The box to the right of the table provides information about the highlighted
name, its description, whether or not a value is required or optional, and the
name of the connector used by the service.
• Client ID - Enter the Client ID associated with the tenant account. The
format is xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx.
• Client Secret - Enter the Client Secret associated with the tenant account.
• Initial Delay - The initial delay (in seconds) for timeouts in exponential
backoff. (Default: 5)
• Maximum Delay - The maximum delay (in seconds) for timeouts in
exponential backoff. (Default: 315)
• User to investigate - Enter the user ID of the user to investigate. The format
is user.to.investigate@companyname.onmicrosoft.com.
5. When you have set all values, click Test Connection. A valid connection is
required.
When a connection is confirmed, the Next button becomes active.
You can collect the following item types from Microsoft Teams:
To collect from Microsoft Teams, permissions are set in Microsoft Azure using the
Client Credentials (OAuth2 Client Credentials flow) security model. An Access
Token is created when you provide Tenant, Client ID, and Client Secret values. This
token is included with every Teams API call for collection.
Obtain the Client ID and Client Secret by registering a new application on the
portal.azure.com site. The Client ID is called Application (client) ID within
Azure and has the format xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx.
Add a permission to your application. Select the Microsoft Graph API, and the
Application permissions type. Add the following permissions: Channel.ReadBasic.
All, ChannelMember.Read.All, ChannelMessage.Read.All, Chat.Read.All, Chat.
ReadBasic.All, Directory.Read.All, Files.Read.All, Group.Read.All,
GroupMember.Read.All, Sites.Read.All, Team.ReadBasic.All, TeamMember.Read.
All, and User.Read.All. Once the permissions are added, grant admin consent to
the application.
The connector utilizes Protected APIs. Microsoft requires approval to use those
APIs. Please review the information in Protected APIs in Microsoft Teams -
Microsoft Graph | Microsoft Docs (https://docs.microsoft.com/en-us/graph/teams-
protected-apis).
Once the application is ready, use the Client ID, Client Secret, and Tenant value to
collect from email accounts and/or sites in this tenant.
When collecting from Microsoft Teams it is possible for the server to delay, or
throttle, the data requests. Throttling is governed by set policies and parameters on
the server. These policies and parameters can be modified for the on-premises
servers. For cloud-based repositories, however, Microsoft alone decides what the
governing policies for throttling will be. To collect complete data sets from the
servers without interruption, the throttling functionality waits for a set period of
time before retrying a given call if it encounters a throttling error. After the initial
delay has expired, the connector tries the throttled call again. If it is throttled again,
the second wait period is twice the size of the initial delay. Once the second wait
period has expired, the connector tries the throttled call yet again. This pattern
continues until maximum delay is reached, which is the total amount of wait time. If
the call is still throttled once the maximum delay has been reached, an error message
is returned. Otherwise the entire throttling functionality works transparently.
The waiting period can be configured in the Storage Properties dialog when setting
up an acquisition from Microsoft Teams. The initial and maximum throttling delays
are set to default values of 5 and 315 seconds, respectively, and are the optimal
values for most collections.
1. Create or open a case and click Add Evidence > Acquire > Storage from the case
home page.
The Acquire Storage dialog is displayed.
• Amazon S3
• AzureBlob
• Box
• Dropbox
• Instagram
• Microsoft Teams
• SharePoint Office 365 OneDrive
• Slack
• Twitter
• Zoom
Note: To acquire data from a cloud repository you must select the check
box to acknowledge that additional authorization may be needed to
acquire data from cloud-based sources.
3. Click Next.
The Storage Properties dialog is displayed. The properties displayed may vary,
depending on the selected source.
4. Double-click the name or value in each row of the table to set or change a value.
The box to the right of the table provides information about the highlighted
name, its description, whether or not a value is required or optional, and the
name of the connector used by the service.
5. Select the Preview Cloud Repository check box to preview the content of the
repository in the entries view.
The Next button becomes a Finish button.
6. Click Test Connection. A valid connection is required.
When a connection is confirmed, the Finish button becomes active.
7. Click Finish.
A preview is created in the Evidence tab.
For Amazon S3, the preview name is “Preview” appended to the repository
name.
For Box, Dropbox, Microsoft Teams, and SharePoint Office 365 OneDrive, the
preview name has the prefix “Preview” appended to the user account name. For
example, “Preview user.to.investigate@companyname.com”.
For Azure Blobs, the preview name is “Preview *” (when you acquire from all
the subscriptions to which the specified application has access) or “Preview
SubscriptionName” (when you acquire from a specific Azure Blob subscription).
For Instagram, the preview name is “Preview” (when no target account is
specified) or “Preview TargetName” (when you acquire from a specific
Instagram target account).
For Slack, the preview name is “Preview TargetName”.
For Twitter, the preview name is “Preview TargetName”.
For Zoom, the preview name is “Preview TargetName”.
8. Open the preview to browse the contents.
The Entries view is displayed in the Tree pane. The evidence tab “[Triage
Mode]” label indicates the evidence is a preview.
9. Click any individual file to view its contents in the View pane.
Note: You can view and triage content in Triage Mode. You cannot
process files in Preview Mode. To process previewed evidence, you must
acquire it first.
1. In Triage Mode, blue check the files in the previewed evidence you want to
acquire.
2. Right-click one of the selected files to display the context menu, and select
Acquire From Cloud.
A dialog is displayed.
3. Enter a name in the Output Evidence File text box or browse to a location.
4. If you want to add the selected evidence to the current case, select the Add
Evidence To Case check box.
5. Click OK.
A logical evidence file (in .Lx01 format) is created and added to your case.
3. Enter a bookmark folder name or accept the default, then click OK.
3. Click the Audit Drive Space Results bookmarks entry to display audit details in
the table pane.
• Tableau
• LinEn when the Linux distribution used supports Direct ATA mode
The application shows if a DCO area exists in addition to the HPA area on a target
drive.
HPA is a special area located at the end of a disk. It is usually configured so the
casual observer cannot see it, and so it can be accessed only by reconfiguring the
disk. HPA and DCO are extremely similar: the difference is the
SET_MAX_ADDRESS bit setting that allows recovery of a removed HPA at reboot.
When supported, EnCase applications see both areas if they coexist on a hard drive.
Note: If you choose to remove a DCO, it will make a permanent change to the
drive controller of the device.
Never acquire hard drives in Windows without a write blocker because Windows
writes to any local hard drive visible to it. Windows will, for example, put a Recycle
Bin file on every hard drive that it detects and will also change Last Accessed date
and time stamps for those drives.
Media that Windows cannot write to are safe to acquire from within Windows, such
as CD-ROMs, write protected floppy diskettes, and write protected USB thumb
drives.
• Tableau T35es
• Tableau T35es-RW
• Tableau T4
• Tableau T6es
• Tableau T8-R2
• Tableau T9
• FastBloc FE
• FastBloc 2 FE v1
• FastBloc 2 FE v2
• FastBloc LE
• FastBloc 2 LE
• FastBloc 3 FE
The hardware versions of these write blockers are not standalone products. When
attached to a computer and a subject hard drive, a write blocker provides
investigators with the ability to quickly and safely preview or acquire data in a
Windows environment. The units are lightweight, self-contained, and portable for
easy field acquisitions, with on-site verification immediately following the
acquisition.
Note: EnCase does not support access of DCO areas via EnScript. By default,
HPA is automatically disabled on the device.
Media that Windows cannot write to are safe to acquire from within Windows, such
as DVDs and write protected USB thumb drives.
Ensure LinEn is configured as described in “LinEn setup under SUSE” on page 721,
autofs is disabled (cleared), and Linux is running in Direct ATA Mode.
2. Navigate to the folder where LinEn resides and enter ./linen in the console.
4. Select Mode, then select Direct ATA Mode. You can now acquire the disk
running in ATA mode.
• Spanned
• Mirrored
• Striped
• RAID-5
• RAID-10
• Basic
6.23.2 RAID-10
RAID-10 arrays require at least four drives, implemented as a striped array of
RAID-1 arrays.
• As one drive.
• As separate drives.
• Spanned
• Mirrored
• Striped
• RAID 5
• Basic
The information detailing the types of partitions and the specific layout across
multiple disks is contained in the registry of the operating system. EnCase
applications can read this registry information and resolve the configuration based
on the key. The application can then virtually mount the software disk configuration
in the case.
Acquire the drive containing the operating system. It is likely that this drive is part
of the disk configuration set, but in the event it is not—such as the disk
configuration being used for storage purposes only—acquire the OS drive and add it
to the case along with the disk configuration set drives.
To make a backup disk on the subject machine, use Windows Disk Manager and
select Backup from the Partition option.
This creates a backup disk of the disk configuration information, placing the backup
on a DVD. You can then copy the file into EnCase using the Single Files option, or
you can acquire the DVD and add it to the case. The case must have the disk
configuration set drives added to it as well. This process works only if you are
working with a restored clone of a subject computer. It is also possible a registry
backup disk is at the location.
1. Select the device containing the registry or the backup disk and all devices
which are members of the RAID.
2. Click the Open button to go to the Entry view of the Evidence tab.
3. Select the disk containing the registry, then click the list on the upper right
menu of the Evidence tab.
At this point, the application attempts to build the virtual devices using information
from the registry key.
2. In the Evidence tab, select the devices involved in the Dynamic Disk.
3. Click the Open button on the Evidence tab menu bar to change to the Entries
view.
4. Select the devices, then click Device from the Evidence tab.
If the resulting disk configurations seem incorrect, you can manually edit
them:
2. Select Options > Edit Disk Configuration from the Evidence tab.
Note: The LinEn boot disk for the subject computer needs to have Linux
drivers for that particular RAID controller card.
2. Boot the subject computer with a Live Linux Boot Disk containing the LinEn
utility and configured with the drivers for the RAID controller card.
3. Launch the LinEn utility.
Note: The BIOS interprets the disk configuration as one drive, so EnCase
applications will as well. The investigator sees the disk configuration as
one drive.
4. Acquire the disk configuration as you normally acquire a single hard drive,
depending on the means of acquisition. Crossover network cable or drive-to-
drive acquisition is straightforward, as long as the set is acquired as one drive.
If the physical drives were acquired separately, or could not be acquired in the
native environment, EnCase applications can edit the hardware set manually.
• Stripe size
• Start sector
• Length per physical disk
• Whether the striping is right handed
You can collect this data from the BIOS of the controller card for a hardware set, or
from the registry for software sets.
When a RAID-5 consists of three or more disks and one disk is missing or bad, the
application can still rebuild the virtual disk using parity information from the other
disks in the configuration, which is detected automatically during the reconstruction
of hardware disk configurations using Scan Disk Configuration.
When rebuilding a RAID from the first two disks, results from validating parity are
meaningless, because you create the parity to build the missing disk.
6. Repeat steps 4 and 5 for each additional element drive of the RAID in order.
7. Back at the main Disk Configuration screen, set the Stripe Size, select whether
this is a Physical Disk Image, and whether it uses Right-Handed Striping.
8. Once you are sure the settings and order of the drives is correct, click OK.
EnCase will generate a new item in your Evidence tab containing the RAID
rebuilt to your specifications. You can acquire this new Disk Configuration to an
EnCase evidence file and process in the EnCase Evidence Processor just like a
physical drive.
• EnCase Evidence files: Legacy Evidence File (*.E01) or Current Evidence File
(*.Ex01)
• Logical Evidence files: Legacy Logical Evidence File (*.L01) or Current Logical
Evidence File (*.Lx01)
• Apple Disk Image (*.dmg)
• Logical (AFF4–L) and physical AFF4 files: Advanced Forensic Format v4 (*.aff4)
or Advanced Forensic Format v4 (Directory) (*.turtle)
Note: Both zip container (typically file extension *.aff4) and directory
container are supported and can be added as evidence to EnCase.
Multi-volume parsing is supported. Segments following the initial AFF4 file
are expected to have an extension *.A01, *.A02, etc. appended to the full file
name of the original file. The parser stops reading at the first segment that
is missing.
• SafeBack File (*.001)
• VirtualBox Disk Image (*.vdi)
• Virtual PC File (*.vhd)
• Virtual Hard Disk v2 (*.vhdx)
• VMWare File (*.vmdk)
1. From an open case, select Add Evidence > Add > Evidence File from the
application toolbar.
The Evidence File dialog is displayed.
2. Use the menu on the bottom right corner of the dialog to select a specific file
extension for your evidence, or select the All Evidence Files option.
3. Navigate to the location of your evidence and select the first file of the evidence
set, as you would for EnCase Evidence files, then click Open.
Note: When you add one or more evidence files to a case (that is, E01,
Ex01, L01, Lx01, aff4, or turtle formats), the Auto Evidence Processing
dialog box is displayed as the final step of the process. For more
information, see “Processing evidence“ on page 235 and “Automating
evidence processing when adding new evidence” on page 238.
You can move EnCase evidence files into a case even if they were acquired
elsewhere. Make sure all segments of the evidence file set are in the same folder.
Using Windows Explorer, navigate to the location of the EnCase evidence files. Drag
the first file of the set onto the open instance of EnCase and the remaining files will
automatically be added, reassembling the evidence in your new case.
You may also want to reacquire an existing EnCase evidence file to change the
compression settings or the file segment size.
2. Click the Open button to change to the Entries view of the Evidence tab.
3. Highlight the item you want to reacquire, click Acquire on the top menu, and
select Acquire from the list.
4. Complete the Acquire Device dialog as you would for previewed evidence.
5. You can repeat steps 3 and 4 for each device or volume you want to reacquire.
Note: EnCase provides an option that retains the globally unique identifier
(GUID) when evidence is reacquired. To retain the GUID, select the Keep
GUID check box that is displayed in the Advanced tab of the Acquire Device
dialog. To open the Acquire Device dialog, select the device for acquisition in
the Evidence Processor.
You can use Restart Acquisition on SAFE Network Preview or Direct Network
Preview connections.
Options include:
Multiplying the Auto Reconnect Attempts value by the Auto Reconnect Interval
produces duration, measured in seconds. For this duration, EnCase automatically
resumes an acquisition when communication with the agent is re-established.
Example
When the entire duration for automatic resume elapses without re-establishing
communication with the agent, EnCase terminates the acquisition. You can restart
the acquisition manually.
When communication with the agent is restored, restart the acquisition: right-click
the device and select Acquire > Acquire.
Select the Restart Acquisition check box on the Location tab of the Acquire Device
dialog. Irrelevant acquisition options are disabled. Select Output Path to choose the
incomplete evidence file to be reacquired.
EnCase recognizes that the evidence file is enabled for restart and continues the
acquisition from the last evidence file segment.
6.27.3 Limitations
These limitations apply to the Restart Acquisition process:
• Restart Acquisition is not available for LEFs (.Lx01 and .L01 evidence
files), .Ex01 files, or when acquiring to a network location, such as Remote
Acquisition.
• Restart Acquisition does not succeed for acquisitions where EnCase failed to
terminate the acquisition gracefully through either:
1. From an open case, select Add Evidence > Add > Raw Image from the menu
bar.
The Raw Image dialog is displayed.
2. Drag and drop the raw images to be acquired. The raw images to be added are
listed in the Component Files list. For DD images or other raw images
consisting of more than one segment, the segments must all be added in their
exact order from first to last.
3. To generate a unique GUID if a match is found, select the Generate true GUID
check box.
4. Accept the defaults in the Raw Image dialog or change them as desired, then
click OK.
You can reacquire this image as you would any other supported evidence or
previewed device.
Note: Before you begin, you first need to add evidence to the case.
2. In the Table view, click the evidence file with the device you want to restore.
3. From the Device list on the Evidence tab menu, select Restore. The Restore
dialog is displayed.
5. In the Local Devices list, click the drive you want to restore.
8. Click Finish.
9. A dialog asks you to verify the local drive selection. To verify you are restoring
to the correct drive enter Yes, then click OK.
The bar in the lower right corner of the screen tracks the progress of the restore.
To wipe a drive:
1. From the main menu, select Tools > Wipe Drive. The Wipe Drive dialog is
displayed.
3. Click the check box of the devices to wipe and click Next. The Drives dialog is
displayed.
4. Select the Verify wiped sectors check box to verify wiped sectors (checked by
default).
7. A dialog displays a warning that all information on the selected device(s) will
be destroyed. Enter Yes in the text box and click OK.
EnCase initiates the drive wipe process. The bar in the lower right corner of the
application tracks the progress of the wipe.
Processing evidence
The Evidence Processor is a component within EnCase that processes evidence files
in a large production environment. The Evidence Processor lets you run, in a single
automated session, a collection of powerful analytic tools against your case data. It
can optimize the order and combinations of processing operations while running
this multi-threaded process.
The Evidence Processor runs unattended. As it works in the background, you can
continue to work with your case. The output of the Evidence Processor is stored on
disk rather than memory for each device, so you can process multiple devices across
several computers simultaneously. You can then bring all evidence back together
into a case with no commingling of evidence data. By storing cache files on disk, you
can scale to much larger data sets. As you reopen cases, you do not need to wait for
data to resolve.
You can automate evidence processing as you add evidence to your case. On the
Tools menu, click Options and select the Auto Evidence Processor tab to set options
to apply every time evidence is added. You can also automatically set the time zone
of the evidence as it is added. Create new or use existing Evidence Processor setting
files to set what evidence processor options are applied. See “Auto Evidence
Processor” on page 78 to set automatic evidence processing options globally or
“Automating evidence processing when adding new evidence” on page 238 for
information on changing settings when adding new evidence.
A standalone product, the EnCase Processor node, functions in the same way as the
Evidence Processor. Rather than installing separate instances of EnCase Investigator
to perform “processing only” on multiple machines, you can install separate EnCase
Processor nodes instead. For information on installing EnCase Processor, see “Install
and configure evidence processor nodes” on page 85. All references to the Evidence
Processor apply to EnCase Processor.
If you worked with a previous version of EnCase, you can continue to work cases
using the methodology you developed for that previous version.
Note: Network preview is only available when you are logged into a SAFE.
For information about installing a SAFE, see the SAFE User Guide.
• Saving sets of Evidence Processor options as templates. You can run these later
with minimal modification.
• Guiding you through the use of each setting with embedded assistance.
• Processing results automatically from any current EnScript module according to
the current processor settings (Index, Keyword search, etc.).
• Rerunning previously created options on updated data when additional
evidence becomes available.
• Folder recovery
• Hash analysis
• Compound file expansion
• Email search
• Internet artifact search
• Parse social media artifacts
• Keyword search
• Index creation (not available for local and network previews)
• Optical character recognition (OCR)
• EnScript Module execution:
• File signature analysis (not available for local and network previews)
• Protected file analysis
• Media analysis
• Exif parser
After you add evidence to your case and configure the time zone settings:
1. Acquire the evidence. For information specific to acquisition using the LinEn
utility, see “Adding and removing devices” on page 725.
2. Select the evidence you want to run through the Evidence Processor.
The lower left box of the Evidence Processor window contains a table with these
elements:
Use this pane for choosing tasks and configuring settings. The Evidence Processor
retains previously run settings.
File and edit settings for the Evidence Processor selections box are located in its
toolbar.
Option Description
Columns Apply column changes to the EnCase Processor Options box.
Split Mode Change the display format of the EnCase Processor Options box.
Edit Edit the options for a highlighted task.
Save Settings Save the current selection of settings as an Evidence Processor
template.
Load Settings Load a saved template to run against the current evidence.
Option Description
Use Defaults Selects the check boxes for these default options:
• Recover folders
• File signature analysis
• Protected file analysis
• Thumbnail creation
• Media analysis
• Exif parser
• Hash analysis
• Expand compound links
• Find email
• Find Internet artifacts
• Social media parser
• Index text and metadata
Select an option check box in the Enabled column to run that option during
evidence processing.
• Task names in blue can be further configured by clicking the task name.
• Task names in black have no further configuration options beyond enabling or
disabling the task.
Processing and Time Zone values Settings are initially populated with values set on
the Auto Evidence Processing tab of the Tools > Options dialog.
Changing the default Processing and Time Zone values while adding new evidence
will apply these changes to the evidence you selected to add to your case. If there is
no global time zone value entered, these values must be set individually for each
evidence file.
Making changes to the Options check boxes updates global settings to the new
evidence being added as well as new evidence added in the future.
Select OK to apply the selections to the evidence you are adding. Select Cancel to
add evidence without processing evidence or applying any of the specified changes.
To make changes to how new evidence is processed in the future, go to the Auto
Evidence Processor tab of the Tools > Options dialog.
The Evidence Processor options drop-down provides six default processor options.
The options list is populated with files located in the AutoProcessorOptions
directory of the EnCase install path. The preset processor options of the files are as
follows:
File signature analysis, Expand compound files, Find email, Find Internet artifacts,
Index text and metadata
Recover Folders, File signature analysis, Protected file analysis, Thumbnail creation,
Exif parser, Hash analysis, Expand compound files, Find email, Find Internet
artifacts, Index text and metadata, System Info Parser, Unix Login, Linux Syslog
Parser
Recover Folders, File signature analysis, Protected file analysis, Thumbnail creation,
Exif parser, Hash analysis, Expand compound files, Find email, Find Internet
artifacts, Index text and metadata, System Info Parser, Unix Login, OS X Artifact
Parser
Recover Folders, File signature analysis, Protected file analysis, Thumbnail creation,
Exif parser, Hash analysis, Expand compound files, Find email, Find Internet
artifacts, Index text and metadata, System Info Parser, Windows Event Log Parser,
Windows Artifact Parser
File signature analysis, Hash analysis, Find Internet artifacts, System Info Parser
Windows Triage:
• Check the evidence you want to process from the Entries tree pane.
• Right-click any of the selected evidence to display the contextual menu.
• Select Process > Process All to process all evidence in the Entries view, or
Process > Process Selected to process only the selected evidence in the Entries
view. The processor options sub-menu is displayed.
Note: If you choose the Process Selected option, the Create Results dialog is
displayed. You can select a name for your result set.
• Select from a default processor option or Create Custom to open the EnCase
Processor Options dialog where you can select the specific processor options to
apply to the evidence.
When you select Process for an already processed item, the right pane of the EnCase
Processor Options dialog displays previous processing settings.
You can run modules over and over again with different settings each time. The
results of each run are added to the case.
Clicking an option displays information about that option in the right pane.
Clicking an option with a lock icon displays the settings for that option.
Note: If you select Process only prioritized items, you cannot run any
Evidence Processor modules.
5. When you are finished, click OK. The EnCase Processor Options dialog right
pane reflects the prioritization selections you made.
The Evidence Processor also gives you the following options to designate only that
evidence which you specifically want processed:
• During first time processing you can turn File Signature Analysis on or off. The
default is on.
Note: If you disable File Signature Analysis, after processing, images will
not display in Gallery view.
• While reprocessing evidence:
This task can recover NTFS files and folders from Unallocated Clusters and continue
to parse through the current Master File Table (MFT) artifacts for files without
parent folders. This operation is particularly useful when a drive was reformatted or
the MFT is corrupted. Recovered files are placed in the gray Recovered Folders
virtual folder in the root of the NTFS partition.
Because this process requires significant processing resources, process time may be
unacceptably long. If this process is not critical for your analysis, you can disable it.
Note: New encryption products and uncommon encryption products may not
be detected.
Media analysis scans the images in your evidence and assigns a confidence level
score indicating how closely each image matches pre-defined categories. The
confidence level score falls on a scale from 0.00 to 100.00. The higher the number, the
greater the confidence that an image falls into that pre-defined category.
Processing your evidence with the Media analysis option assigns confidence level
scores to all supported images in the categories selected. The following categories
are available for analysis:
BMP, CGM, DNG, ERF, EXIF, GIF, HDR, JFIF, JP2, JPE, JPG/JPEG, JPS, NEF, PAM,
PBM, PCX, PGM, PNG, PNM, PPM, TGA, TIF/TIFF, WBMP, WEBP
1. From the Evidence tab in EnCase Endpoint Investigator, select the evidence you
want to process.
3. Under EnCase Processor Options, select the Enabled check box for the Media
analysis evidence processor task.
4. Click the Media analysis task to open a dialog to select the categories to analyze.
5. Click OK.
When processing is complete you can analyze the processed images by category. To
filter images by confidence level or view images in table format, see “Viewing media
analysis data” on page 336.
You can also triage image entries quickly by running Media analysis from the
Evidence view.
1. From the Evidence view, select one or more entries for media analysis from the
Tree or Table pane.
Note: When media analysis processing is initiated from the Entries view,
categories cannot be selected individually as they can via the Evidence
Processor. Ensure you have adequate system resources when
performing media analysis processing via the Entries view. See “Minimum
suggested system requirements for examination machines” on page 31.
4. Click Refresh or close the tab and reopen it to see the results.
1. From the Evidence tab in EnCase Endpoint Investigator, select the evidence you
want to process.
2. Click Process Evidence in the menu bar. The Evidence Processor Options dialog
is displayed.
3. Under EnCase Processor Options, select the Exif parser Enabled check box.
4. Click OK.
Note: The Exif parser contributes to the Index Text and Metadata module.
Output from the Exif parser is available within index searches as long as it
is run at the same time or prior to indexing.
When processing is complete you can analyze the Exif attributes by clicking on a
JPG image, selecting Attributes in the View pane, double-clicking on the Exif Data
folder and viewing the Exif fields and values.
The Evidence Processor's hash analysis setting allows you to create MD5, SHA1,
SHA256, and SHA512 hash values for files, so you can use them later for the reasons
described above. When you click the Hash Analysis hyperlinked name, the Edit
Settings dialog is displayed, allowing you to check the hashing algorithms to use.
Entropy values range from 0 to 8. Values at the lower end of the range reflect less
randomness; values at the higher end reflect greater randomness. Entropy values
generated by EnCase are displayed in a column in Table view. Each entropy value
consists of eight digits, for example, 3.1577005.
1. From the Evidence tab menu, select Process Evidence > Process. The EnCase
Processor Options dialog appears.
2. Click Hash analysis. The Edit hash analysis options dialog is displayed.
4. When evidence processing completes, open the Evidence view and drill into the
evidence to view entropy values.
1. Check the folders containing the files for which you want to generate entropy
values, then right-click on a selected item to display the context menu. Select
Entries > Hash\Sig Selected.
4. You must leave Evidence view and reopen it to see the results in the Entropy
column.
5. Table view displays resulting entropy values. Entropy numbers are highlighted
to assist you in determining their significance in the result set.
File extensions are the characters following the dot in a file name (for example,
signature.txt). They indicate the file's data type. For example, a .txt extension
indicates a text file, and a .bmp extension indicates a bitmap image file. Standardized
file types have unique signature-extension associations. For example, BM is the file
signature for all .bmp files.
The signature analysis process flags all files with signature-extension mismatches
according to its File Types tables. To view the Evidence Processor File Types table,
select View > File Types from the menu. For more information, see “Adding and
modifying file signature associations” on page 406. Signature analysis is always
enabled so that it can support other Evidence Processor operations.
1. Select the check boxes next to the volume or volumes you want to process from
the table.
4. Select the maximum total size of the evidence file or use the default 0 value for
no file size limit.
5. Click the File Settings button to change output file settings. The Default Output
Options dialog displays.
– On the Location tab, you can change the file name, evidence number,
case number, examiner name, output path, or alternative path.
– On the Format tab, you can change the evidence file format, compression,
file segment size, or encryption settings.
• A full shadow volume recovery outputs to .Ex01 evidence files.
– On the Location tab, you can change the file name, evidence number,
case number, examiner name, output path, or alternative path.
– On the Format tab, you can change the evidence file format, verification
hash, compression, file segment size, or encryption settings.
– On the Advanced tab, you can change additional settings.
EnCase Endpoint Investigator recovers and adds the volume shadow copies to your
case as evidence files.
2. Right-click on the volume with the snapshots you want to view. Select Device
> Analyze APFS Snapshots.
3. A dialog displays the available snapshots. Select a snapshot and click Process to
process the volume.
4. The Recover Full Volume dialog is displayed and asks you to confirm
restoration of the volume. Click Yes. The processed volume in the $Snapshots
folder becomes a link when processing is complete.
For archive files, EnCase extracts the compressed or archived files and processes
them according to the other Evidence Processor settings you chose. This includes
nested archive files or zip files within a zip file. Note that EnCase handles
compound document types like Microsoft Office Word separately.
Note: Using the social media artifacts parser requires that you also use the
Find Internet artifacts evidence processor option. You can run both options
simultaneously, or can run Find Internet artifacts first. See “Parsing social
media artifacts” on page 257.
• Apple Safari
• Google Chrome
• Microsoft Edge
• Microsoft Edge (Chromium)
• Microsoft Internet Explorer
• Mozilla Firefox
• Opera
To examine these artifacts, use the Find Internet artifacts module when processing
the evidence.
Note: For detailed information about Apple Safari artifacts, see section 2.1.1.1
“Apple Safari” in OpenText EnCase - Artifact Reference Help (ISEA-H-URE).
• Autofills
• Binary
• Bookmarks
• Cache
• Cookies
• Downloads
• History
• Keyword Search
• Login Data
• Media History
• Top Sites
Note: EnCase does not provide the ability to recover Google Chrome Internet
artifacts from unallocated clusters.
Files in the Chrome browser cache that are compressed with the Brotli compression
algorithm are parsed by EnCase Endpoint Investigator.
Note: For detailed information about Google Chrome artifacts, see section
2.2.1.2 “Google Chrome” in OpenText EnCase - Artifact Reference Help (ISEA-H-
URE).
• Binary
• Bookmarks
• Cache
• Cookies
• Downloads
• History
• Keyword Search
• Login Data
• Page Settings
• Reading List
• Top Sites
Note: For detailed information about Microsoft Edge artifacts, see section
2.2.1.3 “Microsoft Edge” in OpenText EnCase - Artifact Reference Help (ISEA-H-
URE).
• Autofills
• Binary
• Bookmarks
• Cache
• Cookies
• Downloads
• History
• Keyword Search
• Login Data
• Media History
• Top Sites
Note: For detailed information about Microsoft Edge (Chromium) artifacts, see
section 2.2.1.4 “Microsoft Edge (Chromium)” in OpenText EnCase - Artifact
Reference Help (ISEA-H-URE).
• Bookmarks
• Cache
• Cookies
• Downloads
• History
Note: For detailed information about Microsoft Internet Explorer artifacts, see
section 2.2.1.5 “Microsoft Internet Explorer” in OpenText EnCase - Artifact
Reference Help (ISEA-H-URE).
EnCase Endpoint Investigator can parse the following Mozilla Firefox artifacts (on
Macintosh and Windows platforms):
• Binary
• Cache
EnCase Endpoint Investigator can parse the following Mozilla Firefox 3 artifacts (on
Macintosh and Windows platforms):
• Bookmarks
• Cookies
• Downloads
• History
• History\Forms
• Keyword Search
• Last Session\Tabs
• Login Data
Notes
• Some of the Mozilla Firefox artifacts parsed and displayed in the Artifacts
tab include the Frecency and Rev Host Name columns.
“Frecency“ is a valid word used by Mozilla. Do not mistake it for
“frequency.“ For more information, see the Mozilla developer center article
at https://developer.mozilla.org/en-US/docs/Mozilla/Tech/Places/
Frecency_algorithm.
The value displayed in the Frecency column is the score Mozilla gives to
each URL. It includes how frequently a person visits the site and how
recently the user visits the site. EnCase displays this value as it is stored in
the places.sqlite file.
Mozilla stores URL host names in reverse order from last character to the
first. This appears as Mozilla formats it in the Rev Host Name column.
• For detailed information about Mozilla Firefox and Firefox 3 artifacts, see
section 2.2.1.6 “Mozilla Firefox” in OpenText EnCase - Artifact Reference Help
(ISEA-H-URE).
• Amazon
• Bing
• DuckDuckGo
• eBay
• Google
• Twitter
• Walmart
• Yahoo
• Login Data lists artifacts that are created when the user or system administrator
has configured Firefox Password Manager to save authentication records for
specific websites.
• Disabled Logins lists artifacts that are created when the user or system
administrator has configured Firefox Password Manager to never save
authentication data for specific websites.
• Binary
• Bookmarks
• Cache
• Cookies
• Downloads
• History
• Keyword Search
Note: For detailed information about Opera artifacts, see section 2.2.1.7
“Opera” in OpenText EnCase - Artifact Reference Help (ISEA-H-URE).
• Facebook
• Instagram
• LinkedIn
• Microsoft Teams
• Slack
• Twitter
• Zoom
This feature is dependent on the Find Internet artifacts evidence processor option,
which must be selected prior to or at the same time the Social Media parser
evidence processor option is selected for evidence processing.
You can collect Facebook, Instagram, and Twitter artifacts in two ways: via Chrome
browser artifacts for Windows and Mac computers, and by acquiring data through
cloud-based services. LinkedIn artifacts can be acquired through cloud-based
services. Microsoft Teams artifacts are pulled from cloud-based services, by parsing
the generated LEF. Slack artifacts are pulled from cloud-based services, by parsing
the generated LEF. When acquiring Facebook artifacts from cloud-based services,
the Cloud Data Import Wizard is used and output to a Logical Evidence File (LEF).
When acquiring Instagram and Twitter artifacts from cloud-based services, the data
is first collected and output to a Logical Evidence File (LEF). The output files can
then be parsed with the social media parser.
Social media data can be examined in two tabs that are selected from the View
menu:
• Social Media Artifacts: This tab organizes data by social media artifact publisher
(for example, Facebook or LinkedIn). All artifacts associated with a publisher are
grouped below it in the tree view.
• Artifacts: This tab organizes all internet artifacts in an evidence file by browser
(for example, Chrome or Firefox).
2. Select the Social Media Artifacts link below an evidence file to display the
Social Media Entries view. The Tree pane displays all supported artifact
publishers (for example, Facebook and LinkedIn) and their associated artifacts,
organized in folders.
Note: If no artifacts were found or parsed for an artifact type, the Table
view will contain no entry.
4. Select a table entry in the Name column to view field information in the View
pane for that entry. You can also right-click the table entry and select View
Artifact to view details in the Artifacts tab.
You can view, sort, and filter processed artifacts in the Artifacts tab.
Publisher Artifacts
Facebook Chrome browser cache: Login data. Searches. Pages, posts, and
stories visited. Photos and videos viewed.
Publisher Artifacts
Instagram Chrome browser cache: Login data. Home pages, photos, and stories
visited.
The artifact details vary depending on the publisher and what EnCase Endpoint
Investigator is able to capture.
Note: EnCase blocks MBOX files from displaying in the Doc tab.
This setting prepares email archives for the use of email threading and related
EnCase email functionality during case analysis.
2. Click the email archive file types whose messages you want to examine, and
click OK.
After processing completes, EnCase can analyze the messages and component files
extracted from the email archives, according to the other Evidence Processor settings
you selected.
Note: If you are searching for a number and an application stores the number
in a different format, EnCase will not find it. For example, in Excel, if a Social
Security number is entered without dashes, Excel stores it in double precision
64-bit format.
Often, examiners have ready-made lists of keywords to use in their searches. You
may also want to add additional keywords to use in your searches.
– Keyword searches created and conducted with the Evidence Processor are
stored with the device’s evidence cache files and can be used with any
number of cases.
– Keyword searches not initiated from the Evidence Processor are stored with
the case and are case specific.
• By clicking Raw Search All on the Evidence Tab when viewing evidence. This is
the best way to search through raw, non-indexed data.
• By clicking Raw Search when viewing entries.
– The targeted search only acts on items selected in the current view.
– To run a targeted search against two or more devices in your case, clickOpen
in the Evidencetab and select additional devices.
Wherever you access it, the Keyword list displays a list of existing keywords in the
case:
• Select Search entry slack to include file slack in the keyword search.
• Use initialized size enables you to search a file as the operating system displays
it, rather than searching its full logical size.
– In NTFS file systems, applications are allowed to reserve disk space for future
operations. The application sets the logical size of the file larger than
currently necessary to allow for expected future expansion, while setting the
Initialized Size smaller so that it only needs to parse a smaller amount of data.
This enables the file to load faster.
– If a file has an initialized size less than the logical size, the OS shows the data
area between the initialized size and logical size as zeros. In actuality, this
area of the file may contain remnants of previous files, similar to file slack. By
default, EnCase displays, searches, and exports the area past the initialized
size as it appears on the disk, not as the OS displays it. This enables you to
find file remnants in this area.
– Select Initialized Size to see a file as its application sees it and the OS
displays it.
– Note that when a file is hashed in EnCase, the initialized size is used. This
means that the entire logical file is hashed, but the area past the initialized
size is set to zeros. Since this is how a normal application sees the file, this
enables users to verify file hashes with another utility that reads the file via
the OS.
• Select Undelete entries before searching to undelete deleted files before they are
searched for keywords.
• Select Skip contents for known files to only search the slack areas of known files
identified by a hash library.
• Add Keyword List opens a dialog where you can enter a list of words and assign
certain properties to them as a group. See “Creating a new keyword list”
on page 264.
• Double-click a keyword, or click Edit, to open the keyword so you can modify its
properties.
• Highlight a keyword and click Delete to remove it from the list.
• If a path box is displayed at the top of the dialog, that path and name is where
the search is stored.
2. In the Keyword toolbar, click New. The New Keyword dialog is displayed.
3. Enter the search expression and name, and select the desired options:
• Search Expression is the actual text being searched. Use a character map to
create a non-English search string if your keyboard is not mapped to the
appropriate non-English key mapping.
• Name is the search expression name listed in the folder.
• ANSI Latin - 1 searches documents using the ANSI Latin - 1 code page.
• UTF-8 meets the requirements of byte-oriented and ASCII-based systems.
UTF-8 is defined by the Unicode Standard. Each character is represented in
UTF-8 as a sequence of up to four bytes, where the first byte indicates the
number of bytes to follow in a multi-byte sequence.
• UTF-7 encodes the full BMP repertoire using only octets with the high-order
bit clear (7 bit US-ASCII values, [US-ASCII]). It is deemed a mail-safe
encoding.
4. Open the Code Page tab to change the code page to use a different character set.
5. To test a search string against a known file, click the Keyword Tester tab.
• Locate a test file containing the search string, enter the address into the Test
Data field, and click Load.The test file is searched and is displayed in the
lower tab of the Keyword Tester form.
• Hits are highlighted in both Text view and Hex view.
6. When you finish, click OK.
1. From either location, from the New Keyword dialog click Add Keyword List.
The Add Keyword List dialog is displayed.
4. When you finish, click OK. The list populates the Keyword list and is saved in
the path defined at the top of that dialog.
Note: We recommend against using Raw Search All for process memory
searches because, if the process is very large (for example, 8 TB), the
keyword search takes a very long time.
4. Drill down in the process and select the Memory entry in the Table pane, then
use Raw Search Selected to search for keywords.
Generating an index can take time. Once generated, however, searching content
becomes nearly instantaneous. We recommend always indexing your case data.
• File slack: the area between the end of a file and the end of the last cluster used
by that file.
• Unallocated space: the sectors not associated with an allocated file: the free space
of a disk or volume.
– Sectors not assigned to any partition fall under Unused Disk Area. The
Evidence Processor handles these sectors and Unallocated Clusters similarly.
1. From the Evidence tab, select the evidence you want to process and select
Process Evidence > Process from the menu bar. The EnCase Processor Options
dialog is displayed.
2. Select the Index text and metadata check box to enable indexing, then click the
Index text and metadata link. The Edit dialog is displayed.
4. Click OK.
The indexing engine in EnCase Endpoint Investigator uses the following delimiters
for all analyzers by default. There is no need to add a delimiter if it is in this list.
!#$%&()*+,-\/;<=>?@[]^`{|}~
1. From the Evidence tab, select the evidence you want to process, then select
Process Evidence > Process from the menu bar of the Evidence tab. The EnCase
Processor Options dialog displays.
2. Click the Index text and metadata link to display the Edit Index text and
metadata dialog.
3. Enter one or more word delimiters without spaces in the text box.
4. Click OK.
Once your evidence is processed, all data will be indexed with the default word
delimiters for the language analyzer as well as any additional delimiters added
during processing. Any additional word delimiters entered during processing can
be viewed by right-clicking on Index text and metadata link in the EnCase Processor
Options dialog. The table that displays lists all current processing options.
The English language analyzer is selected by default. It is optimized for the English
language but indexes other Western languages as well.
Select other language analyzers to create an index for that language or language
group. If you need to index and search evidence in a specific language, select the
corresponding language analyzer to create a unique index for that language.
EnCase Endpoint Investigator creates an index for each language you select.
Indexing additional languages increases the time it takes to process your evidence.
We recommend selecting only the languages needed for your investigation.
To create indexes for more than one language, or to change the default
language index:
1. From the Evidence tab, select the evidence you want to process, then select
Process Evidence > Process from the menu bar of the Evidence tab. The EnCase
Processor Options dialog is displayed.
2. Select the Index text and metadata check box, then click the Index text and
metadata link. The Edit dialog is displayed.
4. Click OK.
The OCR option can find and index text in PDFs and the following image file
formats:
Note: If you reprocess evidence with the OCR option selected, the Overwrite
evidence cache check box on the EnCase Processor Options dialog must be
selected along with the Index text and metadata check box in order to update
the evidence cache containing images processed with optical character
recognition.
1. From an open case, select evidence to process and go to the EnCase Processor
Options screen.
2. Select OCR in the task column from the EnCase Processor Options table. The
OCR Language Options dialog opens.
4. Select the Enabled check box for OCR and process your evidence.
Note: The OCR option must be selected at the same time or prior to the Index
text and metadata evidence processor option.
OCR processing will be performed for the selected language along with other
evidence processing options selected.
Note: To make a copy of your custom code and modify it while still preserving
the original, use the Save As option.
Click the System Info Parser check box to enable the module. Click the System Info
Parser link to open a dialog to select or modify artifact and registry search options.
• The Standard tab contains artifact collection options for both Windows and
Linux evidence. All categories are selected by default. There is also an option to
limit the search to the live Windows registry only.
• The Advanced tab is used to select specific Windows registry information for
parsing.
When evidence processing is complete, you can also search NetShare and USB
registry information in the Artifacts tab. You can see the UNC path visit history, the
history of connected devices, and you can correlate USB devices to their drive letters.
When this option is selected, the System Info Parser performs a quick sweep against
registry entries residing only in memory (versus disk), reducing the time taken to
analyze live machines.
Note: In the Sweep Enterprise System Info Parser dialog, the Live Registry
Only check box is selected by default. In the Evidence Processor System Info
Parser dialog, the Live Registry Only check box is cleared by default.
The File Carver is not designed to handle multiple headers and footers. Any file
containing more than one header and footer may produce inconsistent results.
Running the File Carver in Evidence Processor gives you three options: you can
select from either the full File Types table, from the optimized File Types table, or
from both. You can blue check entries and choose to search selected files. The HTML
files that the module carves are adjudicated to be HTML, based on certain keywords
appearing in the files.
You can export carved files to disk so they can be loaded with native applications.
Note: When there is no file length information in the header, the footer or the
default length is used. The value of 4096 bytes is the default carve size when no
footer is provided and no default length is provided in the File Types table.
• .jpeg
• .ico
• .gif
• .png
File Carver does not separately carve thumbnails embedded within JPEG images.
To carve out the thumbnails embedded in JPEG images, you must add a file type to
the File Types table that contains the same information in the JPEG Image Standard
fields, with two exceptions:
1. Files are first identified by their file signatures, as defined in the File Types
table.
2. When the File Carver module finds a header matching one of the supported
image types, it attempts to determine an image size from the GDI libraries.
4. If the GDI libraries do not return a size, File Carver carves the file using the
standard method.
Note: The serial number (<sn>) ensures that the output filename of each carved
file is unique. it is an eight digit zero-filled number beginning with 00000001.
Serial numbers are created when files are exported.
The File Carver changes the output name of files carved from E01/Ex01 files so that
physical sector and physical offset values are included in the name, in addition to
the file offset values already present. This requires no configuration.
1. Select the Evidence tab and click the check box next to the evidence you want to
process. Click Process Evidence > Process. The EnCase Processor Options
screen is displayed.
2. Select Modules > File Carver from the EnCase Processor Options list. The File
Carver window is displayed with your selected options.
3. Click OK.
A dialog is briefly displayed indicating the evidence processing has begun. The
progress bar at bottom of the application indicates processing status until the task is
complete.
• Entry condition filters which files EnCase processes, based on their entry
properties.
• EVT condition restricts individual events on properties parsed from an EVT file
(Event ID, Event Type, Source, etc.).
• EVTX condition restricts individual events on properties parsed from an EVTX
file (Event ID, Process ID, Thread ID, etc.).
To enable a condition, select its check box. Click Edit next to the condition type to
modify the condition.
• Link files
• Recycle Bin artifacts
• MFT transaction logs
With these artifacts, you can search unallocated, all files, or selected files. Once the
artifacts are parsed, you can browse through the results in the Artifacts tab. You can
also index the artifacts so they are searchable. In addition, you can bookmark the
artifacts.
You can process files by signature and use EnScript code to specify entry or log
event conditions.
Running the macOS artifact parser in EnCase Evidence Processor creates a Logical
Evidence File (LEF).
– This parses the log file, creating artifacts for easy access and review.
• Software updates
– Network adapters
– Host and computer names
– Network services
– Network configuration
– Wireless networks
– Internet sharing
– Firewall settings
• Time zone settings
• Last user and auto-login settings
• Deleted user accounts
• Trash
• Recent items
• Folders visited
• Folders visited with finder
• Folders visited with the common file/folder navigation dialog
• Attached media and connected servers
• Favorite servers
Startup applications
• Saved searches
• Printing activity
Artifacts parsed are inserted into a SQLite database. Case Analyzer reports contain
data for the artifacts generated by the Mac OS X Artifact Parser module.
After running the Mac OS X Artifacts Evidence Parser, data collected is available in
Case Analyzer Macintosh reports.
The following reports are created, based on the information collected by the Mac OS
X Artifacts Parser:
• Multimedia
• Network
• Operating System
The HFS+ file system supports extended attributes, such as Finder attributes and the
location of a file within the Finder coordinates X and Y. They are in the Attributes
tab in EnCase.
When OS X writes to a file system that does not support extended attributes (for
example, FAT or exFAT), a double file is created in the same location as the actual
file that is written to store the extended attributes the HFS+ needs. So if the file is
ever copied back to an HFS+ formatted drive, the attributes are included along with
the file itself.
7.23.7.2 X:DateAdded
X:DateAdded indicates the time a file was added to the parent folder. For example,
X:DateAdded to the Trash folder represents the time the file was deleted.
3. The View File Structure dialog is displayed. Enter a password and click OK.
Note: If you do not know the password, there are tools (such as Passware
Forensic) that can perform keychain attacks.
Once the keychain is parsed, you can view the contents as artifacts.
If a keychain's password is known, secrets in the keychain are parsed and stored in
Secure Storage in EnCase.
1. Right-click on the .dmg file in Entries view to display the context menu. Click
Entries > View File Structure to display the View File Structure dialog.
3. Select the result set you want to process, then click OK. The EnCase Processor
Options dialog displays a table with information about the result set to be
queued:
• Name
• Evidence Size
• Item Count
This information helps you identify the size and scale of the evidence to be
processed. A result set can contain items from multiple evidence files, all of
which will be processed.
Note: Processing modules (System Info Parser, File Carver, Windows Artifact
Parser, etc.), along with Recover Folders, do not respect result sets and
therefore run against the entire device as they normally do.
Because result sets can include items from multiple devices in various
processing states, locks do not display in processing options when selecting
result set processing. However, items that would normally be locked because
they were previously run on a device will still run, even if they do not have the
lock item present. In other words, once a lockable Evidence Processor option is
run on a device, all processing jobs that follow on that device will run the
option, even if it is not selected. These previously processed items are marked
with asterisks and will be reprocessed.
Also, since locks do not display, some modules that are not supported in
certain instances will not run, even if they are selected. For example, indexing
will not run on items that come from a remote node, and Snapshot will not run
on an evidence file or a local drive.
1. In the Results tab, select the result set you want to process.
1. In the Tree and/or Table pane, blue check the items you want to include in the
result set.
2. Right-click, the click Entries > Create Results from the context menu.
3. The Create Results dialog is displayed, showing the number of items selected
that are under the highlighted folder.
Note: To include all blue checked items in a device, highlight the device
root first before selecting the Create Results option.
5. EnCase creates the result set, and it is displayed in the Results tab.
Some examples of data types that allow creation of result sets include:
• Email archives
• Compound files (for example, .zip files)
• Internet artifacts
Examples of data types that do not allow creation of results (because they are
metadata only) include:
• Snapshot data
1. In the Tree and/or Table pane, blue check the items you want to include in the
result set.
2. Right-click a selected item to display the context menu. Click Artifacts (or
Entries, depending on the context) > Create Results.
3. The Create Results dialog is displayed, showing the number of items selected.
5. EnCase creates the result set, which is displayed in the Results tab.
Note: Use this option with caution, as it will remove all processing results for
the devices selected.
1. From the Evidence Processor Options dialog, click the Overwrite Evidence
Cache check box. Information message about the selected action is displayed in
the right pane.
Note: This option is enabled only when you select Current Item and the
evidence is already processed.
2. Click OK. A warning message is displayed, asking if you want to continue and
delete previously processed output.
3. To continue, click Yes. EnCase will delete all caches related to the specified
evidence file.
Note: When you use the Overwrite Evidence Cache option, items in the
result sets and bookmarks belonging to the device will no longer resolve to
the original item GUIDs and will become invalid. You can delete the
existing result sets and bookmarks or maintain them as a reference for
manual recreation.
• EnScript Launcher - Manage a master list of EnScripts, search for and launch
EnScripts.
• Default and recent EnScripts - Select from a short list of default and recently used
EnScripts.
• Run - Open a file browser to locate an EnScript or EnCase Package.
• New EnScript - Open a file browser, name a new EnScript file, and open the
script editor tab.
• Edit - Open the file browser, select an existing EnScript file, and open the script
editor tab.
• Sessions: Access recent script editor sessions. You can also undock a tab or open
a new script in the script editor tab.
• Media Analyzer Viewer - Run the Media Analyzer Viewer EnScript. Files must
be selected before running.
• Hash List Importer - Run the Hash List Importer EnScript.
• EnCase App Central - Access and download EnScripts from an online library
hosted by OpenText.
With Processor Manager, you can simplify evidence processing and acquisition by:
For a list of Processor Manager terms and definitions, see “Terms and definitions”
on page 286.
Note: If both EnCase Examiner and the EnCase Processor Node are installed
on the same machine, be sure to open EnCase from the EnCase Examiner
shortcut. Using the shortcut that comes with Processor Node will result in an
error.
3. EnCase adds your local machine to the processor node list and closes the dialog.
4. In the Port box, enter the port number or use the up or down arrows to scroll to
the port number you want to use. The default port is 443.
Note: If you enter a name and port for an existing node, an information
message is displayed telling you the node is already in the list. If the node
you are adding has the same name as a node already in your list, the new
node is renamed by adding “New” to give it a unique name.
Note: If you get an error after clicking OK, the EnServer service on the
Processor Node may be stopped. Start the EnServer service and try again.
You can also use a web browser from any machine that can connect to your
processor node and manually enter the processor node's URL.
Note: A warning may display in the web browser saying the site's security
certificate is not trusted. This is expected behavior, and you can click through
the message to proceed.
• The name of the processor node. The name cannot match any processor node
already in the list.
• Storage configuration (temp case files location, temp evidence files location, temp
evidence caches location).
• The number of maximum concurrent jobs.
• Whether to create heap dumps.
1. In the lower pane of the Processor Manager tab, select the node you want to
edit, then click Edit. The Edit dialog is displayed.
1. In the lower pane of the Processor Manager tab, select the node you want to
delete. If you want to delete more than one node, click the corresponding check
box for each node.
3. If a node or nodes are running jobs and you still want to delete them, click the
Delete node(s) even if there are currently running jobs check box.
4. Click OK.
Notes
• Jobs running on a remote processor node that is deleted and removed from
the processor list continue to run on the node. However, the job's status in
Processor Manager will change to “Processor Node is Unknown” and the
processing state is set to “Pending.” If you add that processor node back into
the list, the job's state and status are updated to show the true status of the
job running on that node: “Running”, “Error”, or “Completed”.
• Acquire and Process: Acquire evidence first and then process it.
Note: If you select no check boxes, all unprocessed evidence in the case is
set to be added to the queue.
3. The evidence files will be queued for processing depending on the What to
Process radio button you select:
Note: If Local Machine is the only processor node in the node list, the
Make local copies option is not available. This option is only available if
there are remote processor nodes in the node list.
• If the network is slow, it does not impact processing because all processing is
done locally on the node before it is uploaded to the shared drive.
Once the processing completes, the cache is copied to the shared network drive.
Then the evidence file and cache are deleted from the remote node.
8. When you finish selecting what evidence to process and the processing options
you want, click OK.
A dialog displays showing that the evidence to be processed is loading.
For detailed information on other evidence processing options, see the
following topics:
To access Processor Manager, click View > Processor Manager from the menu.
Term Definition
Job Evidence combined with processor options.
Job List All jobs in the Processor Manager. The job list is displayed in the
Name column of the top pane of the Processor Manager.
Queue Jobs in the list to be processed.
Hold Evidence in the list not to be processed.
Pause Queue Stops distributing jobs to processor nodes (jobs that are executing will
continue).
Priority Order of execution relative to unprocessed jobs.
Processor Node Name of a processor node (set during installation).
Options A collection of processing configurations assigned to an individual
job.
1. Select the check boxes for the jobs you want to remove from the job list entirely.
2. Click Job Actions > Remove. A warning message is displayed asking if you
want to remove the selected jobs from the list. Click Yes.
1. Select the check boxes for the jobs you want to move to the top.
2. Click Job Actions > Move to Top. The selected items are moved to the top of the
list of queued jobs.
1. Select the check boxes for the jobs you want to increase in priority.
2. Click Job Actions > Increase Priority. The selected jobs move up in the list in
the Priority column and have a higher priority.
1. Select the check boxes for the jobs you want to decrease in priority.
2. Click Job Actions > Decrease Priority. The selected jobs move down in the list
in the Priority column and have lower priority.
1. Select the check boxes for the jobs you want to move to the bottom.
2. Click Job Actions > Move to Bottom. The selected jobs are moved to the bottom
of the list of queued jobs.
• Queue
• Remove
• Hold
• Stop
• Copy (Available on the right-click menu only: This option copies the text in the
currently highlighted field in the currently highlighted row.)
Note: These right-click actions only operate on the currently highlighted job;
however, actions in the Job Actions menu of the Processor Manager tab work
for all blue checked items.
1. Select the check boxes for the jobs whose processing options you want to edit.
2. Click Configure > Edit Default Options. The EnCase Processor Options dialog
is displayed with the default processing options selected.
1. Click Configure > Set Manager Name. The Manager Settings dialog is
displayed.
2. Enter the manager name you want to use, then click OK.
1. Click Pause Queue once to pause submission of new jobs. Current jobs continue
to execute. The menu name changes to Resume Queue.
1. Click Clean List. A dialog is displayed asking you to confirm before removing
all processed and failed jobs from the job list.
2. Click Yes.
• The Evidence Processor Status tab is displayed, providing information on the job
currently running. It shows what is executing within a given job from the node
that is processing the job, as well as basic memory information.
• The Performance tab displays the current state of the performance counters for
the selected job.
Click Back to return to the job list, click Refresh to instantly refresh the performance
statistics, or click the Auto Refresh check box to enable periodic updates of
performance statistics.
1. Click the Selected check box in the Processor Manager tab menu bar.
7.26.8.2 Queue
1. Select the job you want to queue for processing. If you want to queue more than
one job, click the check boxes for those jobs.
2. Click Queue. If you clicked more than one check box, you have the option to
queue only the currently selected job or all the selected jobs.
3. From the list, click Current Item or All Selected Items. The Queue Processing
Jobs dialog is displayed.
Note: This dialog does not display if Local Machine is the only node in the
node list.
• Select Next Available Processor Node to send the job to the most currently
available Processor Node. This is the default.
• Select Local Machine to process the job locally instead of sending it to a
Processor Node.
• Select Specific Processor Node if you want choose a specific Processor Node
to use to process the job. The Select Processor Node button is then enabled.
Click the button to open the Select Processor Node dialog.
• Select the Processor Node (in online status) you want to use, then click OK.
Back in the Queue Processing Jobs dialog, click OK.
4. An indicator in the bottom right corner shows which evidence is currently being
processed. You can double click this indicator at any time to go to the Processor
Manager tab.
You can see processing details in the Event Viewer of the machine running the
Processor Node. You will see:
You will see logs each time an event begins (for example, processing starts and
threads created).
7.26.8.3 Hold
To place a job on hold:
1. Select the job you want to place on hold. If you want to place a hold on more
than one job, click the check boxes for those jobs.
2. Click Hold. If you clicked more than one check box, you have the option to
place only the selected job on hold or all the selected jobs.
3. The Hold Job(s) dialog is displayed and asks if you are sure you want to place
the job(s) on hold. To continue, click Yes.
7.26.8.4 Stop
To stop a job:
1. Select the job in a running state that you want to stop processing. If you want to
stop more than one job, click the check boxes for those jobs.
2. Click Stop. If you clicked more than one check box, you have the option to stop
only the selected job or all the selected jobs.
3. The Stop Job(s) dialog is displayed, asking you to confirm stopping the selected
job(s). Click Yes to continue.
1. In the Processor Manager tab, select the job you want to force stop. If you want
to force stop more than one job, click the check box for each job.
2. Click Force Stop. If you clicked more than one check box, you have the option
to force stop only the selected job or all the selected jobs.
3. The Force Stop dialog is displayed and asks you to confirm termination of the
job. Click Yes to continue.
Message Explanation
Waiting for job state from Processor Node. You may see this job status briefly when you
start EnCase and quickly switch to the
Processor Manager tab.
The status message is for jobs in the job list that
EnCase last identified as running on a remote
processor node. The job status is quickly
replaced with either the actual job status or
“Waiting for Processor Node to come Online”
if the node is offline.
[processor node name] is not in the Jobs display this status when the processor
Processor Node list. node they are queued to or running on is
deleted from the node list. The status goes
away if the node is added back into the list.
Message Explanation
The chosen Processor Node cannot access Jobs display this status when they are queued
the evidence file. to a specific processor node, but the processor
node cannot access the job's evidence file over
the network.
The chosen Processor Node cannot access Jobs display this status when they are queued
the primary evidence cache folder. to a specific processor node, but the processor
node cannot access the job's evidence cache
over the network.
The chosen Processor Node does not have Jobs display this status when they are queued
the module [module name]. to a specific processor node, but the processor
node does not have the indicated third party
EnScript module required by the job.
No Processor Node can access both the Jobs queued to the next available processor
evidence file and evidence cache. node display this status when none of the
processor nodes can access the job's evidence
file and evidence cache over the network. Jobs
in this status remain in the Queued state and
will run if the network access issue is fixed.
No Processor Node has the module Jobs queued to the next available processor
[module name]. node display this status when no processor
node has the indicated third party EnScript
module required by the job.
Corresponding job [parent job name] failed A child job displays this status if its parent job
to complete. fails to complete successfully. The child job is
placed into the error state (or incomplete state
if the parent job was stopped).
Examples of paired jobs are:
• Stage 1 job (parent) and corresponding
Stage 2 job (child)
• Acquire job (parent) and its corresponding
processing job (child), if the Acquire and
Process option was used.
Not all evidence was queued. See Job This message is displayed after attempting to
Status for more information. queue jobs if not all of the jobs were
successfully queued. You can go to the
Processor Manager tab to see which jobs failed
to queue and why.
Job [child job name] cannot be queued A child job displays this status if you try to
because corresponding job [parent job queue the job, but its parent job is not currently
name] is not Queued, Running, or queued, running, or processed at the time you
Processed. try to queue the child job.
Examples of paired jobs are:
• Stage 1 job (parent) and corresponding
Stage 2 job (child)
• Acquire job (parent) and its corresponding
processing job (child), if the Acquire and
Process option was used.
Message Explanation
Stage 2 jobs must be queued to the same A Stage 2 job displays this status if you try to
Processor Node as their Stage 1 jobs. queue it to a different processor node than the
one to which its parent job was queued.
The evidence is already queued for A job displays this status when you try to
processing. queue it, but there is another (non-parent) job
for the same evidence that is already queued.
The evidence is already being processed. A job displays this status when you try to
queue it, but there is another (non-parent) job
for the same evidence that is already running.
Running jobs must be stopped before being This message is displayed if you blue check a
removed from list. number of jobs in the job list, then click the
Remove menu option, and some of the blue-
checked jobs are currently running. The
running jobs are left alone. The other jobs are
removed.
Priority of [child job name] job cannot be This message is displayed if you attempt to
increased above that of corresponding job increase a child job's priority above that of its
[parent job name]. corresponding parent job.
Priority of [parent job name] job cannot be This message is displayed if you attempt to
decreased below that of corresponding job decrease a parent job's priority below that of its
[child job name]. corresponding child job.
You must wait for the current job to This message is displayed if you try to delete
complete before you can remove Local the Local Machine from the processor node list
Machine from the list. while the Local Machine is processing a job.
You must stop all local processing jobs This message is displayed if you try to close
before closing EnCase. EnCase while jobs are running on the Local
Machine or running internally.
Cannot edit the options of a Stage 2 job. This message is displayed if you try to edit the
Edit the options of the corresponding Stage processing options of a Stage 2 job present in
1 job instead. the job list.
There is already a Processor Node with the You see this message if you try to rename a
name [processor node name]. node to a name that matches a node already in
the processor node list.
The specified Processor Node is already in This message is displayed if you try to add a
the list. processor node already in the processor node
list.
Processor Node [processor node name] is This message is displayed if you try to add a
not compatible with this version of EnCase. processor node that is either too new or too old
compared to the version of EnCase you are
using. This message also displays the version
number of the processor node and the version
number of your EnCase and indicates which
one needs to be updated.
Message Explanation
You must have at least one Processor This message is displayed if you try to delete
Node. the last remaining processor node from the
processor node list.
All Processor Nodes are offline. Jobs queued to the next available processor
node display this status if all processor nodes
go (or are) offline. The status goes away when
at least one node comes online.
Acquisition was stopped. Acquisition jobs display this status if they are
stopped before acquisition can complete.
Waiting for case to be opened. Acquisition jobs in the Queued state display
this status if the case the job is associated with
is not open in EnCase. Unlike processing jobs,
an acquisition job can only run when its case is
open.
Waiting for Processor Node to come A job queued to a specific processor node
Online. displays this status when that node is offline.
The status goes away when the node comes
online. Jobs that were running on that node
also display this message while the node is
offline.
Evidence must be queued to Local This message is displayed if you try to queue a
Machine. job to a remote processor node but the job's
evidence must be processed locally. Currently,
only evidence files can be processed by remote
processor nodes. Previews must be processed
by the Local Machine.
Local Machine is required but is not A job displays this status if you try to queue
configured for processing. the job and it requires the Local Machine (that
is, because job's evidence is a preview), but the
Local Machine is not in the processor node list.
Evidence is already queued for acquisition. An acquisition job displays this status if you
try to queue the job but there is another
acquisition job for the same device or evidence
file already in the queue.
You must select a Processor Node that is This message is displayed if you try to queue a
Online. job to a processor node that is offline.
No valid evidence images to process. This message is displayed after the Processor
Options dialog closes if none of the evidence
you selected for processing can be opened.
Message Explanation
No currently available Processor Node can Jobs queued to the next available processor
run this job. node display this status when none of the
processor nodes available can run the job. A
node is not available if it is currently
processing a job. If all nodes become available
and yet none of them can process the job, then
the job status changes to either “No Processor
Node can access both the evidence file and
evidence cache” or “No Processor Node has
the module [module name]”, depending on the
reason why the nodes cannot process the job. If
a node that can run the job becomes available,
it runs the job.
Job not present on Processor Node A job displays this status if it started running
[processor node name]. on a processor node and then some time later
the node loses knowledge of the job. This can
happen if the node is stopped (or crashed) and
then restarted.
This EnCase is not the active Evidence This message is displayed if you start a second
Processor Manager. instance of EnCase from the same installation
and then try to process evidence with that
EnCase. Only one EnCase from a given install
can act as Evidence Processor Manager. If
EnCase is installed multiple times into
different install folders, then each of them can
run as an Evidence Processor Manager.
Local Machine cannot be edited. This message is displayed if you try to edit the
processor node settings of the Local Machine
node. In general, these settings cannot be
changed. However, you can enable the Heap
Dump option for the Local Machine in EnCase
in the Tools > Options dialog (on the Debug
tab). The next time the Local Machine is
started, it will run with heap dumps enabled.
To disable heap dumps for the Local Machine,
first disable it for EnCase, then restart EnCase.
Evidence file path must use UNC or A job displays this status if it was submitted to
mapped drive. a remote processing node for processing but
the evidence file path did not use UNC format
or a mapped drive letter. Remote processing
nodes can only process evidence files residing
on shared drives.
Evidence cache path must use UNC or A job displays this status if it was submitted to
mapped drive. a remote processing node for processing but
the evidence cache path did not use UNC
format or a mapped drive letter. Remote
processing nodes can only process evidence
files if their evidence cache folders reside on
shared drives.
Message Explanation
Processor Node cannot write to evidence A job displays this status if it was submitted to
cache folder. a remote processing node for processing but
the processing node does not have write access
to the case’s network-shared evidence cache
folder.
The UNC path or mapped drive specified A job displays this status if it was submitted to
in the case does not resolve to the same a remote processing node for processing but
location on the Processor Node. the processor node has a local drive that has
the same drive letter as one used by the case
associated with the job. For example, the case
uses the mapped drive D: for its evidence
cache, but the remote processor has its own
local drive D: that is not the same as the
network-shared D: drive.
You cannot rename a Processor Node to This message is displayed if you try to rename
[reserved name]. a processing node to either “Local Machine” or
“Next Available”. These are reserved names
used by EnCase.
You must log into a SAFE before A SAFE network preview processing job
processing network preview. displays this status if you try to queue it when
you are not logged into a SAFE.
Waiting for SAFE login. SAFE network preview processing jobs in the
Queued state display this status shortly after
starting EnCase until you log into a SAFE.
Processing crossover preview is not This job status is displayed if you try to process
supported. Must acquire and process. a crossover preview.
2. Select the Debug tab and click Show Logging to show the Logs dialog box.
3. From the Log Categories table, locate Evidence Processing in the Category
column, then select its corresponding check box:
4. Select the Capture and log selected categories during evidence processing
check box.
5. Select one of the check box options from the Log Message Destinations area:
• Save in memory
• Display in debug output
• Display in Console
• Write to file
When selecting this option, specify filename and what to do when an older
file exists.
6. Click OK. Messages showing Processor Manager activity are sent to your
chosen log message destination.
• Process
• Acquire, or
• Acquire and Process
If you choose Process, the EnCase Processor Options dialog is displayed with the
preview listed as the Current Item choice in the What to Process section of the
dialog. If you choose Acquire or Acquire and Process, the Acquire Device dialog is
displayed instead and shows the information for the preview.
You can only process preview evidence by the Local Machine processor node;
therefore, Local Machine must be present in your processor node list to process
previews. Some types of live previews have additional restrictions or require user
actions before they can be acquired or processed. The section below discusses each
type of preview and what restrictions apply, if any.
After creating a case and adding evidence, you can browse and manipulate your
views of the evidence in a wide variety of ways:
This chapter provides an overview of the EnCase interface and describes the ways
you can browse and view collected evidence.
• Tree pane
• Table pane
• View pane
Selections in the Tree pane affect the Table pane. Selections in the Table pane affect
the View pane. For more information about the Tree pane, see “Navigating the Tree
pane” on page 303. For more information about the Table pane, see “Navigating the
Table pane” on page 304.
Click the Split Mode button on the toolbar to choose a viewing mode, from the list
of available options:
• Tree-Table view: Shows the Tree pane on the left, the Table pane on the right,
and the View pane on the bottom. This is the traditional EnCase entries view.
• Traeble view: Combines the Tree and Table panes on the top, and retains the
View pane on the bottom. The view provides the ability to browse the folder
structure in the Name column.
• Tree view: Displays the Tree pane on the left and the View pane on the
right. There is no Table view. This is the suggested view for looking at email
artifacts.
EnCase uses three methods used to focus on specific files or folders. These methods
have different purposes:
– EnCase displays the number of currently selected items in the Selected box
above the Table pane.
– To clear all selected entries, clear the blue check from the Selected box.
Blue checks persist within a case. Blue checks are case specific and remain persistent
in the same tab where they were created.
• Navigating from Evidence view to Entry view or from Entry view to Evidence
view.
• Navigating from Entry view to Record view (for example, viewing file structure
on an entry).
• Navigating from Entry view to Results view.
• Navigating from Results to Entry (within the same tab).
By default, blue checks do not persist if you end your session in EnCase.
An option in the Tools > Options menu gives you the choice to allow blue checks to
persist after closing a case or exiting EnCase. This affects performance – it may take
longer to open a case if you select this – depending on how many blue checks are
active when you close the case.
See “Working with table columns” on page 308 for information on column
management. See “Dynamic table view” on page 310 to add or remove file attributes
as columns in the Table view.
The Table pane > Table view includes columns with information about the
displayed entries:
• File Created typically reflects the date/time the file/folder was created at that
location. A notable exception to this is the extraction of files/folders from a ZIP
archive. Those objects carry the created date/time as they existed when the
objects were placed in the archive.
• Last Written reflects the date/time the file was last opened, edited, and then
saved. This corresponds to the Modified time in Windows.
• Is Picture indicates whether the file is an image.
• Is Indexed indicates whether the item was indexed during processing.
• Code Page displays the character encoding table upon which the file is based.
• MD5 displays a 128-bit value for a file entry generated by a hash analysis
process.
• SHA1 displays the SHA1 hash value for a file entry generated by a hash analysis
process.
• SHA256 displays the SHA256 hash value for a file entry generated by a hash
analysis process.
• SHA512 displays the SHA512 hash value for a file entry generated by a hash
analysis process.
• Entropy displays the entropy value for a file entry generated by the entropy
analysis process.
• From displays the sender of the email message. This column is hidden by
default.
• Recipient displays the receiver of the email message. This column is hidden by
default.
• Primary Device displays the primary device used. This column is hidden by
default.
• Item Path identifies the location of the file within the evidence file, including the
evidence file name and a volume identifier.
• Description describes the condition of the entry: whether it is a file or folder,
deleted, or deleted/overwritten.
• Is Deleted indicates if the entry is deleted.
• Entry Modified indicates when the administrative data for the file was last
altered for NTFS and Linux.
• File Deleted displays the deleted date/time if the file is in the Recycle Bin’s Info2
file.
• File Acquired is the date and time the evidence file where this entry resides was
acquired.
• Initialized Size indicates the size of the file when it is opened. It applies only to
NTFS and exFAT file systems.
• Physical Size specifies the size of the storage areas allocated to the file.
• Date Range: Click this button to open the Viewing Range dialog, which allows
you to configure the Start Date, End Date, Start Time, and End Time of the date
range to be shown in the timeline. The date range label displayed on this toolbar
is customizable (for details, see “Date options” on page 67). However, the fields
on the Viewing Range dialog are not affected by the EnCase date/time format,
and are in mm/dd/yy format and HH:MM:SS AM/PM format, respectively.
Note: When users type a 4-digit year in the Start Date or End Date field,
EnCase shortens it to a 2-digit year.
•
Zoom out: Click the icon to provide a larger time overview (up to a year-by-
year timeline).
Zoom in: Click the icon to provide a more granular time view (up to a
second-by-second timeline). You can also increase the Timeline scaling by
double-clicking anywhere in the Timeline view.
The zoom in/zoom out options allow you to see data in ranges of years, months,
weeks, days, hours, and minutes.
• Reset View: Click this button to reset the Timeline view to a year-by-year
resolution.
• Date Type: Click this button to open the Date Type Options dialog, which
allows you to select the date types to be shown in the timeline and define the
color to represent these date types in the graph.
Users can left-click a bar in the graph to highlight it, or right-click a bar in the graph
to highlight the bar and access its context menu. Only one bar can be highlighted at
the time. The context menu allows users to tag and bookmark evidence items of
interest for an investigation.
To sort by a column, double-click the column header. To apply a subsort, hold down
the Shift key and double-click another column header. You can sort columns up to
five layers deep.
You can lock columns on the left side of the Table pane so they always remain
visible when scrolling horizontally.
• To lock a column in the Table pane, click anywhere in the column and click the
table column menu icon and select Set Lock. The selected column and all
columns to its left are now locked.
• If columns are rearranged, all columns to the left of that position remain locked.
•
To release the lock, click the table column menu icon and select Unlock.
You can hide individual columns by clicking anywhere in a column, clicking the
table column menu icon , and selecting Hide. The selected column is now
hidden in the table.
Display hidden columns by clicking the table column menu icon , and
selecting Show Columns. The Show Columns table shows visible column titles as
checked and hidden column titles as cleared. Check column titles to make the
columns visible in the Table pane. Click OK.
The list below shows additional columns available in the Search Results
and Bookmark column views. You can sort these columns like any other columns in
EnCase. You must enable these columns to include them in a view.
• Received (the time an email was received as identified by the email application)
• Sent (the time an email was sent as identified by the email application)
• Description (File, Archive, etc.)
• Action URL
• Icon URL
• Requesting URL
• URL Host
• URL Host Name
• URL Name
• True Path
• Item Path
• Symbolic Link
• Entry Modified
• Has Attachments
1.
Click the Application icon , then select Change table options to select a
display density.
2. Select a display density: Compact or Comfortable.
3. Optionally select the Show vertical gridlines check box to add more visual
structure to the table.
4. Click OK.
By default, EnCase uses the appropriate viewer for each item selected whenever
possible. To keep the tabs from switching for different data types, click the Lock
check box on the top right of the View pane to lock the view to that tab.
• The Fields tab displays all information available regarding an item. All fields
shown on this tab are indexed.
• The Report tab provides a readable, formatted view of metadata. This is the
preferred view for email.
• The Text tab displays files in ASCII or Unicode text.
– You can modify how text in this tab is displayed. See “Changing text styles”
on page 312.
– When viewing search results, select Compressed View in the Text tab to see
only lines with raw keyword search hits.
– Use the Previous/Next Hit buttons to move through hits in the file. If there
are no more hits in the file, the next item opens and the first hit is found.
• The Hex tab displays files as straight hexadecimal.
– When viewing search results, selectCompressed View to see only lines with
raw keyword search hits.
– Use the Previous/Next Hit buttons to move through hits in the file. If there
are no more hits in the file, the next item opens and the first hit is found.
• The Doc tab provides native views of formats supported by Oracle Outside In
technology.
• The Transcript tab displays the same formats as the Doc tab, but filters out
formatting, allowing you to view files that cannot display effectively in the Text
tab.
– The Transcript tab displays the extracted text from the file.
– When viewing search results, select Compressed View to see only lines with
index query hits.
– Use the Previous/Next Hit buttons to move through hits within the file. If
there are no more hits in the file, the next item opens and the first hit is found.
• The Picture tab displays graphics files. If the highlighted file in the Table pane is
an image that can be decoded internally, EnCase lets you select the Picture view
in the View pane and displays the image.
• File extents shows sector information about the selected file. This works on entry
evidence only.
• The Permissions tab displays security permissions for a file, including the name
and security identification number (SID) of the user(s) who have permission to
read, write, and execute a file.
• Hash sets shows hash information for entry evidence only.
• Attributes shows additional viewable attributes of a file.
1. From the Table pane, select a file that contains the attribute you want to add to
the table.
2. Select the Attributes tab from the View pane.
3. Navigate to and select the attribute in the View pane's tree view. The attribute
or attributes are displayed.
4. Click the attribute, and click Add attribute to Table view in the View pane
Attribute tab menu bar. The attribute is added to the Table pane.
1. From the Table pane, select a file that contains the attribute you want to remove
from the table.
2. Select the Attributes tab from the View pane.
3. Navigate to and select the attribute in the View pane's tree view. The attribute is
displayed.
4. Click the attribute, and click Delete attribute from Table view in the View
pane Attribute tab menu bar. The attribute is removed from the Table pane.
1. From the View pane, click the Delete all attributes from Table view in the
View pane Attribute tab menu bar. A dialog is displayed asking for you to
confirm removal of all added attribute columns.
2. Click Yes to remove all added attribute columns from the Table view.
All added attribute columns are removed from the Table pane.
You can also use the context menu to select an attribute and take any of the above
actions. Right-click the attribute you want to take action on. The context menu is
displayed. Select Table View and the action you want to take.
If you encounter a file type that EnCase does not have built-in capabilities to display,
you can add an external viewer for that file type.
1. From the Evidence tab, right-click on an evidence item and select Open with >
File Viewers. The Edit File Viewers list is displayed.
2. Click New. The New File Viewer dialog box is displayed.
The file viewer is added to the Open With context menu list to use as needed.
1. Click New to create a new text style. The New Text Style dialog is displayed.
3. Click OK to save the new text style and return to the Edit Text Styles dialog.
4. Click OK to make the new style available. The new text style is now applied to
the Text tab in the View pane.
1. On the Evidence tab, select View > File Types. The File Types tab is displayed.
2. Double-click the file type you want to associate the new viewer with.
– This is used if a footer for the file type is not specified and is used to
determine the length of the file.
– If this is not set, EnCase uses a default length of 4096 bytes to determine
the end of the file.
– Longer lengths are recommended for pictures and ZIP files.
• The Viewer area contains options for selecting the type of viewer to use:
– Click EnCase to associate the built-in EnCase viewer with the file type
you define.
– Click Windows to associate Windows with the file type you define.
– Click Installed Viewer to associate an installed viewer with a file type.
Use the installed viewers tree to select the specific viewer.
• The Installed viewers tree lists the file viewers currently known to EnCase.
4. Click OK. All files of this file type are now associated with the selected file
viewer.
1. On the Text or Hex tabs in the View pane, select the bytes you want to decode.
2. Click the Decode tab in the lower right pane and select from the list of decoding
options.
– When populating the Quick View table, all bytes required to successfully
interpret the data are read.
– For example, if one byte is selected, and four bytes are required to decode
a 32-bit integer, Quick View looks at the next three bytes to provide the
decoded interpretations.
• The View Types list displays specific decoded values, organized in a tree
structure.
– With the exception of pictures, when viewing by Type, only the selected
bytes are interpreted.
– For example, if one byte is selected, and four bytes are required to decode
a 32-bit integer, a decoded interpretation is not available.
To return the View pane to the main window, close the View pane window.
2. Click the option icon on the top right of the table pane to display available
options.
4. Right-click in the body of the Local Users tab and select New.
5. In the Local User dialog, enter the name and SID of the new user. You can
optionally enter a comment.
6. Click OK.
3. To change the color of the text, right-click the Foreground color and select the
new color from the dropdown menu. If the color you want is not an option,
double click the foreground color and select from the color palette.
4. To change the background color, right-click the Background color and select the
new color from the dropdown menu. If the color you want is not an option,
double click the foreground color and select from the color palette.
5. Click OK.
Evidence is information you can view and process in EnCase from a variety of
sources:
EnCase parses these files as they come in. Each file is displayed as a device on the
interface. All parsed data from a device is stored in a device cache so it does not
need to be reloaded each time it is viewed.
The Evidence tab table view shows the evidence currently loaded into your case.
Notice that when you are viewing a list of evidence the View button is displayed as
View: Evidence.
Click any one of these pieces of evidence to open it more fully. Notice that when you
are viewing an expanded view of an entry, the View button is displayed as View:
Entries.
Click the View button to move between the top level list of devices or see an
expanded view of specific evidence:
If you want to see all the evidence expanded into the same entry screen, go to the
top level list of devices, select all the evidence files you want to see, and click Open
from the menu.
The display changes to show the expanded view of all selected evidence entries.
The status bar at the bottom of the screen displays the full path of the highlighted
item. This can be useful when documenting the location of evidence found in
unallocated space. If a deleted/overwritten file is highlighted, it indicates the
overwriting file.
Specific sector, cluster, and file information is presented in parentheses after the file
path of the selected item.
Abbreviation Definition
PS physical sector number
LS logical sector number
CL cluster number
SO distance in bytes from the beginning of the sector (sector offset)
FO distance in bytes from the beginning of the file (file offset)
LE number in bytes of the selected area (length)
The status of any processing activity displays in the lower right of the status bar.
• Export Project VIC Files generates a .JSON file for export to Project VIC.
• Go To Overwriting File: If a file is overwritten, this option takes you to the
overwriting file.
• Go To Linked File: Go to the linked file in the table view.
Disk view is available from the Entry view of the Evidence tab. To open Disk view,
select Disk View from the Device menu.
• The file selected in the table is highlighted in Disk view as dark blue squares.
• Allocated sectors display in light blue.
• Unallocated sectors display in gray.
Select Auto Extents to automatically highlight all the remaining extents that make
up the file associated with the selected sector. If Auto Extents is off, double click a
sector to show the remaining associated extents.
1. In the Evidence tab toolbar, click Change Caches. The Change Caches dialog is
displayed.
2. To use the base Case folder for the primary evidence cache, select the
corresponding check box.
3. To change the location of the primary evidence cache, click the Primary
evidence cache ellipsis button, browse to the new location, and click OK.
4. To add a secondary evidence cache location, click the Secondary evidence cache
ellipsis button, browse to the new location, and click OK.
5. Click Next. The Evidence Cache Preview dialog is displayed. Status is listed for
each evidence cache:
• Ready (Primary) means the new path contains a cache in the primary cache.
• Ready (Secondary) means the new path contains a cache in the secondary
cache.
• Missing means the old location had a cache, but neither the primary nor
secondary locations have a cache for the evidence.
• None means there never was a cache for this device.
All artifacts available in the case can be seen in the root of the Artifacts tab. Click
View > Artifacts to browse this list. These artifacts are grouped by evidence file,
then by type. Click the blue link to open a single artifact. Blue check artifacts and
click Open in the toolbar to open multiple artifacts in one view.
You can also access artifacts from the Entries view. Entries that you can expand and
view in the Artifacts tab display as blue links marked with a green plus sign in the
Entries view.
If an entry does not display as a blue link, select it and click View File Structure
from the Entries dropdown menu. The View File Structure command automatically
expands, or mounts, the file. After initially mounting the file, you can see the
expanded data in the Artifacts tab as well.
Depending on the currently selected tab, different types of filters are available. For
example, the filters available for search hits are different from those available for
entries.
Both filters and conditions work the same way in terms of how they affect the items
in the Table pane.
1. From the lower right pane, open the Filter tab. The preconfigured filters are in
the Default folder.
2. Double-click the filter you want, then click Open. A Run Filter dialog is
displayed.
4. Click OK to run the filter. Depending on which filter you selected, additional
dialogs may display. When a filter is running, the name of that filter shows in
the lower right of the status bar. When complete, the results display in the
specified result location.
Note: You need a working knowledge of EnScript to make a new filter. If you
do not have this working knowledge, you may be able to create a condition to
perform the same function.
1. From the Filter tab, select New from the toolbar. The New Filter dialog is
displayed.
3. Click OK. The New Filter tab is displayed, showing a source editor.
4. Enter EnScript code as required to accomplish your task. The newly created
filter is displayed at the bottom of the filters list.
1. Open the Filter tab in the lower right pane. A list of all customized and
preconfigured filters is displayed. You may only edit customized filters.
2. Select the filter you want to edit and click Edit. The source code opens in a
Filtertab.
To change the name of an existing filter, right-click the filter in the Filter tab and
click Rename.
You may only edit customized filters. To edit a preconfigured filter, it must first be
copied to the User folder. Drag the filter to the desired folder while holding the
control key or drag using the right mouse button to make a copy. The copy may then
be edited.
1. Open the Filter tab in the lower right pane. A list of all customized and
preconfigured filters is displayed.
2. Right-click the filter you want to export, then click Browse. A Windows
Explorer window opens.
4. Navigate to the place where you want to store the file and click Paste.
5. To import a filter created by someone else, use Browse to view the User folder
in Explorer, and place the new filter in that folder.
8.4 Conditions
Conditions are compilations of search terms that instruct EnCase to find certain data
based on a certain property of information.
Conditions are similar to filters in that they display only those entries matching a
specific set of criteria in the Table pane. Both conditions and filters are EnScript code
that performs a filtering process on your data.
The difference between filters and conditions is that creating a condition does not
require that you can program in EnScript. Through a special interface you can create
them without coding directly in EnScript.
Once you create a condition, you can run it on any evidence in the case.
1. From the lower right pane, open the Condition tab. The preconfigured
conditions are in the Default folder.
2. Double-click the filter you want to display the Run Condition dialog.
3. Right-click the Main function node on the conditions tree and select New. The
New Term dialog is displayed.
– Operators indicate how you want to filter the information. Operators that
allow you to enter values can use GREP expressions, or provide a list of
values to find.
• To change the AND/OR logic within the condition, right-click the term and
select Change Logic. This changes the AND operator to an OR, and vice
versa.
• To negate the logic of a term, right-click the term and select Not.
• Repeat the steps above to create as many terms as you want to make the
condition as detailed as possible.
4. When you finish, click OK to close the New Term dialog. The new condition is
displayed in the Edit condition dialog.
• When you run the condition, the terms are evaluated in the order in which
they display.
• Conditions work from the top to the bottom, so the sequence in the
condition tree directly affects how well the condition works. To be most
effective, for example, place an extension search for all .docx files before a
keyword search. This saves processing time by not looking for keywords in
files that may not even contain text.
You can only edit customized conditions. To edit a preconfigured condition, first
copy it to the User folder. Drag the filter to the desired folder while holding the
control key or drag using the right mouse button to make a copy. You can then edit
the copy.
Note: You cannot edit preconfigured conditions because they may be updated
by future versions of EnCase.
1. Open the Condition tab in the lower right pane. A list of all customized and
preconfigured conditions is displayed.
2. Right-click the condition you want to export, then click Browse. A Windows
Explorer window opens.
4. Navigate to the place where you want to store the file and click Paste.
5. To import a condition created by someone else, use Browse to view the User
folder in Explorer, and place the new condition in that folder.
• To browse through Internet artifacts, expand an Internet node in the Tree pane of
the Artifacts tab. The Browser node contains the various Internet items. Use the
Fields tab in the lower pane to view the most information.
• To browse through Archives, expand the Archives node in the Tree pane of the
Artifacts tab and browse through the various Archive items in the Table pane.
Use the Fields tab in the lower pane to view the most information.
• To view all the results of the modules used for processing evidence, expand the
Evidence Processor Modules node in the Tree pane of the Artifacts tab and
browse through the various items, Use the Fields tab in the lower pane to view
the most information.
• To view mobile device data, open the evidence file in either the Artifacts or
Evidence tab. The EnCase Mobile Investigator is the best way to view all mobile
device information.
In the table pane, select the item you want to research and click Go To File. The
view changes to display the device where the entry is located. If you select an email
attachment, you are taken into the email file, with the email message containing the
attachment selected.
If an item resides in a top level device, the file structure may not display any
changes when you click the Go To File button, because there are no additional levels
above the top level.
2. On the Full Investigation page, click Determine the Time Zone of the
Evidence.
The Time Zone Info Prior to Processing dialog is displayed.
3. Select the evidence you want time zone information for, enter a bookmark
folder name or accept the default name, then click OK.
5. In the left pane, click an item in the tree to see detailed time zone information in
the right pane.
6. Read the instructions in the dialog, if you want to modify time zone settings.
Click OK to create a bookmark for each time zone entry.
1. From the Evidence or Artifacts tabs, right-click the item you want to research,
then click Find Related.
3. Click Save & Run to run the query. When you finish, the results display in the
Results tab, under the name of the query.
By default, images in Gallery view are sorted by extension. You can view image files
with incorrect extensions after they are processed using the Evidence Processor.
You can access all images within a highlighted folder, highlighted volume, or the
entire case. If a folder is highlighted in the Tree pane, all files in the folder display in
the Table pane. Click a folder's Set Include to select all files in that folder and files in
any of its subfolders. Once selected on the Table pane, any images in the selected
files display in Gallery view.
• To increase the number of images displayed per row in Gallery view, right-click
any image, then click More Columns.
• To bookmark images in Gallery view, right-click the image and select the type of
bookmark to assign to it.
• To view ownership permissions for an image, select the image and click the
Permissions tab in the lower pane.
By default, Gallery view displays files based on their file extension. For example, if
a .jpg file is renamed to .dll, it does not display in Gallery view until you run a
Signature Analysis. Once the signature analysis recognizes the file was renamed and
that the file is actually an image, it is displayed in Gallery view.
EnCase includes built-in crash protection, which prevents corrupted graphic images
from displaying in Gallery view. The timeout defaults to 12 seconds for the thread
trying to read a corrupt image file. You can modify the timeout on the Global tab of
the Options dialog.
Corrupt images tracked in the Case file so they are recognized as corrupt the next
time they are accessed.
If the cache becomes full you can clear it: select the arrow dropdown menu in
Evidence view and select Clear invalid image cache.
When viewing images in the Gallery tab, click a thumbnail image to see its location
in the navigation trail at the bottom of the screen. To go to the location of the image,
select the thumbnail and click Go to file.
To tag or bookmark the image, select the thumbnail and tag or bookmark as
required.
From the File Types tab, you can add, delete, and disable file types.
• To delete a custom file type, select it in the File Types tab and click Delete.
• You cannot delete default and shared files types.
• Checking Disable causes that file type to be ignored.
1. From the View menu, select File Types. The File Types tab is displayed.
– Use this if a footer for the file type has not been specified and is used to
determine the length of the file.
– If this is not set, a default length of 4096 bytes is used to determine the
end of the file.
– Longer lengths are recommended for pictures and ZIP files.
• The Viewer area contains options for selecting the type of viewer to use:
– Click EnCase to associate the built-in EnCase viewer with the file type
you define.
– Click Windows to associate Windows with the file type you define.
– Click Installed Viewer to associate an installed viewer with a file type.
Use the installed viewers tree to select the specific viewer.
– The Installed viewers tree lists the file viewers currently known to
EnCase.
3. Use the Header and Footer tabs to specify the header and footer code defining
this file type.
• The header code is the definitive identifier of the type of file. Use it when
comparing against the file extension in a signature analysis.
• Use the footer code to identify the end of the file.
The Artifacts tab lists all mounted volumes and results from the Evidence Processor
or other activities. Therefore, Artifacts view can display multiple types of data:
EnCase supports viewing only one artifact type at a time. If more than one type is
found in the selected artifacts, the Open Item dialog is displayed, enabling you to
choose the artifact type you want to view. The default is Entries.
Note: In the Open Item dialog, only the radio buttons for the found artifact
types are enabled.
• By processing an evidence file, in which case any unencrypted 7-Zip files within
are parsed automatically
• By viewing individual 7-Zip files manually
1. Right-click the 7-Zip file you want to see. In the dropdown menu, click Entries >
View File Structure.
2. EnCase parses the file and you can view its contents.
Note: If the file is protected or encrypted, a dialog displays asking for the
password.
Note: While loading existing evidence files that have HFS+ volumes in them,
you may notice that the values for Unique Offset changed for some entries.
This is expected behavior, caused by refinements in the offset computing
algorithm. Unique offsets still remain unique within the given device.
• Internal: The attribute size is less than 3802 bytes, and HFS+ stores the attribute
inline (that is, in the same storage place as its name and size).
• External: The attribute size is greater than 3802 bytes, and HFS+ stores the
attribute as a separate data fork
Internal attributes
Most internal attributes are UTF-8 strings, while others are binary .plists or binary
integers. EnCase attempts to convert values to strings whenever possible; if that is
not possible, EnCase displays a hexadecimal representation of the data.
External attributes
External attributes are larger than 3802 bytes and have their own extents. For that
reason, it is impractical to display them as strings. Instead, EnCase displays them as
additional streams of the file they belong to. The file name is concatenated with the
attribute name, separated by a middle dot (·) character.
EnCase recognizes directory hard links and displays them with an icon that is a
combination of a directory and a link. If more than one link points to the same file,
these “sibling” links display in the Attributes tab of the View pane.
To go to the real directory a link points to, right-click the link and click Entries > Go
to Linked File in the dropdown menu. The directory displays in the Fields tab of the
View pane, with the name Original Path.
Finder data is an integral part of the HFS+ file system. This information resides in
the catalog file, along with the file name, size, creation date, etc.
These are saved in the Finder Info Flags field, which EnCase decodes and is
displayed in the Attributes tab of the View pane.
When EnCase displays Finder information, it decodes known flags and, if the
background color of a file or folder was altered, EnCase also decodes the color:
.DS_Store
The .DS_Store file is created inside a directory only when a macOS user visits the
directory using Finder. This means a directory may or may not have the .DS_Store
file.
If a .DS_Store file exists, EnCase processes it on the fly when you select the
Attributes tab in the View pane. It usually contains information about how to
display items in Finder, the items' locations in the Finder window, etc.
The .DS_Store tags are internal and therefore undocumented, but you can deduce
what some of them mean. For example, in the screenshot above:
• Iloc is the location information, 0x263 and 0x81 being X and Y axes of the item.
• logS is the logical size of the item.
• modD and moDD are modification time stamps.
• phyS is the physical size of the item.
If you are looking for a specific tag, EnCase provides that information.
EnCase recognizes and displays Access Control Lists (ACLs), which are lists of
permissions attached to an object, in the Permissions tab of the View pane.
Immutable Permissions
EnCase displays UNIX permissions for a file or folder in the form of:
• User
• Group
• Other
If a file or folder has an Access Control List assigned to it, EnCase uses the UUID
associated with users and groups, instead of the user ID or group ID.
In the image above, EnCase displays the root [System Administrator] ID as 0, the
staff [root] ID as 20.
The Directory Services component of macOS stores information about users and
groups in a set of *.plist files, with one file per user or group. EnCase displays these
in the Table tab of the Table pane. The paths to the file locations display in the Fields
tab of the View pane.
3. Click the option icon on the top right of the Table pane to display available
options.
5. Depending on your selection in step 2, Nix Users or Nix Groups display in the
User List dialog.
• DMG
• Sparse Image
• Sparse Bundle
• Single file
• Preallocated space. Even if the DMG does not contain any data, it still has the
same size as if it were full of files
• Supports various file systems, including HFS+, and FAT. The type of file system
put onto the DMG alters its format (XML metadata for HFS+, raw data for FAT).
EnCase has different code paths to handle both
• Can be encrypted via Apple FileVault
• Single file.
• Space is allocated by 1 MB chunks on demand, as the image data grows.
• Can be encrypted via Apple FileVault.
Apple uses its proprietary encryption scheme, FileVault, to encrypt the media.
1. Open a case.
2. Drag and drop the container (for example, a DMG file) to EnCase. EnCase
displays the file in the Evidence tab.
EnCase supports other types of containers and encryption (if you have a valid
password).
The easiest way to process evidence is to run it through the Evidence Processor.
Once evidence is processed, it can be opened and viewed in ways not possible
before the parsing and expanding processes are performed.
To process evidence with the media analysis module, see “Process images with
Media analysis” on page 244.
2. In the Filters/Conditions pane, click the Filter tab and select Filters > Default >
Items > Media Analyzer. The Run Media Analyzer filter dialog is displayed.
3. Enter a Result Name, select a Filter Target and Filter, or accept the default
name and settings.
5. Select the All Categories check box to apply a confidence level threshold filter
for all categories or select the check boxes of one or more individual categories
to apply the filter to those categories.
The selected images are filtered by the selected confidence level or levels.
2. Select EnScript > Media Analyzer Viewer. The Media Analyzer Viewer table is
displayed in a window.
The table displays filenames for all selected images, followed by the pre-defined
media analysis categories. Each image category contains a number ranging between
0.00 and 100.00 that corresponds to the confidence level that the image falls into that
category. The Media Analyzer View table can be used with the Media Analyzer filter
to display the results of the applied filter if you choose.
Results can be exported by clicking the Options icon, selecting Save as, and saving
results.
Note: The Media Analyzer Viewer table only displays supported images
formats. Files in unsupported image formats and files that are not images are
skipped.
3. Double-click the Media Analyzer folder. The Media Analyzer table displays all
categories and corresponding confidence levels for the selected image.
To see the file structure of a compound file (manually mount), click that file and
select View File Structure. You can also run the file through the Evidence
Processor. That process creates an evidence file you can click to open or view in the
Artifacts tab.
• Registry files
• OLE files
• Compressed files
• Lotus Notes files
• MS Exchange files
• Exchange Server Synchronization
• Outlook Express email
• Microsoft Outlook email
• Macintosh .pax files
• Windows thumbs.db files
• America Online (AOL) .art files
• Office 2007 docs
• ZIP, RAR, and RAR5 archive files
• thumbs.db
When an EDB file is dirty, you can run several tests on it to determine whether the
files are merely out of sync, or are in fact corrupt and unusable. Before running these
tests, acquire the EDB database, including the entire bin and mdbdata folders. Make
sure all codepages are installed on your computer.
The mdbdata folder contains the public and private databases and the transactional
logs which are most important when cleaning a database. The BIN folder contains
eseutil.exe.
2. Use the eseutil.exe command line tool to check the consistency of the state field
as follows:
[file location]\eseutil /mh [filepath]priv1.edb
• Note that the three-character log file base name represents the first log file.
• Files are sequentially named, with E##.log being the first log file.
• Click Yes to run the repair.
4. Run a check (step 2) on the resulting EDB file. If the file is still in an inconsistent
state, attempt to repair the EDB file. This may result in the loss of some data
currently in the .log files. Run the repair as follows:
“C:\Exchange\BIN\Eseutil.exe” /p <database name> [options]
3. Select the file and open View File Structure from the Entries dropdown menu.
4. The View File Structure dialog is displayed. If the EDB file is dirty, the dialog
includes a Scan Dirty Database option.
Note: If the EDB file is not dirty, the only available option is Calculate
unallocated space.
5. To parse the dirty EDB file, check Scan Dirty Database, then click OK.
The default view for Email is the Tree view. This shows the report in full screen, in
as close to native format as possible. Empty fields do not display in the report view.
The Fields tab shows all available metadata about the email and its collection,
including the Transport Msg ID.
Use the Search Results tab and Find Email to view data across multiple repositories.
You may also want to view all your indexed evidence and then show only items
with an item type of Email. You can further drill down by finding subsets of sender,
date range, etc.
EnCase allows you to track email threads and view related messages. Before you can
analyze email threading, you must have already run the Evidence Processor against
your case evidence with the Find email option selected. To avoid displaying the
same message multiple times, EnCase removes duplicate messages in both the Show
Conversation and Show Related email views.
1. In the Artifacts tab, double-click the .PST or .OST file you want to search. The
archive is displayed in a new expanded tab.
EnCase allows you to view attachments on email messages that you select.
1. In the Evidence tab, select the message with the attachment that you want to
view.
2. Click the Doc button in the View pane. EnCase displays the contents of the
message attachment.
EnCase can display conversations for all supported email types except AOL, because
AOL messages do not store thread-related information. However, the feature
cannot always reconstruct complete conversations when the conversations include
messages from multiple email systems. For example, EnCase cannot fully recreate a
conversation where some users are using Outlook, some are using Lotus Notes, and
others Thunderbird.
If an email does not have any of the message header fields specified above, EnCase
cannot construct a conversation thread for it. Selecting such an email and clicking
Show Conversation results in a tree containing only the selected email.
Before you can analyze email threading, you must have already run the Evidence
Processor against your case evidence with the Find email option selected.
1. In the Evidence tab select an email or email store in the Table pane.
EnCase can show related emails for all supported email types. Since Show Related
only looks at the subject line of a message, the emails displayed may not all be
related, depending upon the uniqueness of the subject line.
1. In the Evidence tab select an email or email store in the Table pane.
1. In the Tree pane, select the email message(s) you want to export.
2. Right-click and select Export to *.msg. The Export Email dialog is displayed.
3. Click OK. View the folder structure in the Export folder. Double-click a message
to view it in read-only format.
Artifact Explorer uses EnCase Case files. Users can open a case directly from AEX or
via the traditional EnCase application; however, because a Case file can only be used
by one application at a time, it must be closed by one application before being
opened by the other.
Some case tools, like tags and bookmarks, can be read and used in Artifact Explorer,
but the application cannot create new tags and bookmarks or modify existing ones.
Tags and bookmarks must be created in EnCase Endpoint Investigator and can then
be used in AEX. File viewer associations must also be made in EnCase Endpoint
Investigator prior to use in Artifact Explorer.
Artifact Explorer can be used to view and analyze evidence in triage mode or
processed-evidence mode. Triage mode is used to quickly examine basic file metadata
of artifacts in an evidence file. No evidence processing in EnCase is required.
Processed-evidence mode, is used when the investigator wants to review and
analyze additional properties and attributes identified by the evidence processor in
EnCase. Depending on which options are selected, this might include artifacts in
compound files, file signature information, media analysis category scores, and
others.
3. Select the Prepare evidence for use with Artifact Explorer check box and click
OK. (This check box is selected by default._
4. Restart EnCase.
Note: You only need to restart EnCase if you change this setting.
When this check box is selected, EnCase Endpoint Investigator will prepares
evidence files for use with AEX as they are opened.
Before evidence in a Case file can be viewed in AEX, open the evidence file EnCase
Endpoint Investigator first. Evidence files are prepared in the background when
they are clicked on in EnCase Endpoint Investigator. No user action is necessary for
evidence preparation to occur. This preparation step takes less time than processing
evidence. Large evidence files and files containing processed evidence take longer to
prepare. Because EnCase Endpoint Investigator only prepares those evidence files
you click on, you can prioritize those evidence files you want to review first and add
others later, as needed.
If you choose not to use AEX or want to nominally improve performance for EnCase
Endpoint Investigator, disabling AEX is recommended. If you decide to use AEX in
the future, enable Artifact Explorer in EnCase Endpoint Investigator and open the
evidence files you want to analyze prior to using AEX.
To close the active Case file and open AEX, do the following from within EnCase
Endpoint Investigator:
1. Ensure all relevant evidence has been prepared for use in AEX, that evidence
processing on the case is complete, and that the Case file has been saved.
2. Select Case ([casename]) > Open with Artifact Explorer.
EnCase Endpoint Investigator closes the case and opens Artifact Explorer.
When closing a case, EnCase Endpoint Investigator prompts the user to take
action if:
Save data before closing, and allow EnCase Endpoint Investigator to completely
prepare files for use with AEX. This guarantees all data in your case will be available
for analysis. If processing evidence, allow EnCase Endpoint Investigator to complete
the task. To review partially-processed evidence in AEX, go to the Processor
Manager in EnCase Endpoint Investigator and manually stop processing before
opening AEX. The partially processed evidence will need to be re-processed before
all evidence will be available for viewing.
Note: AEX only displays artifacts from cases with evidence files that have
previously been prepared by opening them in EnCase Endpoint Investigator. If
you open a case in AEX and do not see the expected number of artifacts, close
the file, open it in EnCase Endpoint Investigator, confirm that the AEX
preparation feature is enabled, and ensure that all relevant evidence files are
prepared for use with AEX.
The number of artifacts in a sub-class is listed beside the sub-class title. Classes
display two numbers: the number of artifacts selected, and the total number of
artifacts in that class. In the following example, 7856 of 9445 total artifacts in the
Media class have been selected.
Selecting an artifact class check box automatically selects all sub-classes of the
parent. The partial check box is displayed for the parent Artifacts check box and
any artifact class containing cleared check boxes.
Click the collapse icon of an artifact class to hide sub-classes. Click the expand
icon of an artifact class to show all sub-classes.
The bottom of the center pane shows the number of artifacts checked, filtered, and
selected from the total number of artifacts in the case. The first number indicates one
of two things:
• When no artifacts are selected in the center pane – the total number of checked
artifacts from the left pane.
• When any filter is active – the number of filtered items.
The second number indicates the total number of artifacts found in the open Case
file.
The # selected indicates the number of artifacts selected with check boxes.
In the following example, classes or sub-classes from the Artifacts pane have been
selected and include a total of 85 artifacts. There are 20,501 total artifacts in the case.
No artifacts are currently selected from the center pane.
Center pane columns can be customized to better present the types of artifacts being
investigated. Columns can be moved, hidden, shown, or pinned according to the
requirements of the investigation. All columns are displayed by default. Columns
can be customized in two ways:
• Clicking the Customize columns button and using the Column Chooser dialog
box
• Manually customizing columns in the center pane
The Column Chooser dialog box can be used to display/hide columns and modify
the order in which they appear in the center pane.
Use the Customize columns button on the top left of the center pane to open the
Column Chooser.
Use the Column Chooser to move columns left toward the beginning of the table or
right toward the end of the table. Select multiple columns to move the set to the
desired location.
pane or the down arrow to move the selected columns to the right in the
center pane.
or
Right-click and hold the selected columns and drag to the desired location.
4. Click Apply to apply changes to the center pane.
You can change the column layout in the center pane by dragging individual
columns to different positions. You can also right-click any column header to
display the context menu, which contains grid layout and other options. Grid layout
options include pinning a column to the left or right side of the visible grid,
unpinning a column, hiding a column, or sizing columns to fit the column content.
To drag a column:
1. Left-click and hold the cursor over the column header you want to move.
Note: The check box and row number columns are permanently pinned to the
left side of the grid and cannot be moved. Other columns cannot be moved to
the left of these columns.
You can manually adjust the width of any artifact column or let AEX size the width
of columns automatically.
1. In the header of the column to adjust, hover over the right side of the border
between it and the column header adjacent to it.
2. When the cursor becomes a column adjuster , click and hold the left mouse
button.
3. Drag the right side of the column header to the desired width.
4. Release the mouse button.
1. In the header of the column to size, right-click to show the context menu.
2. Select Size column to fit.
Note: Use the Size all columns to fit if you want all columns sized to fit their
content.
Pinning columns
You can pin columns to the left or right side of the visible grid.
1. Hover over a column header and right-click to show the context menu.
2. Select Pin and choose To the left or To the right.
The column is moved to the left or right edge of the visible grid. A thick gray vertical
line separates the pinned column from unpinned columns.
To unpin a column:
1. Hover over a column header of a pinned column and right-click to show the
context menu.
2. Select Unpin.
Multiple filters across columns can be created. Filters can be manually applied to
individual columns, or the Filter Builder can be used to apply one or more filters to
any column. The filtering method is determined by the data type of the column. All
artifact columns can also be alphanumeric sorted. Where a column data type
contains Boolean values, filter values are limited to true/false.
1. Click the filter in any column header. The filter box appears, showing the
selected column header, filter operator list, and filter criteria text box.
2. Click the filter list to display and select a logical operator. The operator,
Contains, is highlighted in the example above.
3. Enter text in the filter text box.
4. Click Apply.
The logical operator and text criterion are applied to all rows. When filtering in a
column is active, it is indicated with the following:
• To indicate that any filter is active in the grid, the check box, icon, and Edit
Column Filters link above the Row column change as follows:
In the following example, the filter operator Contains ( ) and text “Pictures” are
applied to the Subclass column. In contrast, no filter has been applied to the Class
column, as its column filter icon is gray, and there no value in the filter chooser/
selector box.
A filter can be built and applied to any column with a filter icon. Multiple filters can
be created. A filter View Profile can be used to save all applied filters. Creating a
View Profile also saves the artifacts selected in the Artifacts pane and column layout
(sorted, pinned, displayed, hidden columns, as well as column order).
3. Click Class to show a list of available columns and select a column to filter.
4. Click Contains to show a list of available operators and select an operator to use.
5. Click <enter a value> and add a value to complete the filter.
6. To add another column filter, repeat steps 2-5 above.
7. To apply filters and close the window, click OK.
The filters are applied to all artifacts in the center pane. Columns with active filters
have bold header titles, a yellow filter icon, and a yellow border around the
operator and the filter text box.
To clear all column filters, click the Clear Column Filters link above the center pane
grid. You can also manually clear each column filter via the center pane grid or the
Filter Builder.
You can temporarily suspend all filters by clearing the check box next to the filter
icon and Edit Column Filters link. Selecting the check box applies the filters to
artifacts in the grid. This check box is on by default.
To sort a column:
1. Click the header of any column in the center pane to sort the column in
ascending order. A yellow up arrow is applied to the sorted column to indicate
active sort in ascending order.
2. Click the same header again to sort the column in descending order. A down
arrow is displayed to indicate active sort in descending order.
3. Click again to toggle between ascending and descending order.
1. With one column sorted, hold down the Shift key on the keyboard and click the
header of another column. A yellow up arrow with a number 2 is applied to
this column. The arrow in the first sorted column is updated with a yellow up
arrow and a number 1 . The number adjacent to a sort arrow indicates the
order in which each column sort is applied.
2. Repeat the above step for additional column sorting.
Note: To change the sort order of an individual column while maintaining multi-
column sort, hold down the Shift key and click the header of the column whose sort
order you want to change. Clicking a header without holding down the Shift key
removes all other sorts before applying an ascending sort to that column.
• Right-click a sorted column to show the context menu, then select Clear Sorting
to clear sorting for only that column.
• Right-click any column to show the context menu, then select Clear sort on all
columns to clear sorting for all columns.
Note: When you click on the header of any column, a new ascending sort is
applied to that column and any sorting is removed from other columns.
Dynamic Columns
Artifact Explorer shows columns for which there is artifact data, or potential artifact
data. Because of this, different columns will be displayed depending on whether
your evidence files have been run through the evidence processor in EnCase
Endpoint Investigator, or are being viewed in triage mode. Triage mode offers the
fewest columns available for analysis. Fully processed evidence offers the most
columns.
The content search query consists of terms and operators. Queries are not case-
sensitive.
Boolean operators
The OR and AND Boolean operators can be used with a combination of words and
phrases. Use all-caps with Boolean operators:
Wildcard search
Use the question mark (?) to perform a single-character wildcard search. For
example, a search for
c?t
Returns artifacts with content containing “cat” “cot” and “cut” but not “caught”.
Use the asterisk (*) to perform a multiple character wildcard search. For example, a
search for
test*
Proximity search
Use the tilde (~) to search for a second term that is within x words of the first term.
For example,
“apple pear”~4
returns artifacts with content containing the phrases, “apple is not a pear” and “an
apple is good but a pear is better.”
Term order is honored. For example, if the search query was “pear apple”~4, neither
of the phrases above would be returned, but “pear is not an apple” would be.
Fuzzy search
Append the tilde (~) to a single search term to perform a fuzzy search. A fuzzy
search returns words similar to the search term. For example,
bank~
returns artifacts with content containing the terms, “rank” “sank” and “banks”.
For more information about Lucene query syntax, see “Search operators and term
modifiers” on page 391.
Artifact Explorer triage mode examines file metadata rather than artifact content
data, thus content search cannot be used in triage mode unless evidence files are first
processed using the Index text and metadata evidence processor option in EnCase
Endpoint Investigator.
5. Clear the Apply to all selected artifacts check box if you only want to
bookmark the highlighted artifact.
6. Click OK.
The selected artifacts are bookmarked. Artifacts that have been bookmarked have a
“true” value in the Bookmarked column.
Bookmarks from the selected artifacts are removed, and their Bookmarked value
will change to “false” if they have no associated Bookmarked value. An artifact will
still have a “true” value if bookmarks were removed, but one or more bookmarks
are still associated with the artifact.
1. Apply a tag to an artifact by moving your mouse to the Tags column of the row
of the artifact.
2. Left-click your mouse over the corresponding tag location of the row where you
want to apply the tag. Apply more than one tag to an artifact by clicking other
tags you want to apply.
Note: Clicking an active tag removes the tag from that item.
Tags cannot be created or edited in AEX. If you need to create or edit tags, open the
case in EnCase Endpoint Investigator and make the changes within that application.
See “Tagging items“ on page 445. Any changes made to a case in EnCase Endpoint
Investigator are reflected when re-opened in AEX.
View profiles are global, can be used on any case, and can be shared among
investigators for use on different examiner machines. OpenText provides several
Artifact Explorer view profiles. They can be used as-is, or as a foundation for
creating new view profiles.
View Profile is accessed from the AEX menu bar. This feature includes a list that
displays the active view profile and Save and Delete buttons. The default
profile is shown unless another profile is selected. Click anywhere on the list box to
display all available view profiles.
The save icon is gray when the selected profile has not been modified. Once
changes to the current view are made, the Save icon becomes black to indicate
the current view is not saved. Click Save to save the view profile. Click to
delete the view profile.
1. With an open case, click the View Profile list to show all available view profiles.
2. Select a view profile.
1.
In the View Profile area, click Save .
2. In the dialog box that opens, the last selected or current view profile name is
shown.
3. Accept the name to update the existing view profile or change the name to create
another view profile.
4. Click Save. If the profile exists, confirm overwriting the existing profile and click
OK.
1. Select artifacts from the Artifacts pane and apply filters to isolate the metadata
you want to export.
2. From the center pane, select Export Artifacts.
3. Select Export all artifacts metadata to CSV to export all artifacts shown in the
center pane. Select Export selected artifacts metadata to CSV to export only
selected artifacts from those shown in the center pane.
4. In the System File Save dialog box, navigate to a location to save the file and
enter a file name. Click Save.
The file is saved in CSV format and can be viewed in Microsoft Excel or any other
CSV viewing application.
1. Select artifacts from the Artifacts pane and apply filters to isolate the artifact
content you want to export.
2. From the center pane, select Export Artifacts.
3. Select Export all artifacts to directory to export all artifacts shown in the center
pane. Select Export selected artifacts to directory to export only selected artifacts
from those shown in the center pane.
4. In the System File Save dialog box, navigate to a directory to save the file and
enter a file name. Click Save.
Artifact Explorer will create a directory structure that matches the location of the
exported content in the evidence file, and save the files according to their locations.
Fields in the Properties pane are divided into categories. The number of properties
displayed in Artifact Explorer varies depending on factors such as:
Viewing unprocessed images means fewer properties are displayed. Viewing images
processed with the Media analysis evidence processor option will display selected
media analysis category scores. Viewing a text file from an evidence file processed
with media analysis will not display any media analysis properties because the file
is not an image.
• Content pane name and filenameIn this example, the highlighted filename is
“Tequila Shots.jpg”
• Always on Top keeps the content pane on top (visible), even when focus is on
another pane or window.
–
indicates Always on Top is inactive
–
indicates Always on Top is active
• Undock moves the Artifact Explorer Content pane to a separate window.
The menu icons below the title bar include the following options:
• Best fit scales the content to fit within the size of the Content pane or
window.
• Zoom In and Zoom Out control the zoom level.
• Rotate Counter-clockwise and Rotate Clockwise rotate the content ninety
degrees at a time.
• Previous Artifact and Next Artifact moves to the previous or next
highlighted artifact in the center pane.
If you want to view an artifact that Artifact Explorer cannot render, you can use an
external file viewer by right-clicking on an artifact in the center pane and selecting
an appropriate viewer from the Open Viewers list.
See “Using Artifact Explorer external file viewers” on page 367 to set up Artifact
Explorer with external file viewers.
Set up File viewer associations in EnCase Endpoint Investigator for use within AEX.
See “Adding an external file viewer” on page 312 to create new or edit existing file
viewer associations.
1. Right-click on the evidence entry you want to view with an external viewer.
2. Select the viewer from the Open With list.
The file viewer opens and presents the content for viewing.
Note: The Open With menu option is not visible if no external file viewers
associations have been created in EnCase Endpoint Investigator.
Sweep Enterprise provides a way to look quickly across the enterprise and examine
forensic artifacts which you can parse and view to identify machines you want to
investigate further.
• Sweep Enterprise
• Create Scan
• Status
• Analysis Browser
You can use the EnCase Evidence Processor to analyze data collected by Sweep
Enterprise. For details, see “Desktop client errors processing evidence” on page 850.
1. Start EnCase. Make sure you are connected to a SAFE and are associated with a
role.
2. Open a case.
In the new scan area, click Create Scan to create a new scan.
The Previous Scans area displays most recent scans (up to five), as well as an All
Scans report link. Clicking one of the previous scans takes you to the Analysis
Browser tab with the results of that scan.
• Click System Info Parser in the Modules Item column to display a dialog
box to select or clear artifact collection options.
• Click Snapshot in the Modules Item column to display a dialog box to select
or clear additional snapshot options.
• Click File Processor in the Modules Item column to display a dialog box to
select one of three filter types and whether or not file contents will also be
collected. An entry condition must be defined before the job is submitted.
– The File Processor configuration dialog allows you to create and search
for files using filter conditions. The three filter types are: Metadata,
Keyword, and Hash.
– Select the Collect File Contents check box if you want to collect the files
identified during the sweep.
– After you click Next , you define the entry condition for the filter type
you selected. If Keyword or Hash was selected, you must also add the
keyword list or hash set.
• The System Info Parser module is not enabled for Linux systems.
• Selecting Check In directs Sweep to wait infinitely for all the targets to check
in before it runs the selected modules on the target. If you leave this check
box blank, the SAFE initiates communication. If an agent does not respond
after a certain amount of time, the SAFE ends the communication and
EnCase informs you that the agent cannot be reached.
• Selecting Deploy Agent directs the SAFE to initiate communication with the
target and automatically install an agent if one is not already installed. This
option is only available if the user's role is configured with the Deploy Agent
permission. The Deploy Agent and the Check In options cannot be used
simultaneously.
6. When you finish selecting modules and their associated options, click Next. A
Confirmation Page is displayed, showing the target node list and module
selections.
Importing Targets
3. Enter, or copy and paste, a list of machine names or IP addresses then click OK.
Note: Temporary targets are only available for the current sweep.
A green bar indicates the progress of the scan for a given node and module (for
example, Mounting Drives, Waiting, Scanning, Snapshot Taken).
The Collection Status column also indicates if connection to a specific node failed.
In some instances when running Snapshot, either via the Evidence Processor or the
Sweep Enterprise EnScript, the target may become unresponsive and cause a reboot.
A workaround is to modify the following registry entry:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Setup]
– Users - Comprehensive
– Users - Registry
– Users - Snapshot
• File Processor folder:
• Hardware folder:
– Hardware Devices
– Hardware Miscellaneous
• Network folder:
– ARP
– DNS
– Hidden Ports
– IP Gateway Pairs
– IP MAC Pairs
– Network Interfaces - Registry
– Network Interfaces - Snapshot
– Open Ports By DLL
– Open Ports No Process
– Open Ports
– Routes
• Operating System folder:
– DLLs subfolder:
○ DLLs
○ DLLs by Process Details
○ Injected DLLs
○ OS Services
– Processes subfolder:
○ Processes - All
○ Processes - Apps
○ Processes - Drivers
○ Processes - Hidden
○ Processes - Services
○ System Info
○ Time Zone
• Removable Media folder:
– Drives Overview
– USB Devices
– USB Drives Overview
• Shared and Mapped Devices folder:
– Drives Overview
– Mapped Shares
– UNC Folders Visited
• Snapshot
– Software folder:
○ Installed Apps
○ Installed MS Apps
○ Uninstalled Apps
– Target Info folder:
○ Open Files
○ Processes Launched by User
1. From the Sweep Enterprise module Analysis Browser tab, click Target
Constraint.
2. The Scans/Targets dialog is displayed. It contains a list of scans and targets you
can choose from to limit the displayed results in the Analysis Browser tab.
3. Select one scan and one or more targets to limit the displayed results.
Alternately, you can enter targets manually in the Manual Entry area.
4. Click OK.
The displayed results in the Analysis Browser tab change to reflect your selected
constraint.
First page
Select First to go to the first page from anywhere in the report. When you select this
button, the Page 1 check box is checked.
Select Last to go to the last page from anywhere in the report. When you select this
button, the check box for the last page is checked.
Select the forward button to go to the next page from anywhere in the report. Select
the back button to go to the previous page.
Select a numbered check box to go to that page in the report. The first 11 check boxes
display by default. If the report contains more than 11 pages, click the Last button to
see more check boxes.
Go to Page
1. Click Go to Page. The Pages from 1 to XX (the last page of the report) dialog is
displayed.
2. Use the up or down buttons to specify a page number or enter a page number
manually, then click OK.
3. The report displays the page number you specified, and that page number's
check box is checked.
Show All
Clear the Show All check box to revert to the previous page size.
Double-click the column header again to sort in descending order. the red triangle
points downward to indicate the column is sorted in descending order.
To initiate a subsort, hold down the Shift key and double click the column heading.
You can sort columns up to six layers deep. Additional red triangles are added to the
initial triangle to indicate a subsort is in effect.
Note: After running Sweep Enterprise on a Linux system that requires LVM
scanning, none of the files in the logical volumes will be in the search hits.
You can run Case Analyzer after the Evidence Processor modules run, or after data
is collected by EnCase Portable or Sweep Enterprise. Analysis reports are pulled
from a SQLite database, which contains metadata only. Analysis does not involve
file content.
3. The Case Analyzer page is displayed. Select the metadata to analyze in the View
Reports area from the following options.
• Case: Runs Case Analyzer on evidence files previously run on the Evidence
Processor.
• Sweep Enterprise (Case Data): Creates analysis reports for data from all
collections performed by Sweep Enterprise.
The navigation in the left pane is built dynamically and shows only reports which
return data from the metadata database. Depending on the modules you chose to
run and what they found, you get varying numbers of reports. Think of the
navigation as a narrative of what was found on the computer.
To filter reports, click the Constraint button. This opens the View - Constraint
dialog. This is similar to a condition, but in this instance, you are filtering data in a
database.
Click the Unavailable Reports button on the toolbar to show reports that do not
return data.
Many reports offer higher level conclusions and automate the manual steps of
correlating multiple artifacts to determine what happened on a system. For example,
the Files Seen on USB Device report joins together linked files to the USB history and
mapped drives in the Windows registry.
Each report includes enough information for examiners to find the original evidence
and investigate the data further. Most reports include an item path column to the file
which was originally parsed.
Click the About button on any report to see more information about how the report
is generated.
1. In the View Reports area of the Case Analyzer page, click Portable Device.
3. The Data Browser dialog is displayed. It functions in the same way as the
Analysis Browser tab. See “Analysis Browser tab” on page 372.
Snapshot reports
Clicking an entry in the Parent Process ID column, which contains process IDs for
each parent process instance, displays all running instances of the process. This
filters the report to display matching process IDs only, which allows you to trace
that process to its source. For example, instead of displaying only the type of
process, such as explorer.exe, clicking an entry in the Parent Process ID column
displays information on all instances of explorer.exe. Similarly, clicking a number in
the Children Processes column displays detailed information for all the children
processes associated with the process instance.
Snapshot Reports also display both port information and its relationships to process
instances and dlls, so you can determine which dlls are active as well as which
process instance loaded each dll.
Some Snapshot Reports combine information from other reports to make the
workflow more efficient.
• Under Operating System > DLLs, the DLLs by Process Details Report combines
all the information in the DLLs Report and the Processes Report.
• Under Network, the Open Ports by DLL Report combines all the information in
the DLLs Report, the Processes Report, and the Open Ports Report.
• Under Operating System > Processes, the Processesreport combines all the
information in the DLLs Report and the Open Ports Report.
Each Snapshot Report also has an About option which shows details for each report.
• DLLs by Process Details: Instance Name, Parent Process ID, Open Ports, and
Children Processes.
• Open Ports by DLL: Instance Name, Parent Process ID, and Children Processes.
• Processes: Instance Name, Parent Process ID, Open Ports, Children Processes,
and DLL Count.
EnCase returns empty artifacts when the Sweep Enterprise Snapshot module takes
more than ten minutes to run on a machine. This causes EnCase to time out, and
fails to return any Snapshot data for that machine. When this happens you can
reboot the machine that returns these empty artifacts and rerun Sweep Enterprise
with the Snapshot module on.
Note: The Sweep UI does not tell you which targets return no data. To get that
information, you must query the Sweep.sqlite database using a this query
format: (Select B.Target From Snapshot as A, _TargetRuns as B Where A.
_TargetRuns_Key = B.ID and A.Name = ‘’)
The Sweep database is stored in the Case folder, under EnScript/Sweep Enterprise.
2. The Data Browser dialog is displayed. It functions in the same way as the
Analysis Browser tab. See “Analysis Browser tab” on page 372.
1. On the EnCase Endpoint Investigator application toolbar, click SAFE > Logon
and log on to a SAFE.
For more details, see the SAFE User Guide.
1. Enter the SAFE server name and port into a web browser.
The server name and port are set up during SAFE installation and follow the
format: https://<ServerName>:<Port>/.
2. You will be prompted to authenticate your user account if you have not already
done so. Your user account with the SAFE must have permission to access
EnCase Agent Management.
The Endpoints page is displayed in a web browser.
The user must be assigned the Access EnCase Agent Management role to access
EnCase agent management.
Any column with the icon can be ordered by ascending or descending order. To
order a column, click or anywhere in the column header but the or . The
icon appears in the column to indicate ascending order has been applied. Click the
column again to arrange in descending order, or click another column to apply the
sort order to that column.
Filter endpoints by Fully Qualified Domain Name (FQDN) by entering the FQDN in
the Find by FQDN box and clicking the Search icon. The asterisk (*) may optionally
be used as a wildcard in your search by adding it as the last character in the Find by
FQDN field. The endpoint matching the filter criteria is displayed.
To remove the filter and display all endpoints, click the Back to full List link.
Columns with next to the filter icon can be hidden. Click to hide the selected
column.
To make a hidden column visible, click on in the table header to display the
Column Visibility drop-down list. Click next to the column name to add it to the
table.
Other options:
Click the Refresh icon to refresh the endpoint data on the page.
Endpoint Navigation
• Scroll bar – Use the scroll bar to the right of the table to scroll through the table.
• Endpoints per page list – Select the number of endpoints per page from the
drop-down list: 100, 500, 1000, or all.
• Page of total pages – Lists current page number of the total number of pages.
Enter a page in the page box to jump to that page.
• First – Go to the first page.
• Previous – Go to the previous page.
• Next – Go to the next page.
• Last – Go to the last page.
Fields include Job Guid, Plugin, Request User, Job Created date,
SAFE, Extra Timeout(Hour)
Click the plus in any Queue Id column to expand the queue and view the client
download information box for that queue, including: Last Downloaded, Last
Downloaded By, Download Count, and Deleted timestamp. Click the minus in
the Queue Id column to collapse the Client Download Information box.
Any column with the icon can be ordered by ascending or descending order. To
order a column, click or anywhere but the or . The icon appears in the
column to indicate ascending order has been applied. Click the column again to
arrange in descending order, or click another column to apply the sort order to that
column.
Columns with next to the filter icon can be hidden. Click to hide the selected
column.
To make a hidden column visible, click on in the table header to display the
Column Visibility drop-down list. Click next to the column name to add it to the
table.
Click the Refresh button to refresh the jobs data on the page.
• Index searches
• Keyword searches through raw data
• Tag searches
You can use these search methods by opening the Indexed Items, Keyword Hits,
and Tagged Items tabs from either the Case home page or from the View menu.
Index searches
Index searching allows you to rapidly search for terms in a generated index, and is
the recommended search method in EnCase Endpoint Investigator. Querying an
index for your case or evidence file locates terms much more quickly than using
non-indexed queries. Unlike raw keyword searches, indexing is linked with file
transcript content so that text content contained with files can be quickly and
efficiently identified. You can also conduct metadata and field searches to locate
content with greater precision.
Indexes are generated using the Evidence Processor. An index can encompass all
evidence in your case.
• See “Creating an index” on page 265 for information about creating and running
index searches.
• See “Searching indexed data” on page 388 for a full list of search syntax options.
Note: Index search is a two-step process. First, you index data using the
Evidence Processor. In the second step, you retrieve indexed data by executing
a search in the Indexed Items tab.
Tag searches
EnCase also provides the capability to search for items that have been flagged with
user-defined tags. Using tags, you can search through collected evidence for all
items that include one or many tags. See “Finding tagged items” on page 397 for
information about creating and running tag searches.
Note: Tagged searches are a two step process. First, you tag the data to be
searched. In the second step, you retrieve tagged data by executing a search in
the Tagged Items tab.
You can query the results of a previously executed keyword search. You create
keyword searches either with the Evidence Processor or by performing a raw search
on your case data. Keyword searching searches the raw binary form of a file. It does
not search the metadata of the file.
• See “Retrieving keyword search results” on page 401 to view the results of a
previously executed keyword search.
• See “Adding a new keyword” on page 263 to learn how to add a new keyword
from the Evidence Processor or when performing a raw search.
• See “Creating a new keyword list” on page 264 to learn how to add a new
keyword list.
Note: Keyword searches are a two step process. First, you perform a keyword
search on raw data. In the second step, you retrieve keyword data by executing
a search in the Keyword Hits tab.
Any set of search results can be saved and viewed later. See “Viewing saved search
results” on page 402 for details.
Search through indexed data in the Indexed Items tab. The Indexed Items tab
contains four standard panes.
The top left pane is the query pane and contains four parts:
1. Query Actions Bar: Provides options to run a query entered in the Query
Construction Box, change the default language index, select a field to search,
add a Boolean operator, access online help, or access other options.
2. Query Construction Box: Type or paste a query directly into the box below the
Query Actions Bar. This box is used to create more complex queries.
3. Quick Query Box: For a quick index search, enter a single word directly into the
box below the Query Construction Box.
4. The Quick Query Results Table is found below the Quick Query Box and
displays search results of quick query words, number of hits, and number of
items that contain the query word. Related words are also displayed with hit
and item count.
Note: Because the Hits column includes file content and metadata, and the
Items column does not include metadata, the Hits count frequently will
not match the Items count.
The rest of the window contains other panes related to indexed item search:
5. Table Pane: When a query is executed, all items that contain the queried items
appear in the table on the top right pane.
6. View Pane: Details of the item selected in the table pane can be viewed in the
lower left pane.
7. Condition/Filter Pane: Apply conditions and filters to items in the lower right
pane.
1. Open the Indexed Items tab from either the Case home page or from the View
menu.
2. Type your search query in the Query Construction Box, paste a query, or select
available query options from the Query Actions Bar.
Note: You can search for emoji characters, by using their corresponding
Unicode values in the search query (for example, to search for the
“grinning face” emoji, use the Unicode U+1F600.
The query actions bar provides tools for constructing a search query. Expand
the left pane to view all buttons and list options. Right-click in the query
window to view these commands in the context menu.
Default/Multiple Select the language index to search. The menu lists all
languages selected during evidence processing. Default
is optimized for English and can be used with most
Western languages. To search the index of another
language, select its check box from the drop-down
menu.
3. To run the search query in the Query Construction Box, position your cursor in
the text box and click Enter, or click Run.
The Quick Query Box and Quick Query Results box automatically display the
most recent search term entered in the Query Construction Box. You can enter a
term in the Query Construction Box or Quick Query Box to instantly show all
variations of the occurrence of that term. Click a hyperlinked term in the Word
column to show all occurrences of that term in the right table pane.
OR
The OR operator is the default conjunction operator and is used when no other
operator is specified. The OR operator links two terms and finds matching
documents if either term is found in the document. The term || may also be used
interchangeably with the OR operator.
AND
The AND operator matches documents where both terms are present anywhere in the
text of a single document. The term && may also be used interchangeably with the
AND operator.
A search for "George Washington" AND "Washington George" return documents that
contain the terms, “George Washington” and “Washington George”.
Use the + operator to make the term following it required. The term after the
+ operator must exist in a document for it to be returned in a search.
A search for +Washington George returns documents that must contain the term
“Washington” and may contain “George”.
NOT
The NOT operator excludes documents that contain the term after the NOT operator.
The term ! may also be used interchangeably with the NOT operator.
Note: The NOT operator must include at least one non-excluded search term.
Submitting a search with only a NOT operator returns no results. For example,
the search NOT "George Washington" returns no results.
The - operator excludes documents containing the term after the - symbol.
Search terms are highlighted in the search results. Phrase searches highlight the
individual terms of the phrase as well as the whole phrase.
"George Washington Carver" searches for the exact phrase, “George Washington
Carver”
the index marks as responsive all items containing the word “Bill” within five words
of either “Clinton” or “Gates”.
the index marks as responsive all items containing both the words “Bill” and
“William” within five words of both “Clinton” and “Gates”.
12.1.1.5 Grouping
Use parentheses to group clauses and control the Boolean logic of a query. How you
use parentheses determines the search order. Subqueries are performed first. For
instance:
finds all items with either both the terms “George” and “Washington” or both the
terms “Abraham” and “Lincoln”.
finds all items containing the term “George” and either the terms “Washington” or
“Bush”.
Alternatively:
finds all items containing both the terms “George” and “Washington”, or the term
“Carver”.
You can join proximity queries (~x) to Boolean logic queries (AND, OR). For example:
finds all items containing the term “Delaware” that also contain the terms “George”
up to three words from “Washington”.
Field grouping
You can use parentheses to group multiple single terms or phrases. For example:
returns documents where the from field contains both the search term “Carver” and
the phrase “George Washington”.
logical_size:[500000 to 1000000]
subject:{allen TO zebra}
last_accessed:[20170101 TO 20170102]
Search for a time range by appending the time in six-digit format to the bounding
dates:
file_created:[20170101080000 TO 20170101130000]
The above term searches for any item with a creation date between January 01, 2017
08:00 and January 01, 2017 13:00, including the bounding times and dates.
The ? operator stands as a placeholder for any single character. For instance, a
search for:
c?t
results in hits in documents containing cat, cot, and cut, but not caught.
The * operator stands as a placeholder for any number of characters. For instance:
ind*
The [*] operator can also be used within a word. For instance:
in*ive
Multiple wildcards
A term can contain multiple wildcards (either * or ?), but cannot contain wildcards
as the first character of the term. For instance:
ind*a*a
c?t?
p*fi?y
*india*
?cat?
*fis?
Format
/regular expression/
Example
/[jb]ump/ finds all documents containing the words “jump” and “bump”.
12.1.1.10 Proximity
The tilde ~ acts as a proximity operator when it follows a phrase containing two
terms. Perform a proximity search on two terms by enclosing the terms in quotes,
appending the tilde ~ and adding a numeric value. The numeric value represents the
maximum number of words that can exist between the two search terms for a
positive hit to be returned. While proximity search can return results where the
second search term appears before the first search term, the proximity value must be
increased by two in order to account for counting through the first word and
locating the beginning of the second word.
Format
"searchterm1 searchterm2"~<value>
Example
"George Washington"~3 finds all documents where the word “Washington” appears
three words or less after the word “George” or where the word “Washington”
appears immediately before the word, “George”.
"white house"~10 finds all documents where the word “house” appears ten words
or less after the word “white” or where the word “house” appears eight words or
less before the word, “white”.
Format
searchterm~
searchterm~<value>
Example
subject:George
subject:"George Washington"~2
To search in a specific Item Type, choose Item Type from the Field drop-down, and
select category you want to search. Search options include: None, Entry, File, Email,
Document, and Record. When you make a selection, the item type and
corresponding number for the category are entered in the query box. Enter the
AND operator, followed by your query, and click the Run button to conduct the
Item Type search.
+ - && || ! ( ) { } [ ] ^ " ~ * ? : \
For example, to search for (3-2=1):1, use the escape character before each special
character: \(3\-2=\)\:1
1. Open the Tagged Items tab from either the Case home page or from the View
menu. The Tagged Items tab is displayed.
2. Click on a tag from the left tag list to display all items with that tag in the table
pane.
3. Select multiple tags and click View Selected to see items containing any of the
selected tags.
In order to maximize performance, you can search and hash these types of files
remotely:
You cannot search and hash encrypted files (other than EFS) remotely.
Note: You can also create a new raw keyword search for specifically
selected items by going to the Entry > Raw Search Selected menu.
3. Select an existing search or click New Raw Search All to create a new search.
The New Raw Search All Entries dialog is displayed.
• Use the path box at the top of the dialog to specify the name and location for
the search.
• Select Search entry slack to include file slack in the keyword search.
• Select Skip contents for known files to search only the slack areas of known
files identified by a hash library.
• Select Undelete entries before searching to undelete deleted files before
they are searched for keywords.
• Use initialized size lets you search a file as the operating system displays it,
rather than searching its full logical size.
– In NTFS and exFAT file systems, applications are allowed to reserve disk
space for future operations. The application sets the logical size of the file
To see search results while the search is in progress, click the Refresh icon on the
Keyword Hits tab.
If new search hits are available, the icon is displayed in green. If no new search hits
are available, the icon is disabled.
The icon is dynamic: after clicking, it is disabled until more search hits are available.
When more search hits are available, the icon is enabled and is displayed again in
green.
1. Open the Keyword Hits tab from either the Case home page or from the View
menu.
2. A list of keywords is displayed. These are the keywords that have been
previously executed.
• Click an Items column hyperlink to see all responsive items for that keyword
in the Table pane.
• Click a Hits column hyperlink to see all responsive hits for that keyword in
the Table pane.
4. Select multiple keywords and click the View Selected button to see a
combination of all search results.
5. Choose View Items or View Hits from the View Selected dropdown to view
keyword results by items or hits.
• Use the Review tab to see a compressed list of metadata, keyword item, and
index search hits.
– This tab combines information found on the Fields, Transcript, and Text tabs,
showing fields and individual lines containing search hits.
– Click the linked Search Hits line number to view the search hit on that line in
context.
– Use the Next/Previous Item buttons to click through each item in the list.
• Content hits are also highlighted in the Transcript, Text, and Hex tabs while
metadata hits are highlighted in the Fields tab.
– Click Compressed View on the Transcript, Text, and Hex tabs to see only the
lines containing highlighted search hits.
– Use the Next/Previous Hit buttons to click through each hit in the file. If there
are no more hits in the file, the next item opens and the first hit is found.
For more information about viewing options, see “Viewing content in the View
pane” on page 309.
Note: Index hits with large numbers of characters that wrap over line breaks
do not display in the Review tab.
2. Enter the name for your search in the Save Results dialog that is displayed and
click OK.
3. From the View menu, select Results. The Results tab is displayed.
4. Select a saved search in the left pane. The results of that search display in the
right Table pane. Click individual items to see more information in the lower
viewing tabs.
Note: If you save search results when viewing by hits in the Keyword
Hits tab, only unique items are saved. For example, if you select ten hits
that occur in one item and three that occur in another, only the two unique
items will be saved in the result set. You can create keyword hit
bookmarks if you wish to save individual keyword hits. See
“Bookmarking keyword search results” on page 402
When you export search results containing only entries or containing only artifacts,
EnCase generates a single LEF.
When you export search results containing both entries and artifacts, EnCase
generates two LEFs, one containing only artifacts and another containing only
entries.
1. On the Evidence, Indexed Items, Keyword Hits, or Tagged Items tab, select the
items you want to export.
• Source indicates the source of the items selected to be included in the LEF.
• Files indicates the number of files selected to be included in the LEF, and
their total size.
• Use the Target folder within Evidence File to create folders within the LEF,
representing captured data from different folders/sources. Leave this text
box blank if data is imaged from one source and there is no need to include a
folder name.
• Select Include contents of files to include the file content into the LEF. Clear
this check box to include only the metadata into the LEF.
• Select Include contents of folder objects to include the binary content of
folders into the LEF, so that this content may be examined within the LEF.
File content may still be included into the LEF when this check box is
cleared.
• Select File in use to indicate the use of the computer system being targeted
while EnCase is capturing data through a deployed agent.
• Select Lock file when completed to secure the LEF when the image is
completed, so that no additional objects or data can be saved to or removed
from the LEF.
• Select Include original extents to enable the physical sector and byte offsets
of imaged objects to be saved within the LEF.
5. In the Format tab:
• Select the LEF file format from the Evidence File Format list:
– Current (Lx01): This is the default logical evidence file format. The Lx01
files support LZ compression, MD5 hashing, and encryption. To select an
encryption key, click Encryption and select an encryption key and
password on the Encryption Details dialog.
– Legacy (L01): This is the legacy logical evidence file format used in
EnCase version 7 and earlier. The L01 files support LZ compression and
MD5 hashing. Encryption is not available for this file format. You can
create and saveL01 files in order to be compatible with legacy versions of
EnCase (version 7 and earlier).
Note: As with L01/Lx01, with AFF4-L there is no discrete (or global) hash
that EnCase can show on the Evidence tab in the Acquisition/Verification
Hash fields.
6. Click OK.
EnCase exports the items you checked into a LEF.
File extensions are characters following the dot in a file name (for example,
signature.doc). They often indicate the file's data type. For example, a .txt extension
denotes a text file, while .doc indicates a document file.
The file headers of each unique file type contain identifying information called a
signature. For example, .BMP graphic files have BM as a signature.
A technique often used to hide data is to attempt to disguise the true nature of the
file by renaming it and changing its extension. Because a .jpg image file assigned
a .dll extension is not usually recognized as a picture, comparing a file’s signature
with its extension identifies files that were deliberately changed. For example, a file
with a .dll extension and a .jpg signature should pique the interest of an investigator.
The software performs the signature analysis function in the background on all
processed evidence.
• Match indicates data in the file header, extension, and File Signature table all
match.
• Alias means the header is in the File Signature table but the file extension is
incorrect (for example, a JPG file with a .ttf extension). This indicates a file with a
Occasionally a file signature may not be in the table. Use this procedure to add a
new one. Before you do this, you need to know the file signature search expression.
This is not necessarily the same as the three letter file extension.
1. From the View menu, select File Types. The File Type table is displayed.
2. Click New. The New File Type dialog is displayed and opens on the Options
tab.
4. Click OK. The new file type and associated file signature are added to the table.
1. From the View menu, select File Types. The File Type table is displayed.
Note: If you modify a built-in file type, it is marked as User Defined. EnCase
does not overwrite User Defined file types, even when you install a new
version of EnCase.
1. On the Evidence tab, drill into the device where you want to run file signature
analysis.
2. Blue check the specific files you want to run signature analysis on.
3. Click Entries. In the dropdown menu, click Hash\Sig Selected. The Hash\Sig
Selected dialog is displayed.
• Hash analysis compares the hash values of selected files against hashes in
your library.
• Verify file signatures performs file signature analysis on the selected files.
4. Select Verify file signatures to run signature analysis. You can also select other
processes to run concurrently.
5. Click OK.
Note: After running file signature analysis, you must refresh the device. Click
the Refresh button in the Entries toolbar.
You can copy both files and folders. Copying folders preserves their internal
structure.
EnCase allows you to automatically navigate to the directory where your files are
saved. Select the Open Destination Folder check box on the Destination dialog to
launch Windows File Explorer with the export location.
1. In the Evidence or Artifacts tab, click the Entries dropdown menu and select
Copy Files.
2. In the Results, Indexed Items, Keyword Hits, or Tagged Items tab, click the
Results dropdown menu and select Copy Files. The Copy Files dialog is
displayed.
• Copy Files contains settings that determine the content of the evidence file
to be copied.
– Logical File Only performs the copy function on the logical file only, not
including the file slack.
– Entire Physical File performs the copy function on the entire physical
file, including the logical file and file slack.
– RAM and Disk Slack performs the copy function on both the RAM and
disk slack.
– RAM Slack Only performs the copy function on the RAM slack only.
• The Character Mask settings determine what characters are written into the
file or files created by the copy function.
– Select None if you do not want any characters masked or omitted from
the filenames of the resulting files.
– Select Do not Write Non-ASCII Characters to mask or omit non-ASCII
characters from the filenames of the resulting files. All characters except
non-ASCII characters are retained.
– Select Replace NON-ASCII Characters with DOT to replace non-ASCII
characters with periods in the filenames of the resulting files.
• Checking Show Errors causes the application to notify you when errors
occur. This prevents the unattended execution of the Copy Files operation.
• Copy displays the number of files to be copied, and the total number of
bytes of the file or files created.
• Path shows the path and filename of the file or files to be created. The
default is My Documents\EnCase\[case name]\Export.
• Split files above contains the maximum length, not exceeding 2000MB, of
any file created by the Copy Files function. When the total number of bytes
in an output file exceeds this value, the additional output continues in a new
file.
• Use Initialized Size determines whether to use the initialized size of an
entry, rather than the default logical size or the physical size. This setting is
only enabled for NTFS and exFAT file systems. When an NTFS or exFAT file
is written, the initialized size can be smaller than the logical size, in which
case the space after the initialized size is zeroed out.
5. Click Finish.
The Copy Files operation executes. The resulting files are saved in the directory
specified in the Destination dialog.
• In the Evidence or Artifacts tab, click the Entries dropdown menu and select
Copy Folders.
• In the Results, Indexed Items, Keyword Hits, or Tagged Items tab, click the
Results dropdown menu and select Copy Folders.
• Copy only selected files inside each folder copies individual files selected
within a folder or folders.
• Checking Show Errors causes the application to notify you when errors
occur. This prevents the unattended execution of the copy operation.
• Open Destination Folder opens the selected folder when the copy action
completes.
4. Click OK.
The process for creating, reviewing, and returning a review package follows this
workflow:
• The EnCase examiner searches and compiles a results list that is exported into a
review package.
• The EnCase examiner sends the review package and the EnCase Evidence
Viewer executable to the reviewer.
• The reviewer opens the EnCase Evidence Viewer, installs it, and opens the
review package.
• The reviewer views the evidence and sorts, filters, tags, and provides comments
as part of their review. Existing tags can be used or the reviewer can create new
tags.
• The reviewer exports the tagged review package (an .EnReview file) and sends
the compact file back to the EnCase examiner. The export package contains only
the annotations and changes, so it can be emailed back as a small file without
revealing any case information.
• The EnCase examiner imports the analyzed review package and views the
feedback in EnCase Endpoint Investigator.
1. From any item view, select Review Package > Export. The Export dialog is
displayed.
• By default, all tags listed in the Tags table are automatically exported for use
by the reviewer. Clear the check boxes on the left for any tags you do not
want to export.
• The Export Tag check box determines whether to export the tagging
information already entered on any of the items. When cleared, any tagging
choices you made are omitted from the review package. When checked,
your tagging selections remain intact.
3. Enter the name and path or browse to a location for the output file.
4. Click OK. A status bar displays the export process. When the export process
completes, an .Lx01 file is created and the dialog box closes.
Send this logical evidence file to the reviewer. The EnCase Evidence Viewer file,
EnCaseEvidenceViewerSetup.exe, is installed by default at C:\Program Files\
EnCase[version year]\Lib\EnCaseEvidenceViewer. If the reviewer does not have
the EnCase Evidence Viewer executable installed on their machine, you will need to
include it with the review package.
1. Double-click the EnCase Evidence Viewer. The application opens and the Home
screen is displayed.
2. Click Open from the ribbon to select an .Lx01 review file. The evidence file
opens and its contents are displayed.
The EnCase Evidence Review application displays multiple panes. The upper
panes display the evidence in a tree and table view familiar to EnCase users.
The lower panes display detailed information about the item selected in the
upper panes and works like the View pane in EnCase.
3. Scroll through the items on top panes to locate and select items and use the
lower panes to review the selected items.
4. Click in the row of an item in the Tags column to toggle the tag on or off. The
Tags column is divided into equal sized tag fields for each row that stretch
across the length of the column.
• Drag the right side of the Tags column to expand the column and view more
of the tag names.
• Any evidence tagged at the time the review package was created will be
visible to the reviewer. The reviewer can modify any tags in the review
package.
5. To create a new tag, click Manage in the Tags section of the ribbon. The Manage
Tags dialog is displayed.
• Click Add. A new line tag is added and the Name field is highlighted.
• Select Hidden check box to toggle between hiding or showing the tag in the
Tags column.
6. To modify an existing tag, click Manage in the Tags section of the ribbon. The
Manage Tags dialog is displayed.
The Name field of tags included with the review package provided by the
examiner cannot be modified; however, Description, Foreground text color,
Background color, and Hidden status can be modified. Tags added by the
reviewer can be modified.
7. To delete one or more tags, click Manage in the Tags section of the ribbon. The
Manage tags dialog is displayed.
Tags included with the review package provided by the examiner cannot be
deleted. Tags added by the reviewer can be deleted.
• Select Delete.
1. Select the files you want to copy out of the review file. Files can be selected from
the Table/Entries pane or the Table pane.
2. Select the Copy button. The Copy Files dialog is displayed.
3. Select copy options and select a folder in which to copy the files.
• Select the Copy highlighted items check box to copy only items highlighted
in the table pane.
• Select the Copy selected items check box to copy those items selected with a
blue check.
• The Include files in sub-directories check box will be active and selected if a
selected or highlighted item contains a directory. When selected, the copy is
recursive: all files within a sub-directory are included, and any sub-
directories below that are also copied.
• Enter a path to the folder or use the browse button to browse to and select a
folder.
The files are copied out of the review package into the selected folder.
2. Click OK. The review package is exported and saved as an .EnReview file in the
desired location.
3. Send the .EnReview file to the EnCase examiner to import back into EnCase.
2. Enter the path where the .EnReview file is stored and click Next. A list of tags
added to the review package is displayed.
• Only tags with changes since the last saved change display in the list.
• Clear check boxes for any tags you do not want to import.
• Item tags present when the review package was exported, then subsequently
removed by the reviewer, are removed in the examiner's case when you
import the returned review package.
• If multiple reviewers are analyzing the same review package, the same rules
apply to each .EnReview file.
– The order in which you import multiple review packages does not make
a difference.
3. When you are done, click Finish. The tag changes in the review package are
incorporated into EnCase.
Analyzing a large set of files by identifying and matching the unique hash value of
each file is an important part of the computer forensics process. Using the hash
library feature of EnCase, you can import or custom build a library of hash sets,
allowing you to identify file matches in the examined evidence.
A hash function is a way of creating a digital fingerprint from data. The function
substitutes or transposes data to create a hash value. Hash analysis compares case
file hash values with known, stored hash values.
Computer forensics analysts often create different hash sets of known illicit images,
hacker tools, or non-compliant software to quickly isolate known “bad” files in
evidence. Hash sets can also be created to identify files whose contents are known to
be of no interest, such as operating system files and commonly used applications.
Hash sets are distributed and shared among users and agencies in multiple formats.
These formats include NSRL, EnCase hash sets, Bit9, and others.
2. In the Manage Hash Library dialog, click the New button in the upper right
corner.
3. Browse for a folder to hold the hash library. If you use an existing folder, it must
be empty; otherwise, the contents of the folder will be deleted.
4. Click OK.
5. The path and name of your hash library now display in the hash library path
field.
To import hash sets from another library into an existing hash library:
1. Click Tools > Manage Hash Library. The Manage Hash Library dialog is
displayed.
4. Click Finish.
You can then browse to a library or enter Hashkeeper identification data to import
individual hash sets. To create new hash sets for this library, see “Creating a hash
set” on page 419.
Once created, you can add to hash sets on a case by case basis. Adding new files as
time goes by saves time and effort in subsequent investigations.
Hash sets (which contain individual hash entries) are located within hash libraries.
Creating a hash set is a two step process. The first step is to create an empty hash set
in a library. The second step is to add information to it.
2. Make sure that you either browse and point to an existing hash library or create
a new one. This is the hash library where you will add the hash set.
3. In the Manage Hash Library dialog, click New Hash Set. The Create Hash Set
dialog is displayed
4. Enter a Hash Set Name, and enter information for Hash Set Category and Hash
Set Tags.
• You can use the hash set category to identify the type of hash set. Although
the most common values are Known and Notable, you can specify any
single value. You can use the category to find or eliminate files.
• Hash set tags allow you to specify multiple identifiers for a hash set. As with
hash set categories, you can use hash set tags to find or eliminate files.
5. When you are prompted to add the new hash set, click OK, then click OK again.
The new hash set is added to the list of ash Sets in the Manage Hash Library
dialog.
1. Add the device or evidence from which you want to generate hash values to a
case.
2. Hash the files on the device by using the hashing feature of the Evidence
Processor or Hash Individual Files from the Entry > Entries menu item.
3. Using the Tree and Table panes, check those entries whose hash values you
want to add to the hash set.
4. On the Evidence tab, under Entries view, click the Entries dropdown menu and
select Add to Hash Library. The Add to Hash Libraries dialog is displayed.
5. Using the Hash Library Type dropdown menu, choose the hash library to add
the hash items to.
6. Select the Primary or Secondary hash library (see below for information on
setting the Primary and Secondary libraries), or Other, if you need to place the
item in a different library.
7. After you have selected a library, select one or more previously created hash
sets (by checking their boxes) from the Existing Hash Sets dialog. If you need to
create a new hash set, right-click in the Existing Hash Sets table and select New
Hash Set. The New Hash Set dialog is displayed.
8. In the Fields list, select the metadata fields you want to add to the hash library
for the selected items. Some fields are added by default; however, you can add
other optional fields. All fields added to the hash set are reported when a hash
comparison matches a particular hash set.
9. Click the Skip items with no MD5 or SHA1 check box to skip all blank items
and allow the import to proceed without manually locating and deselecting files
with no hash values.
Note: Adding additional fields does not increase the comparison time, but
does increase the size of the library.
4. From the Hash Library Type dropdown list, choose the hash library (Primary,
Secondary, or Other) where you want to add results.
5. Select one or more previously created hash sets from the Existing Hash Sets list.
6. The Name, Logical Size, MD5, and SHA1 fields are included by default. Select
any additional metadata fields you want to add to the hash library for the
selected items from the Fields list. All fields added to the hash set will be
reported when a hash comparison matches a particular hash set.
7. Click the Skip items with no MD5 or SHA1 check box to skip items with no
MD5 or SHA1 available and allow the import to proceed without manually
locating and deselecting files with no hash values.
Note: Adding additional fields does not increase the comparison time, but it
does increase the size of the library.
1. On the application toolbar, click Tools > Manage Hash Library > Open Hash
Library.
2. Use the existing hash library, or click the browse button and select a different
hash library and click OK.
3. The Manage Hash Library dialog lists the hash sets in the hash library.
4. Click Query All. The Hash Library Query dialog is displayed.
5. Paste the value into the Hash Value field and click Query. Any matches display
in the Matching hash items table.
6. To obtain more detailed information about the matched hash item, click either
Show Metadata or Show Hash Sets.
5. The Existing hash sets table displays a list of the hash sets in the selected library.
To enable sets, check the Enable check box.
6. To manage the secondary hash library, select the Secondary column and follow
the same steps.
7. After you define a primary or secondary hash library, you can manage that
library: select it in the table and click Manage Hash Library in the toolbar.
Note: EnCase can automatically add a hash library to a case after the hash
library is associated with a case. EnCase prompts you with an option to
associate the hash library you select with the case that is currently open.
Hash set names and associations with individual entries are collected in the device
cache after you set up primary and secondary hash libraries for a case and process
evidence. The top three hash set names are pulled from this cache and display in a
column in the Table pane.
1. Set up primary and secondary hash libraries. See “Creating a hash library”
on page 418.
2. Select the evidence files for which you want to view associated hash sets.
Cache information is preserved until you make a change in the hash library.
Reprocessing the evidence updates the hash set associations in the device cache.
1. Select the evidence files for which you want to view updated hash set
associations.
2. Select Process from the Evidence ribbon. The EnCase Processor Options dialog
is displayed.
4. Click OK.
2. Choose Hash Sets from the bottom panel ribbon. All hash sets containing the
entry display.
3. Click Change hash library on the toolbar to enable or disable hash libraries
associated with the current case.
4. Select or clear check boxes in the Enable column to enable or disable hash sets
from the hash library.
1. From the application toolbar, click Tools > Manage Hash Library.
2. In the Manage Hash Library dialog, click Manage Hash Items. The Viewing
(Hash Set) dialog is displayed.
1. In the Viewing (Hash Set) dialog, check the boxes in the Hash Items column you
want to delete. This enables the Delete All Selected button.
2. Select the items you want to delete, then click Delete All Selected.
1. Click Tools > Manage Hash Library. The Manage Hash Library dialog is
displayed.
2. Select the boxes next to the hash sets of the values you want to change.
3. Select Edit Selected from the Hash Sets menu bar. The Edit Selected dialog is
displayed.
4. Select whether you want to change the existing category or tag for the hash sets,
then enter new value in the text box. Click the Hash Set Category check box or
Hash Set Tags check box and enter a new value in the corresponding text boxes.
5. Click Finish.
2. Click Import > Current Hash Sets... and browse to the location of the hash set
you want to import. The hash set files must be in EnCase's proprietary format
with a file extension of BIN.
3. Click Finish.
2. Click Import > EnCase Legacy Hash Sets... and browse to the location of the
hash set you want to import. The filename format must be the EnCase Version 6
hash set format: [hash set name].Hash.
3. Click Finish.
2. Click Import > HashKeeper... and enter HashKeeper Key and HashKeeper
Hash values.
3. Click Finish.
To set up EnCase Endpoint Investigator to use the NSRL, follow the procedures
below.
Download and convert the NSRL into a binary file compatible with EnCase:
1. Download the latest NIST NSRL hash library for the operating systems needed
for your investigation directly from NIST here: https://www.nist.gov/itl/ssd/
software-quality-group/national-software-reference-library-nsrl/nsrl-download/
current-rds.
5. Select Run.
Note: We recommend “NSRL RDSv3 – [date]” for the Hash-set name and
“Known” for the Hash-set category.
2. Select Case > Hash Libraries. The Hash Libraries screen appears.
3. Edit the Primary hash library path. Select Primary and Edit, or double-click
anywhere on the Primary line. If the Primary is in use by your main Hash
library, use the Secondary entry. A Browse for Folder dialog opens.
4. Navigate to the folder containing the export file, your hash library, from the
previous procedure. Highlight the folder, and click OK.
The hash library is linked to the case. The Enabled check box should be selected
and the Hash library path should be visible.
6. From the main menu, select Tools > Manage Hash Library.
7. At the warning dialog, select Yes to again acknowledge that hash analysis must
be run again and advance to the Manage Hash Library screen
8. Select the ellipsis (…) button to point to the hash library folder selected in step
3, above.
9. Select Close.
The new hash library is added to your case and is available for hash analysis.
• Check case information against the Project VIC hash library by:
You must be registered with the Internet Crimes Against Children Child Online
Protective Services (ICACCOPS) to access the Project VIC hash library. The Project
VIC hash library can be downloaded through the Hubstream
(suppport.hubstreamonline.com (https://suppport.hubstreamonline.com/))
Intelligence Agent. The data is saved as a Javascript Object Notation (JSON) file on
your machine.
1. Click Tools > Manage Hash Library. The Manage Hash Library dialog is
displayed.
2. Click New and create a new folder in which to store the Project VIC hash
library.
3. Click OK, then click Import > Project VIC. The Project VIC dialog displays.
4. Browse to the .JSON file and click Open.
5. Click Finish. The Project VIC hash sets display in the Manage Hash Set dialog.
6. Click Close.
1. Open the case where you want to apply the Project VIC hash library.
2. Click Case (Case Name) > Hash Libraries.
3. The Hash Libraries dialog displays.
4. Double-click Primary or Secondary. In the Browse for Folder dialog, navigate to
the Project VIC hash library folder you created and click OK. The Existing hash
sets area of the Hash Libraries dialog populates with the Project VIC hash sets.
Click OK.
5. A prompt displays, informing you that you will need to manually run a hash
analysis to update the cache. Click OK to proceed.
6. Click Yes.
7. Click OK to close the Hash Libraries dialog.
8. Perform a hash analysis (CRTL-SHIFT-H).
9. When processing is finished, the Refresh button in the upper right corner of the
Evidence Tab is enabled.
10. Click the Refresh button.
The Tree view updates with the Project VIC hash library applied to the relevant
files. Matches display in the Hash Set Names column.
If you find files you believe would be good candidates for inclusion in the Project
VIC hash library, you can export them.
EnCase allows files, sections of file content belonging to different data types, and
data structures to be selected, annotated, and stored in a special set of folders. These
marked data items are bookmarks, and the folders where they are stored are
bookmark folders.
EnCase stores bookmarks in .case files, and also stores metadata and content
associated with a bookmark in the actual bookmark.
Bookmarks and the organization of their folders are essential to creating a solid and
presentable body of case evidence. You can examine bookmarks closely for their
value as case evidence and, additionally, use the bookmark folders and their data
items to create case reports. For more information, see “Generating
reports“ on page 491.
• An expanse of raw text within a file or document: the raw text is usually a
portion of ASCII or Unicode text, or a hexadecimal string.
• A data structure: data structure bookmarks mark evidence items of particular
data interpretation types.
1. In the Evidence tab, go to the Table pane and select the file containing the
content you want to bookmark.
4. On the menu bar, click Bookmark > Raw text or right-click the highlighted text
and click Bookmark > Raw text.
5. The Raw Text dialog is displayed. Type some identifying text in the Comments
box on the Properties tab that makes it easy to identify the bookmarked content.
If desired, you can highlight a string, create a bookmark, and then highlight a
separate string with a different color and create it as a separate bookmark.
6. Click the Destination Folder tab to display the bookmark folder hierarchy for
the current case, then click the bookmark folder where you want to place this
sweeping bookmark. In the example below, the Highlighted Data subfolder is
selected. Note that you can always rename bookmark folders or move the
bookmark later.
1. Select the evidence item of interest from the Table pane of the Evidence tab.
2. Examine the file content in the View pane by clicking the Text or Hex tab. As an
example, let's assume that characters displayed in the pane are not in an easily
readable format. Select the bytes of interest.
– When populating the Quick View table, all bytes required to successfully
interpret the data are read.
– For example, if one byte is selected, and four bytes are required to decode
a 32-bit integer, Quick View looks at the next three bytes to provide the
decoded interpretations.
• The View Types list displays specific decoded values, organized in a tree
structure.
– With the exception of pictures, when viewing by Type, only the selected
bytes are interpreted.
– For example, if one byte is selected, and four bytes are required to decode
a 32-bit integer, a decoded interpretation is not available.
– EnCase Endpoint Investigator attempts to decode pictures from the
selected starting byte. The bytes for the entire picture do not need to be
selected.
4. Use the Quick View or the View Types lists to investigate the data. To
investigate date/time data, expand the Dates folder.
5. To bookmark the data, click the Bookmark toolbar button. The Data Structure
dialog is displayed.
6. In the Data Structure dialog, type text about the data structure bookmark in the
Comments box and click the Destination Folder tab.
7. In the Destination Folder box, click the folder where you want to store this data
structure bookmark.
8. Click OK.
1. From the appropriate tab, select the file of interest in the Table pane by clicking
its row.
3. The Single item dialog opens. On the Properties tab, type some identifying text
in the Comment. Alternatively, you can use the browse button to view a list of
existing comments, and select one of those.
4. Click the Destination Folder tab to display the case's bookmark folder
hierarchy. Click the bookmark folder where you want to store the bookmark.
5. Click OK.
Note: You cannot use this bookmark selection with sweeping bookmarks.
1. In the Table pane, select two or more files. When selecting multiple files in the
Table pane, use the check boxes beside the files.
3. The Selected items dialog opens. Type some identifying text in the Comment
box on the Properties tab that describes the file. You can also use the browse
button to view a list of existing comments, and use one of those.
4. Click the Destination Folder tab to display the case's bookmark folder
hierarchy, and click the bookmark folder where you want to store the
bookmarks.
5. Click OK.
3. Click Bookmark Selected. This adds a bookmark to the case, bookmarking the
selected artifacts.
5. Enter a name for the bookmark or accept the default. The bookmark name is the
name of the current report, by default.
8. Select a destination folder for the Bookmark or create a new folder. Click Next.
10. Select a column to categorize the bookmark. The bookmark is displayed in this
column in the final report.
11. Click Finish. EnCase adds the new bookmark to the case.
The Transcript tab extracts text from a file containing mixtures of text and
formatting or graphic characters. The transcript view is useful for creating
bookmarks inside files that are not normally stored as plain text, such as Excel
spreadsheets.
2. On the Table toolbar, click Add Note. The New Bookmark dialog is displayed.
3. Type a Name for the note bookmark, then type text in the Comment box or
browse for a list of previous comments. This is the bookmark text where the
note is added.
4. Click OK.
To show the notes in their true order in the bookmark folder hierarchy, click the
viewing mode icon on the Bookmark toolbar and select Traeble view.
Use the Report tab in the View pane to show how the note actually is displayed in
reports, as shown above.
2. Right-click the image to be bookmarked and click Bookmark > Single item...
3. The Single item dialog opens. On the Properties tab, type identifying text in the
Comment box.
4. Click the Destination Folder tab to display the case's bookmark folder
hierarchy. Click the bookmark folder where you want to store the bookmark.
5. Click OK.
1. While in the Evidence tab, select the document you want to bookmark from
your evidence list and click the Doc tab in the lower view pane.
2. In the Doc tab, select Bookmark Page as Image. A dialog opens, displaying all
the pages in the selected document.
3. Select the page(s) you want to create as an image, and click Next.
5. Select a folder where you want to add the image and click Finish.
The image is added to all appropriate reports automatically. Original formatting and
pagination, when available, is preserved.
Bookmark folders are organized according to a standard tree structure, with a folder
named “Bookmark” at the top the hierarchy. The various bookmark folders (and
subfolders) are beneath this node.
If you are not using the default bookmark folders, assign bookmark folder names
that identify their content or are meaningful to your case team. For example, you can
organize the folders by type of computer evidence, or by relevance to a particular
part of the case.
Note: Bookmark folders are nonspecific in nature. Any default folder or folder
you create can hold any data type or content.
To display the set of default bookmark folders for the #Basic template, start a case
and choose the #Basic template.
2. In the Bookmarks tab, the Bookmarks root node folder is displayed at the top of
the tree pane.
3. To expand the Bookmarks folder, click its tab. This displays the default
bookmark folders (shown both in the Tree and Table panes).
We recommend using the supplied labels for the bookmark folders to organize the
types of bookmarked content (Documents, Pictures, Email, and Internet Artifacts).
Although this folder organization is entirely flexible, bookmark folders are directly
linked to the Report template that is also included in the default templates. If a case
grows to where it needs more bookmark folders or a greater level of bookmark
organization, you can create new folders or modify the folder organization, but you
may need to make changes to the Report template.
3. A new folder displays one level beneath the Bookmark root folder highlighted
in blue.
2. Select the bookmark folder you want to edit, right-click to display its context
menu and click Edit.
4. Edit either Name or Comment for the bookmark folder, or both, and click OK.
1. In the Tree view of the Bookmark tab, click the Bookmark folder you want to
delete.
2. Right-click the folder and click Delete Folder. A delete confirmation prompt is
displayed.
3. Click Yes to delete the folder. Use caution, since deleting a bookmark folder also
deletes any bookmarked items in the folder.
Note: Deleting a bookmark folder also deletes any bookmarked items in the
folder.
1. Click Edit and modify the text in the Comments box of the Properties tab.
2. You can also click the browse button (...) in the dialog to view a list of bookmark
comments.
4. Click OK.
2. In the Table pane, find the bookmark folder with the bookmark you want to
rename.
3. The Table pane displays the list of bookmarks for the selected folder. Select the
cell for the bookmark to rename.
1. On the Text or Hex tabs in the View pane, select the bytes you want to decode.
2. Click the Decode tab in the lower right pane and select from the list of decoding
options.
– When populating the Quick View table, all bytes required to successfully
interpret the data are read.
– For example, if one byte is selected, and four bytes are required to decode
a 32-bit integer, Quick View looks at the next three bytes to provide the
decoded interpretations.
• The View Types list displays specific decoded values, organized in a tree
structure.
– With the exception of pictures, when viewing by Type, only the selected
bytes are interpreted.
– For example, if one byte is selected, and four bytes are required to decode
a 32-bit integer, a decoded interpretation is not available.
– EnCase Endpoint Investigator attempts to decode pictures from the
selected starting byte. The bytes for the entire picture do not need to be
selected.
• When populating the Quick View table, all bytes required to successfully
interpret the data are read.
• For example, if one byte is selected, and four bytes are required to decode a 32-bit
integer, Quick View looks at the next three bytes to provide the decoded
interpretations.
14.6.2.1 Text
The Text folder contains child objects for formatting which you can use when
displaying bookmarked content as text.
14.6.2.2 Pictures
The Pictures data types display data as images.
14.6.2.3 Integers
The Integers data types include these categories:
14.6.2.4 Dates
The Dates data types include these categories:
• DOS Date displays a packed 16-bit value that specifies the month, day, year, and
time of day an MS-DOS file was last written to.
• DOS Date u(GMT) displays a packed 16-bit value that specifies the time portion
of the DOS Date as GMT time.
• UNIX Date displays a Unix timestamp in seconds based on the standard Unix
epoch of 01/01/1970 at 00:00:00 GMT.
• UNIX Date Big-endian displays a Unix timestamp in seconds based on the
standard Unix epoch of 01/01/1970 at 00:00:00 GMT, as Big-Endian integers.
• UNIX Text Date displays a Unix timestamp in seconds as text based on the
standard Unix epoch of 01/01/1970 at 00:00:00 GMT.
• HFS Date displays a numeric value on a Macintosh that specifies the month, day,
year, and time when the file was last written to.
• HFS Plus Date is an improved version of HFS Date. It displays a numeric value
on a Macintosh that specifies the month, day, year, and time when the file was
last written to. HFS Plus is also referred to as “Mac Extended”.
14.6.2.5 Windows
The Windows data types include these categories:
• Partition Entry displays a partition table entry from the Master Boot Record.
• DOS Directory Entry displays a DOS directory entry.
• Win95 Info File Record displays Recycle Bin details from Windows 9x
INFO files.
• Win2000 Info File Record displays Recycle Bin details from Windows 2000+
INFO files.
• GUID displays a 128-bit globally unique identifier (GUID).
• UUID displays a 128-bit universally unique identifier (UUID).
• SID displays a Windows Security Identifier (SID).
The EnCase tagging feature lets you mark evidence items for review. You define
tags on a per case basis; default tags can be part of a case template.
Any item that you can currently bookmark can also be tagged. You can search for
tagged items, view them on the Search Results tab, and view the tags associated
with a particular item in Evidence or Record view.
• You can create tags as part of a case or add them to a case template, then
customize each tag with specific colors and display text.
• You can edit saved tags: change their colors and text, hide specific tags from
view, and delete tags.
• You can directly manipulate tags on the EnCase user interface: modify the order
in which they display, delete them from the display, and so forth.
• You can build searches based on tags you have created and tag search results.
You can also combine tags with index and keyword search queries.
• You can sort the tag column to find items with multiple tags.
• Tags are persistent when you are working with entries and when you save and
re-open a case.
• Tags are local to a specific case (that is, you cannot create global tags).
• You can create up to 63 unique tags per case.
• Each item, entry, email, or artifact can have multiple tags.
• The Display Text that is displayed in the Tag column (We recommend using
short display names to conserve space).
• The Frame Color (foreground and background colors) for the tag.
• You can also hide the tag from displaying by checking the corresponding
Hidden box.
5. Repeat the preceding two steps until you have created the set of tags you need.
You can always add, remove, and rename tags while working on a case.
1. On the Evidence tab, display your evidence items. (You can also assign tags to
Artifacts, Bookmarks, and Results.)
2. Highlight or check the evidence item to which you want to assign a tag.
3. Display a list of available tags by clicking Tags > Show Tag Pane. A pane is
displayed in the lower right corner of the EnCase user interface. The pane
contains a list of default and custom tags and the number of occurrences of each
tag.
4. Check the tag that you want to assign to an evidence item.
5. The tag is displayed in the Tag column of the selected evidence item.
You can also tag an item by clicking its position in the Tag column:
1. Display a list of available tags by clicking the Tags tab from the lower right
pane. The order that the tags are shown in the table (top to bottom) corresponds
to the order in which they display in the Tag column (from left to right).
2. Click the space in item's Tag column where the tag would be displayed. The tag
appears.
3. As an example, if you configured two tags:
• The left half of the Tag column is used to display the first tag.
• The right half of the Tag column is used to display the second tag.
4. Click the first half of the tag cell to display the item's first tag, and the second
half of the tag cell to display the item's second tag.
5. Click any tag from an evidence item to remove that tag from the item.
Sorting tags
You can sort the entire tag column by individual tag. Clicking the tag name within
the tag column header sorts the column by the tag name. Also, clicking the narrow
gray area around the tag name, within the tag column, sorts the entire contents of
the tag column.
In ascending order, items with a tag in the rightmost column will be sorted first.
Items with a tag in the second rightmost column will be sorted second.
In descending order, items with a tag in the leftmost column will be sorted first.
items with a tag in the second leftmost column will be sorted second.
• Hot keys are assigned to the first ten tags in the Tag database.
• The hot keys Alt-1 through Alt-9 and Alt-0 are assigned to the first ten tags.
• Remaining tags can be assigned via the second level menu: All Other Tags.
• The maximum number of tags allowed in a case is 63. Using the Manage Tags
option, you can create additional tags beyond the case limit of 63.
Click Tags from the Evidence tab menu bar to view keyboard shortcuts for tags.
1. From the Evidence tab, click the Tags button. The Manage Tags window is
displayed.
2. Select the box in the Hidden column for the tag you want to hide or unhide.
To delete a tag:
1. From the Evidence tab, click the Tags button. The Manage Tags window is
displayed.
Note: If the tag is assigned to at least one case item, a warning dialog is
displayed with the number of tags to be deleted. If the no items are tagged, no
warning dialog is displayed.
1. From the Manage Tags window, left-click on a tag in the cell and hold the
mouse button down.
2. Drag the tag to a new position in the cell and release the mouse button.
Note: There are some operations (for example, Create Logical Evidence File)
that act on selected items only.
EnCase Portable automates the collection of evidence from computers in the lab and
in the field. It is a self-contained application that runs on a removable USB device
inserted into a running machine.
EnCase Portable functionality is included in the full EnCase product. It can also be
purchased separately as a standalone product to create, manage, run, and analyze
jobs.
• The Portable device contains and executes preconfigured jobs that collect
evidence from target machines.
• When using the standalone version of EnCase Portable, EnCase Portable is
executed from the security key.
• Evidence can be stored on the Portable device if desired. However, a separate
Portable storage device can be used to collect large amounts of evidence if
necessary.
EnCase Portable can be run using an EnCase Portable security key, or on a prepared
Portable device. When EnCase Portable is run from a Portable security key, you can
create collection jobs directly on the device. When using Portable functionality from
EnCase, you can create collection jobs in EnCase and export them to either a Portable
security key or a prepared portable device.
Once the evidence is collected directly on the Portable device or the Portable storage
device, it can be analyzed in the field or imported back into EnCase to review the
results. You can build and generate reports that capture all or selected parts of the
collected information.
1. Create your collection jobs in Portable Management. This can be done from
EnCase or on the Portable device itself.
2. If the jobs were created in EnCase, export the jobs to the Portable device.
5. If you own EnCase, import the evidence you have collected into EnCase.
If EnCase is installed, jobs are typically created in EnCase and exported to the
Portable device. You can also create and edit jobs directly from the Portable device.
Once a job is created, you can modify or copy it to create other jobs. Some jobs can
be configured to triage the information as it comes in, so you can choose exactly
what information to collect.
Jobs use modules, which are configurable sets of instructions for how to look for
certain kinds of data, such as information found in running memory, certain types of
files, etc. Modules also define a specific set of data to be collected. You can configure
the information collected by a module by selecting a specific set of options for each
module.
System Modules
• The System Info Parser module collects system artifacts related to user activity,
network configurations, installed software, hardware components, startup
routines, users/accounts, shared/mapped drives, and AutoRun data. This
information is pulled from the Windows registry or the system files appropriate
to a given Linux distribution.
• The Windows Artifact Parser module collects link files, the MFT $LogFile
transaction log, and Recycle Bin items.
• The Encryption module produces a single page report listing the encryption type
of each drive and volume on the target system.
Search Modules
• The Internet Artifacts module collects a history of visited websites, user cache,
bookmarks, cookies, and downloaded files.
• The File Processor module provides a way to review and collect specific types of
files. From within the File Processor module, you can elect to find data using
metadata, keywords, or hash sets, or find picture data. You can also configure
your own collection sets using an entry conditions dialog. Jobs created with this
module enable you to triage information as it is being collected. You can then
decide what files, if any, to collect.
Collection Modules
Modules are used to collect information about files and machines in specific ways.
After naming a job, you select modules and configure them to your needs. To set
module options, double click the module name. Most modules are collection
modules that gather and collect information into an evidence (.Ex01/.E01) or logical
evidence (.Lx01/.L01) file.
Some modules (such as the File Processor module) provide you with the ability to
review and triage your information as it is being scanned on the target machine.
2. In Portable Management, click New in the Select Jobs area; from within EnCase
Portable, click New in the EnCase Portable dialog. The Create Collection Job
dialog is displayed.
• A job name cannot contain spaces at the beginning or end of the name, or
any of the following characters: \ / : * ? " < > |
4. Text entered in the Description field (optional) is aligned with job names under
Recent Jobs in the Portable Home screen.
5. Click Next to open the Module Selection dialog. This dialog shows module
groupings in the left pane and the current configuration options for the selected
module in the right pane.
6. Select one or more modules by selecting the check box by the module's name.
7. When available, options for each module can be selected by double clicking the
module name. For more information, see documentation for the specific
module.
• Do not mount does not perform any unpacking of compound files, so the
files are processed without unpacking any of the internal content.
• Mount - detect extension causes files with a matching extension to be
mounted and processed. No signature verification is conducted.
• Mount - detect signature results in a signature analysis being run on all files
to determine if they are a compound file of interest. Files with the correct
signature are then mounted and processed.
9. Click Next to open the Output File Options dialog. This dialog provides control
over the format of the collected evidence.
• File Format options determine the type of file to create. Lx01 format is an
encrypted logical evidence files. L01 format is a legacy unencrypted logical
evidence file.
• Segment Size determines the size, in megabytes, of the individual segments
of the evidence file.
• Select Compression to compress the size of the EnCase evidence file.
• Use theEntry Hash list to select the type of hash algorithm used for each file
system entry.
• The Encryption Keys box enables you to add multiple encryption keys for
use in encrypting Lx01 files. Evidence collected when triage is enabled
cannot be encrypted.
2. In the Select Jobs table, select the jobs you want to add to the Portable device.
3. In the Select Devices table, select the device you want to add the jobs to.
4. Click Add Jobs. The Adding Jobs status window displays the updating process.
2. The tabs display the previously selected settings. Modify the name, module
selections, module options, target options, and encryption options as desired
and click OK.
2. Select the job to duplicate in the Select Jobs section and click Duplicate. The
Copy Job dialog is displayed.
3. Enter a new name for the job and click OK. EnCase transfers all the settings
from the first job to the new job.
If a job is not contained in the \Jobs folder you can find its location by finding and
opening its containing folder:
2. In the Select Jobs section, right-click the job name you want to locate and select
Open Containing Folder.
2. In the Select Jobs section of the Jobs tab, click Import Old Jobs. The Browse For
Folder dialog is displayed. Navigate to the version of EnCase you are currently
running.
3. Select the specific storage location of the jobs and click OK. The Importing Old
Jobs dialog is displayed.
4. All .ini jobs are converted to the new .enjob format. When done, click
Finished. The imported jobs are displayed in Portable Management.
1. From the Portable home screen, select the Configure Jobs option.
3. Select a job or jobs to delete by selecting check boxes and click OK. A
confirmation dialog is displayed.
5. If no jobs are selected, the Delete button on the toolbar, or the Delete option on
the right-click menu, deletes the currently highlighted job after confirming the
deletion with the user. The Delete All Selected right-click menu option is
disabled.
6. If at least one job is selected by clicking its check box, the Delete button on the
toolbar deletes the checked job, as will the Delete All Selected right-click menu
item.
Note: Any jobs that are currently running are not deleted.
2. Click Delete All Jobs. EnCase Portable deletes all jobs on the selected devices.
2. In the Select Devices section, select a device. The Delete Databases button
becomes enabled.
• All portable devices that hold at least one target database are displayed,
along with all target databases present on each device.
• Clicking the device name in the left pane automatically selects all target
databases present on that device.
• After selecting at least one target database, the Delete Selected button
becomes enabled.
5. Click Delete Selected. All selected target databases are deleted and the dialog
refreshes to show the remaining databases.
Most modules are collection modules that gather and collect information into an
evidence (.Ex01/.E01) or logical evidence (.Lx01/.L01) file.
Some modules (such as the File Processor module) let you review and triage your
information as it is being scanned on the target machine.
The module works with both Linux and Windows operating systems, and displays
different data, depending on the operating system of the collection target. The
module also uses different files to parse the data, depending on the system. For
Windows systems, all data is collected from the Windows registry. For Linux
systems, the data is compiled from various configuration files found throughout the
file system.
• Ubuntu 8
• Fedora 8
The job summary displays results based on the options selected on the Standard and
Advanced tabs.
Standard tab
The Standard tab of the System Info Parser lets you choose from categories of data
that can be collected. These categories correspond to different data stores on the
target machines, depending on the operating system.
– System startup mode information, such as the default place to save startup
scripts.
– Login prompt and version information shown during startup.
– Boot manager information.
– Language settings.
• Hardware retrieves the hardware configuration of the computer, as it was
checked during startup, including hardware adapters/devices, architecture
information, and so forth.
• Software retrieves two types of software information:
Advanced tab
The Advanced tab lets you specify registry keys to collect from target machines
running Windows. You need to know the Windows version-specific locations of
relevant data within the registry before using this tab.
• Link Files creates an output artifact for each Link file (usually *.lnk) found
during preprocessing. This selection adds Created, Accessed and Modified data
properties plus the path to the file that is referenced by the link to each output
artifact.
• Recycle Bin Files creates an output artifact for each item found in the file that
holds information about deleted files. This selection adds the path of the original
file location as the path data property to each output artifact.
• MFT Transactions creates an output artifact for each item in the Master File
Table transaction log “$Log” file (which records all redo and undo information
for each user file that is updated). This selection adds Created, Written, Accessed,
and Modified data properties to each output artifact for these types of items.
• ShellBags creates an output artifact for registry keys that indicate size, view, icon
and folder position used within Windows Explorer.
Select Search Unallocated to enable a search of unallocated space for the Windows
Artifacts.
16.1.2.3 Encryption
The Encryption module produces a single page report listing the encryption type of
each drive and volume on the target system. After jobs using this module are run,
the report is available as a Summary Report and as the Encryption Report in
standard reports.
This module is used only on machines that are already running, and depends on
core encryption analysis. It does not work on evidence files.
Only supported encryption types are shown; do not assume that a device is not
encrypted if its encryption type is not displayed.
Jobs created with the Personal Information module let you triage the scanned data
as it is being gathered. You can stop a scan when you find the information you are
seeking or determine that the scan will not prove useful.
For more information, including the GREP expressions used, see “Portable FAQ”
on page 487.
General tab
Select Entry condition and click Edit to specify or modify which conditions are used
to search for the personal information selected. By default, the entry condition is set
to search only files that match the document, database, Internet, or unknown file
categories.
The Hit Threshold lets you ignore files with only a few hits. For example, if you set
the threshold to 5, only files containing five or more PII hits are collected. Any file
with fewer than five hits is ignored. The default is 1.
The Phone numbers options find information containing U.S. and Canadian
formatted phone numbers, with or without separators. You can select whether to
search for numbers with or without area codes.
The results section enables you to choose how you want to receive the results of
your search:
• Generate Report allows jobs to run normally without triaging data as it is being
collected.
• Triage displays data for review by the examiner, as it is being collected.
• Prompt when run lets you turn the Triage feature on or off during data
acquisition.
You can customize a credit card search by clicking New. The Credit Card Data
dialog is displayed:
• Customized credit cards are signified by a dot in the Can Edit column.
• Click Edit to modify a customized credit card.
• Click Delete to remove a customized credit card.
• Results are validated with the Luhn algorithm.
Government ID
The Government ID tab enables you to search for any type of government ID (not
just Social Security numbers) through the use of GREP expressions. This is especially
useful in areas where government issued IDs have different formats.
The hits are indexed and searchable using the Government ID pattern query.
Social security numbers finds U.S. social security numbers, with or without
separators.
Note: You cannot view or edit the default Social Security Number.
To add another type of ID, click New. The Government ID dialog is displayed.
• Enter a name in the Government ID box and a GREP expression in the Search
Expression (GREP) box.
• When done, click OK.
This module has no configurable options. Selecting the module captures the
following information:
The File Processor module provides you with the option to view evidence as it is
being collected. You can stop a scan when you find the information you are seeking
or determine that the scan will not prove useful.
The four filter types available in the File Processor module include:
• Metadata processing specifies the types of files to be searched for, using a set of
entry conditions. See “Metadata” on page 463.
• Keyword provides a way to find information based on a list of entered
keywords, and lets you refine the search with an entry condition. This option
allows GREP expressions, whole word, and case sensitive searching. See
“Keyword” on page 463.
• Hash searches for files by comparing their hash values to hash values found in
either a new or pre-existing hash set. This option lets you create a new hash set
or use a pre-existing set, and also lets you refine the search with an entry
condition. See “Hash” on page 464.
• Picture searches for files identified with a file category of “picture”. This option
lets you limit the number of files that are returned, and limit the minimum size of
the pictures. In addition, you can add entry conditions to further refine your
search. See “Picture” on page 465.
To configure the File Processor module, select one of the processing types, and
choose one of the ways to handle the results.
Click Next to display the options screen for the processing type selected.
Metadata
The File Processor module Metadata processing option collects specific types of files
using entry conditions. For example, you can set it to collect all types of images
(.jpg, .png, .bmp, etc.) or documents (.doc, .xls, .pdf, etc).
Click on Entry condition to create or edit entry conditions. Set conditions to specify
exactly which files your job collects. The default metadata condition will target all
files if left unmodified.
Keyword
The File Processor module Keyword finder processing option lets you create a list of
keywords for searching documents on a target machine. The Keyword finder
module contains an Entry Condition which targets searchable documents. See the
Customization section for instructions on viewing and modifying default conditions.
Note: This module searches the transcript of files supported by Oracle Outside
In viewer technology. This differs from the keyword searching in EnCase in
that this method locates keyword hits inside of files (such as .docx or .xlsx files)
that would not be found by a raw search of the file.
After clicking Next in the File Processor module, the Keyword options dialog
displays the following:
To compile a list of keywords, click Add Keyword List. The Add Keyword List
dialog is displayed.
2. Select the appropriate check box option if the keywords should be interpreted
as GREP expressions, case sensitivity should be enforced, lines should be
treated as whole words.
3. Click OK.
Importing keywords
To import a list of keywords that has been exported from EnCase, click Import. The
Import Keywords dialog is displayed.
Browse to the keywords file location, select a file, and click OK.
Editing Keywords
To edit a keyword in the Keyword Finder, select it in the options dialog and click
Edit. The Edit Keywords dialog displays the following:
3. Click OK.
Exporting keywords
To export the list of compiled keywords, click Export on the Keyword Finder dialog.
The Export Keywords dialog is displayed.
Enter a new filename and click OK. This keyword file can be used in EnCase.
Customization
To specify which files the Keyword processes, click Entry Condition in the Keyword
options dialog to open a conditions dialog. By default, the entry condition restricts
processing to files where the category matches “Document”.
Hash
The Hash processing option in the File Processor module searches for files with a
particular hash value on the target machine. Hash values are stored in hash sets that
can be identified by a name and category. The Hash Finder module targets all files
by default. You can customize these default conditions.
Before you can use the Hash processing option, you must create hash sets for your
current case.
Hash sets can be added to the module from the following sources:
• A hash set created from a folder. When created this way, you can assign a name
and category to assign to the set.
• A hash .bin library available in EnCase:
When the Hash processing option is used in a job, the hash sets are kept in their
original location and also copied to the EnCase Portable USB device.
After clicking Next in the File Processor module, the Hash options dialog is
displayed.
The hash sets displayed, if any, are taken from the hash library. You can select from
an existing hash set in this list, or create a new set. Click Refresh Set List to add all
other available hash sets to the list.
To compile a hash set, click Create Hash Set. The Create Hash Sets From Folder
dialog is displayed.
• Enter or browse to the folder containing the files you want to create a hash set
from.
• The Hash set name is automatically populated using the name of the folder. You
can change the hash set name.
• Enter a category for this hash set (optional).
• Click OK. EnCase creates a .bin library file from the files in the selected folder,
saves it to the EnCase Hash Sets folder, and adds it to the Hash Finder options
list.
Customization
Picture
Use the Picture processing option in the File Processor module to search for pictures
on a target machine. This module contains an Entry condition which returns files
that match the picture file category in EnCase. See the Customization section for
instructions on viewing and modifying default conditions.
After clicking Next in the File Processor module, the following dialog is displayed:
• To limit the number of pictures returned, clear the Display all pictures check
box. The Limit number of pictures selector becomes active. Keep the default
value or enter another.
• The default is set to gather all pictures above 10KB in size. If you want to change
the minimum size of the picture files returned, adjust the Minimum size of
pictures option.
• You can select to find pictures either by file extension or by file signature.
Customization
To specify which files the Picture Finder processes, click Entry condition in the
Picture Finder options dialog to open a conditions dialog.
The Picture Finder module only returns files that match the file category of “picture”
in EnCase. Although additional options can be specified in the entry condition, this
particular parameter cannot be modified.
• Entry condition filters which files EnCase processes, based on their entry
properties.
• EVT condition restricts individual events on properties parsed from an EVT file
(Event ID, Event Type, Source, etc.).
• EVTX condition restricts individual events on properties parsed from an EVTX
file (Event ID, Process ID, Thread ID, etc.).
To enable a condition, select its check box. Click Edit next to the condition type to
modify the condition.
File detection determines how the module detects authentic event files. By default,
file detection is performed by looking for event files with a proper extension, then
verifying their signature to prevent processing incorrect files. When checked,
Process all files by signature causes the module to determine event files based on
their file signature only. Select this box to detect event file logs that contain an
incorrect extension.
To enable an entry condition, select its check box. Click Edit next to the conditions
selected, to modify the conditions that determine which files are processed.
On a Linux target, the \etc\syslog.conf file is parsed for paths that contain the
system log files.
On an Apple Mac target, the \private\etc\syslog.conf file is parsed for the paths
that contain the system long files.
Click Edit to modify the conditions that determine which event parameters are
collected.
• Use Entry condition to create a condition that restricts which Linux syslog files
are processed.
• Use Log event condition to specify syslog conditions that can filter by host
name, process, message, and so on.
To enable an entry condition, select its check box. Click Edit next to the conditions
selected to modify the conditions that determine which files are processed.
16.1.5.1 Snapshot
The Snapshot module collects a snapshot of a machine at a given time, including the
running processes, open ports, network cards, login information, open files, and
user information.
• Hash processes calculates hash values for the executable files that were run to
create the currently running processes.
• Get hidden processes identifies processes that have been hidden from the
operating system.
• Get DLLs retrieves and collects a list of currently loaded DLLs.
• Mark logged on user finds and marks which of the identified users are currently
logged on.
• Detect spoofed MAC detects if the MAC address for any of the network
interfaces is being set to a value other than the default value.
16.1.5.2 Acquisition
The Acquisition module acquires images of drives and memory from a target
machine. When using this module, ensure you have enough storage available to
hold the evidence files this process creates. There are several available options.
Acquire
• Acquire logical devices acquires all logical devices (lettered drives, such as C:).
• Acquire physical devices acquires all physical devices (numbered devices, such
as 0, 1, etc.).
• Acquire detachable drives acquires all detachable hard drives.
• Acquire memory acquires an image of machine memory (RAM).
• Prompt at collection time displays a list of all devices (logical, physical, and
memory) when the job is run. Select any combination of these devices for
acquisition.
To automatically acquire more than one type of device, create separate jobs for each
operation.
Notes
Evidence File
Verification
• Acquisition MD5 calculates the MD5 file hash of the acquired files.
• Acquisition SHA1 calculates the SHA-1 file hash of the acquired files.
When running a collection job using Acquisition module, EnCase can verify the
acquired files using hash values.
Before the job runs, a dialog is displayed listing the storage path, available drives,
and a Verify acquisition check box.
Select the Verify acquisition check box to verify the hash values of the acquired
evidence files. This adds time to the running of the job.
When completed, EnCase includes both the original and the verification hash values
in analysis tables and reports.
• Run jobs.
• If EnCase is installed, copy evidence into EnCase from a Portable storage device.
• The jobs to be exported to the Portable device (see “Creating a Portable job”
on page 453 and “Adding a job to the Portable device” on page 455).
Before you begin, try to determine as accurately as possible how much evidence you
will be collecting.
• If collecting less than 2.5 GB of data, use the Portable device to collect the
evidence.
• If collecting more than 2.5 GB of data, use another prepared USB storage device
to collect the evidence. If necessary, use the storage device with a USB hub.
• To create a report from selected items in the summary, select the items to
include and click Add Selected to Report. See “Creating a report”
on page 478.
8. When done, close the status window.
9. To view the results of running your job, return to the Portable Home screen and
select Analysis or Advanced Analysis.
10. When all jobs have completed, select Exit to close EnCase Portable.
11. After Run Portable closes, safely remove all EnCase Portable USB devices.
Collecting evidence
When you select to triage the results, you can review your information in real time,
select the information you want to examine further, and save it as a logical evidence
file (LEF). Blue check every document or file you want to save and then, when your
job has stopped running, click Collect Selected to LEF from the job status screen. All
selected items are collected and saved as a LEF. See “Collecting evidence from
triaged results” on page 477.
Job analysis
After the job is completed, you can see this information again by clicking Analysis
or Advanced Analysis in the Action section of the Portable home screen.
Options for metadata processing are configured when the job is created using the
File Processor module.
While this type of file processing is running, you can view the progress screen by
clicking the link in the status column of the status dialog. A list of files matching
your entry conditions is displayed.
If the job has been configured to triage results, you can click any document name to
view document files in the document viewer.
Note: The document viewer does not work on non-document types of files
(such as images). Pictures should be scanned and triaged using the Picture
Finder option.
Options for Keyword Finder are configured when the job is created using the File
Processor module.
While this module is running, if the job has been configured to triage results, the
progress screen can be viewed by clicking the link in the status column of the status
dialog.
• The keywords listed in the Keyword Name column are the keywords entered
when the job was created.
– The name for the keyword may be different from the keyword expression
being used to search. This is useful when the search expression is a GREP
expression or in a foreign language.
– The table is sorted in alphabetical order based on the Keyword Name.
• The number of documents found to contain at least one instance of the keyword
is listed in the Document Count column.
• The number of search hits for the keyword is listed in the Keyword Hits column.
• The Keyword Expression is the literal string used in the search.
• Columns can be sorted by double clicking the column header. As in EnCase, shift
clicking on multiple columns creates multiple layers of sort orders.
The table shows the document name, the number of times the keyword was found
within it, the file size, and its path.
• Click Next or Previous to open up the next or previous document in the list,
using the current viewer.
• Click the check box next to Add to Collection to add this document to your
collection of data. This collection can be turned into a LEF from the status
window when your analysis is complete. See “Collecting evidence from triaged
results” on page 477.
• Fit to Page adjusts the text to better fit the frame of the dialog.
• You can toggle between either Full View mode, with each line numbered, or
Compressed View with just the lines of the document that contain keywords
displayed. When in compressed view, click Full View to switch to the full
document. When in full view, click Compressed View to show only the lines that
have keyword hits.
• In Full View, use Next Hit and Previous Hit to jump to the next highlighted
keyword in the document.
• Clicking Find opens a dialog that lets you search for additional expressions.
From here, you can search for the expression within the current document,
within the current document from your current position to the end, or within the
currently selected text.
Note: You cannot use the Hash Finder unless your hash libraries are correctly
set up.
Options for Hash Finder are configured when the job is created using the File
Processor module.
While this module is running, you can view the progress in the Status tab.
If the ability to triage results was selected when configuring the job, you can click on
the link in the status column to open up a search results tab.
• Hash Library displays the name of the hash set library used in the module.
• Category is the category assigned to that library.
• The Document Found column displays the number of documents found to have
hashes that match those in the hash library.
Clicking the hash library link opens up the document table, displaying all
documents that match the hash values in that library.
Options for Picture Finder are configured when the job is created using the File
Processor module.
While this module is running, the progress screen can be viewed by clicking the link
in the status column of the status dialog.
Viewing
You can increase or decrease the size of your images, by changing the number of
rows and columns you are viewing.
To see fewer, larger pictures, decrease the number of columns by clicking Fewer
Columns. To see more, smaller pictures, increase the number of columns by clicking
More Columns.
You can also increase or decrease the number of rows displayed by right-clicking
within the gallery and selecting More Rows or Fewer Rows.
Sorting
EnCase Portable provides a quick sorting function that brings pictures in popular
locations to the top for efficient review. After the search has completed, click Add
Sort to apply sort priority to pictures located in the User folder(s), then removable
media, and then the rest of the drive(s). In addition, multiple images contained in a
single folder are sorted by file size, from largest to smallest.
Note: Images can be added to reports during collection, only. See the
Analyzing and Reporting on Data chapter for details.
When configured for triage, the results screen can be viewed by clicking the link in
the status column of the status dialog while a job is running.
• The personal information types listed in the Keyword Name column are the
types of personal information specified by the Personal Information module.
• The number of documents found to contain at least one instance of the personal
information type is listed in the Document Count column.
• The number of search hits for the personal information type is listed in the
Keyword Hits column.
Clicking a personal information type opens a documents table for that information
type.
The table also includes the document name, the number of times the personal
information type was found within it, the file size, and its path.
Note: The search hits for credit card numbers are not validated before
appearing in this table. Therefore, there may be a discrepancy between the
number of hits shown in the document viewer, and the number of actual,
verified results.
Clicking the link opens a document viewer with keywords highlighted in yellow.
• Click Next or Previous to open the next or previous document in the list, using
the current viewer.
• Click the check box next to Add to Collection to add this document to your
collection of data. This collection can be turned into a logical evidence file (LEF)
from the status window when your analysis is complete. Even if no files are
collected, the module can capture and save a complete report of relevant
documents for later examination. See “Collecting evidence from triaged results”
on page 477.
• Fit to Page adjusts the text to better fit the frame of the dialog.
• You can toggle between either Full View mode with each line numbered, or
Compressed View with just the lines of the document that contain keywords
displayed. When in compressed view, click Full View to switch to the full
document. When in full view, click Compressed View to show the lines that
have keyword hits only.
• In Full View, use Next Hit and Previous Hit to jump to the next highlighted
keyword in the document.
• Clicking Find opens a dialog that creates searches for additional expressions.
From here, you can search for the expression within the current document,
within the current document from your current position to the end, or within the
currently selected text.
1. Drill down from the status window into the results for each module and select
each file to collect.
3. Click Collect Selected to LEF. All checked items are collected into a logical
evidence file (LEF) and stored with an .L01 extension in the \EnCase Portable
Evidence\<Job Name> folder on the storage device.
To copy evidence:
5. To remove the files from the original location, check Delete evidence after
copy.
Analysis reports
The Analysis and Advanced Analysis options create customized reports that show
your data organized in tables. You can create reports from within EnCase Portable
or from Portable Management in EnCase.
The reports compiled are available only as long as you have the application open. To
preserve your information, you can print or export it.
1. From the EnCase Portable Home screen, select Analysis or Advanced Analysis.
See the discussion in the Overview section of this chapter to determine which is
appropriate for your reporting needs. In general, Advanced Analysis gives you
many more elements to choose from to build your report.
3. Double-click the analytics query group folder icons to display the analytics
queries.
4. ClickSave Selected in the table toolbar to save the queries. The Set Table Title
dialog is displayed.
5. Enter the title you want for the table in your report and click OK.
6. Click Manage Saved Reports in the analytics query selector screen to display
the tables which have been added to your report. All tables are displayed in the
Customize Report dialog.
7. Continue using the analytics query selector screen to add additional query
results to your report. You can add as many tables as necessary to your report.
8. Click Unavailable Views to display the sets of analysis results that are not yet
available, given the collections still under examination. This list can be used as a
checklist to assure that the required data is collected.
Click View Report to preview your report. From the preview screen, you can
also print your report to maintain an artifact of this evidence.
This report structure is discarded after closing.
2. The Constraint dialog is displayed, showing fields that are relevant to that
specific table.
3. Enter the information to include in the table in the appropriate text box. For
example, to see filenames that contain the word Cat only, enter Cat in the
Filename text box.
• Only one value can be entered in each text box. For example, if you enter Cat
and Dog, to display information that contains both the words Cat and Dog,
EnCase Portable takes the value literally and displays information that
contains the entire phrase Cat and Dog.
• If you enter values in multiple text boxes, EnCase Portable displays the
information that contains all specified values only.
• All non-string fields (such as IP addresses, numbers, hashes, or dates) look
for exact matches. For example, if you enter 80 for the local port, EnCase
Portable looks for port 80 only; port 8080 does not match the filter and will
not be displayed.
4. Click OK. The table is displayed according to the restrictions entered. The
current criteria are shown in the bottom left status area of the Analytics Query
Selector.
2. Select a Find Pictures option and click Finish. The Status tab is displayed.
3. After at least one file is found, click the link in the Status column. This can be
done while the job is running. The Images tab is displayed.
4. Select images to add to your report by clicking individual image check boxes.
7. To print a report, select the hamburger menu at the upper right and click Print.
Images can be added to a report only while the # Triage Pictures job is running.
However, if you select Collect File Contents in the File Processor wizard, image
data in the LEF can be added to reports from EnCase.
Clicking an entry in the Parent Process ID column, which contains process IDs for
each parent process instance, displays all running instances of the process. This
filters the report to display matching process IDs, only, which allows you to trace
that process to its source. For example, instead of displaying only the type of
process, such as explorer.exe, clicking an entry in the Parent Process ID column
displays information on all instances of explorer.exe. Similarly, clicking a number in
the Children Processes column displays detailed information for all the children
processes associated with the process instance.
Snapshot Reports also display both port information and its relationships to process
instances and DLLs, so you can determine which DLLs are active as well as which
process instance loaded each DLL.
Some Snapshot Reports combine information from other reports to make the
workflow more efficient. Under Operating System > DLLs, the DLLs by Process
DetailsReport combines all the information in the DLLs Report and the Processes
Report. Under Network, the Open Ports by DLL Report combines all the
information in the DLLs Report, the Processes Report, and the Open Ports Report.
Under Operating System > Processes, the Processes report combines all the
information in the DLLs Report and the Open Ports Report.
Each Snapshot Report also has an About option which shows details for each report.
DLLs by Process Details: Instance Name, Parent Process ID, Open Ports, and
Children Processes.
Open Ports by DLL: Instance Name, Parent Process ID, and Children Processes.
Processes: Instance Name, Parent Process ID, Open Ports, Children Processes, and
DLL Count.
Children Processes are the processes that were spawned by a parent process. For
example, some malware spawns many other processes. Viewing a malware parent
process shows how many processes it created. This count is displayed as a link to
the child processes.
Open Ports are ports that have been opened by a process to communicate over the
network. These include both local and remote ports.
DLL (Dynamic-linked library) Counts are used by many programs to share code.
Malware can inject a malicious dll and a program will execute it without realizing it
is malicious code. The DLL Count is the number of dlls that a specific program is
using.
• Using the Column options on the left, hide or show columns to suit your
requirements.
• With Module List exports the report with the modules displayed by name
in a single column.
• Job Table (default) exports the report with the rows and columns in the
same orientation as displayed in the tab. This results in a wider report.
• Job List exports the report with the rows and columns transposed from the
way they are displayed in the tab. This results in a taller report.
5. Select your file format.
6. If enabled, select Wrap table to export the columns at full width. If cleared, the
contents within the columns will wrap and the columns will be compressed so
the table fits on one page.
7. Click OK. The report outputs to the designated report path.
16.4 Maintenance
The following section contains topics on portable device maintenance, including
preparing portable devices and storage, modifying EnCase portable device
configuration, and preparing additional USB storage devices.
1. Select Tools > Create Portable Device. The Portable Management screen is
displayed.
2. Select a device and click Configure Device. A status screen displays the updates
to the device as they are being executed.
3. When done, click Finished. The device is labeled with the currently installed
version.
• Allow Job Configuration at Runtime enables the user to create and edit jobs
in the field, using the Portable device. By default, this option is enabled.
• Display East Asian Characters enables the display of Unicode character
sets, specifically for East Asian language support.
Note: If there is a bullet in the Needs Upgrade column, the device needs to
be restored.
4. Select one or more devices and click Prepare. A dialog shows the status of the
task. When complete, this dialog confirms the creation of the EnCase Portable
Evidence folder on the storage device.
5. The Prepared column displays a dot when the process is complete.
• EnCase Portable must be used on a target computer that has routable network
access to License Manager.
• The EnCase Portable EnLicense must be stored in at least one of the following
places to work with License Manager:
2. Select the drive to configure and click Configure Device. The Configure Device
dialog is displayed.
3. Select the NAS check box, then click Options. The NAS Settings dialog is
displayed.
• User Key Path specifies the location of the NAS key file.
• Server Key Path specifies the location of the SAFE public key file.
4. Click OK. The prepared USB device can now run as a Portable device.
16.6 Troubleshooting
My job hangs.
Some jobs may take long periods of time to execute. If the progress bar is moving
occasionally, the job is still running.
If the license on the Portable device has expired or is damaged, EnCase Portable will
not load and run. Instead, EnCase (Acquisition Mode) is displayed in minimized
form in the corner of your desktop.
Maximize EnCase and check the title at the top. If it displays EnCase Acquisition, the
dongle and/or license must be extended or replaced.
When trying to restore Portable I get a message that the device is in use.
If you are sure the Portable device is not in use, but consistently get a message that
the device is busy:
2. Close EnCase.
If you have just restored the image to your Portable device, unplug the device from
your system and then plug it back in again. If the device still does not appear, the
boot image may have been truncated during the restore process.
The sector size of the restore image and the destination drives must match exactly,
or the destination drive must be larger. If the destination drive is even a few sectors
smaller than the .E01 restore image, a warning dialog is displayed before the restore
starts. If you choose to continue, the restore process is shown as successful even
though the target drive image is truncated and data is potentially lost. We
recommend using a destination drive that is at least 4GB in size.
You should go back through the restore process and make sure the EnCase Portable
image has been correctly restored to the physical storage device.
To troubleshoot this issue, first confirm your credentials are correct and your
EnCase version is 32–bit. SafeBoot does not work with 64-bit versions of EnCase.
Next, make sure that you have the correct files in the correct locations.
File/Folder Name
sbAlgs folder [blank]
sbTokens folder
SafeBoot Tool folder
SbAdmDll.dll
SbComms.dll
SbDbMgr.dll
SbErrors.xml
SbFileObj.dll
SbGroupObj.dll
SbMachineObj.dll
SbUiLib.dll
SbUserObj.dll
SbXferDb.dll
SafeBoot Tool\GetKey Offline.xml
SafeBoot Tool\GetKey.xml
File/Folder Name
SafeBoot Tool\SafeBootTool V5.exe
sbTokens\SbTokenPwd.dll
Also, the following files must be copied from your company's SafeBoot server and
copied to your local folder structure:
In Portable Management, a bullet in the Needs Upgrade column indicates that the
device needs to be restored.
How does EnCase Portable determine what device to use for storage?
After a job finishes, files created from that collection are stored in a predefined
location on a configured EnCase Portable storage device. During initialization,
EnCase Portable determines the storage location by:
If the only device found is the Portable device, that device is used for storage.
Unless you are collecting logical or physical images of an entire device, information
is collected into logical evidence files (LEFs). In addition to creating LEFs, a SQLite
database is also created.
When a collection job is run using the File Processor module and the metadata
processing type, two LEFs are created. One of the LEFs contains the collected files
and is designed to be brought into EnCase so that you can process or view the
collected files. The second LEF does not contain any file data, but simply contains
meta-information and metrics about the data that was processed and collected. This
LEF is not designed to be added to a case in EnCase, but is used by EnCase to
generate reports.
Yes. Evidence files are created when you acquire an entire physical or logical device.
This can be done by using the default imaging job supplied with EnCase Portable
(#Create Copy of Drive or Memory) or by creating your own job and selecting the
Collection\Acquisition module.
• Files that contain the actual evidence files that have been collected. These files
have either an .Lx01/.L01 or .Ex01/.E01 extension and can be mounted and used
in EnCase. They are stored during EnCase Portable collection in ..\EnCase
Portable Evidence\.
• Files that contain summary data about collected information and are used for
analysis. These files have an .L01 extension and contain metadata about the
collected files. They do not contain the actual evidence files themselves. These
files are stored during EnCase Portable collection in ..\EnCase Portable
Evidence\ModuleEvidence.
Each specific target has its own logical evidence file (or LEF), with the name of the
target reflected in the name of the logical evidence file. If a target's LEF is already in
the storage folder when a new collection is started, you have the option to overwrite
the previous data.
The Module Evidence and the File Evidence folders contain folders for each
collection job that has been run.
Where are evidence files stored when I import them into EnCase?
LEF files created by EnCase Portable are imported by opening the Evidence tab in
Portable Management and selecting evidence to be copied to case folders. By
default, the LEFs are stored in the %\portable evidence path located in case paths
for the open case. The LEFs containing file data can be added directly into EnCase
by selecting the check box option.
If you choose to add LEFs to EnCase directly from the storage folder, please note
that when EnCase Portable collects data, it can collect files (such as when the File
Collector module is used) or it can collect parsed data (such as when the Internet
Artifacts module is used). To make it easier to conduct examinations, files are stored
separately from parsed data. LEFs containing file data can be identified by the
words “Collected Files” in the name of the LEF. It is only these LEFs that can be
added to and examined with EnCase.
LEFs that contain parsed data are designed to be analyzed in Portable Management
and do not have Collected Files in the file name. If you attempt to add these files into
EnCase, the collected information will not be viewable.
What files are copied to the EnCase Portable device during exporting?
The following items are copied to the Portable device during the export process:
• EnCase.exe
Note: While the desktop client is a 64-bit version of EnCase by default, a 32-
bit version of EnCase is used for EnCase Portable.
• EnCase Portable config files (to \EnCase Portable\Storage)
• EnCase Portable EnScript (to \EnCase Portable\EnScript)
• EnCase config files (to \EnCase Portable\Config (FileTypes.ini and
FileSignatures.ini))
Yes. The 64–bit version of EnCase (installed by default by most users) is compatible
with EnCase Portable (which is 32–bit). Creating EnCase Portable includes files
needed for licensing as well as 32–bit decryption DLLs.
EnCase Portable supports Linux-based machines, unless they are using logical
volume management (LVM). Any machine with an OS that uses LVM should be
able to be acquired and analyzed by the full version of EnCase Endpoint
Investigator.
When using the File Processor module and the metadata processing type on a
running machine, does EnCase mount logical or physical devices for
analysis?
EnCase Portable mounts the logical device when used on a running machine.
How are domain visits counted? By summing history entries, cache entries,
both?
How are daily and weekly records for Internet Explorer handled?
In the analysis table report, you do not see the history grouped into daily and
weekly folders as IE and EnCase. Instead, you start with high level domain visits
and drill into the individual entries by navigating from there.
My numbers seem way off. Shouldn't the column be called hits instead of
visits?
Visits are pulled from the cache file directly, and to prevent confusion, the name is
not changed.
Which GREP expressions are being used to perform card, e-mail, and SSN
searches?
Visa-13 [4][#]{12,12}
Visa-16 [4][#][#][#][^#]?[#]{4,4}[^#]?[#]{4,4}[^#]?[#]{4,4}
MasterCard [5][1-5][#][#][^#]?[#]{4,4}[^#]?[#]{4,4}[^#]?[#]{4,4}
American Express [3][47][#][^#]?[#]{7,7}[^#]?[#]{5,5}
Discover [6](([0][1][1])|([5][#][#]))[^#]?[#]{4,4}[^#]?[#]{4,4}[^#]?[#]{4,4}
Email [a-z0-9\~\_\.\x2D]+@[a-z0-9\_\x2D]+\.[a-z0-9\_\x2D\.]+
SSN ###[\x2D]?##[\x2D]?####
Phone with Area [(][#]{3,3}[)] ?[#]{3,3}[ \x2D][#]{4,4}
Code
Phone without Area ###[\.\x2D]####
Code
Since you can run EnCase Portable without an external storage drive, the only place
to store this data without compromising the system being investigated is on the
EnCase Portable drive itself. Thus the EnCase Portable drive is always write
enabled.
Also note that the operating system runs entirely in memory (in a RAM drive);
therefore, changes made to the running environment do not affect the environment
on disk.
The final phase of a forensic examination is reporting the findings, which should be
well organized and presented in a format that the target audience understands.
EnCase adds several enhancements to its reporting capabilities, including:
• Bookmark folders where references to specific items and notes are stored.
• Report templates that hold formatting, layout, and style information. A report
template links to bookmark folders to populate content into a report.
• Case information items, where you can define case-specific variables to be used
throughout the report.
• Documents
• Pictures
• Email
• Internet Artifacts
1. Select the content you want from any tab (for example, Entries, Artifacts, or
Search Results) and click Bookmark on the tab toolbar.
2. From the dropdown menu, select the type of bookmark you want to create,
enter a name and optional comment, and click OK.
This report creates a fully linked HTML report from bookmark folders you create.
Each bookmark folder is a separate report section linked together by a table of
contents. Each report section can have an associated custom format or be formatted
automatically. Each bookmarked item by default includes a separate item report
including comprehensive data for that item.
You can customize this report with your own logo, and add external links within the
report. All customization can be done using an HTML editor.
When done, this report can easily be distributed on a CD or USB drive and is
compatible with most browsers. This enables evidence to be easily shared across
teams, so that the most relevant information can be discovered and acted upon
quickly.
To share your report, navigate to its export location and copy the Triage Report
folder, index.html, and Triage.Report.html files to a USB drive or CD.
You can access the Triage Report dialog from multiple locations:
• EnCase application toolbar, by clicking View > Triage Report or > EnScripts >
Triage Report.
• case home page, by clicking Browse > EnScripts > Triage Report or Report >
Triage Report.
• Full Investigation and Preview and Triage pathways, by clickingCreate a report
for your case > Create an HTML Triage Report.
• The Case Information link which draws the data from case information items tab
in EnCase.
• The logo item which is used to hold the location for a custom logo.
The Name column shows the text that will be placed on the left pane for the link.
The Link column is used to designate the file path of the file to be linked.
If AutoCopy is selected, the linked file will be copied automatically into the export
path for the Triage report. This can only be used if the linked file is a single file (i.e.
PDF or Word doc, Excel spreadsheet). If the AutoCopy is not selected, you must
copy the file or files into the export location before setting the Link field. For
example, if you are trying to link in a HTML report which consists of multiple files,
the files will have to be manually copied into the export location.
The Format field designates what information is included in that section of the
report. The format can be changed by clicking Autoand selecting a different format
form the popup box. In the popup:
• The Auto format selection attempts to use the most appropriate data for each of
the bookmarked items.
• Selecting External Link allows you to set the link on the left side of the screen to
an alternate file. If External Link is selected, that report section will not be
created. You must manually copy the linked file(s) to the export location before
the link is created.
The NoExport check box stops the exporting of the bookmarked files for that section
of the report. Individual files and bookmarks can also be prevented from being
exported or included in the report by using the No Export and No Report options
from the Bookmarks tab.
The No TOC (No table of contents) check box removes that section of the report
from the table of contents, but the section is still created and a link is created in the
parent report section.
The Include in Parent check box includes the selected report section within the
parent report section. This can be used to create a single report section based on
different formats. If you select Include in Parent on all bookmark folders, the report
will be displayed in a flat form. The HTML links on the left side of the final report
will jump the viewer to the respective sections.
Click Make Single Bookmark Report on the menu bar to recreate only the current
report section. This was designed so you would not have to recreate the entire report
when only one section has been changed. This will not recreate the table of contents.
17.2.2 Options
The options button provides you with ways to change the behavior of the Triage
report.
• * = default
17.2.3.2 Tags
• FIELD= property name. (the word FIELD is not needed) Multiple fields can be
place in a single cell, separate with a “|”
• LINK= Defines a hyperlink for the cell. *Auto is a hyperlink to the exported file
for the Name property.
• LINK=*AUTO, NONE, FILE,PDF,REPORT,REPORT_HTML,REPORT_PDF,
FOLDER
• ALIGN= *1 = left, 0 = center, -1 = right
• HEADER= Alternate cell title, replaces field name.
• ICON= Draws an EnScript icon in the cell
• REPORT,PRINT, etc...
• COLOR= color value in hex or enscript color const - #000066, BLUE
• SIZE= [THUMBNAIL pixels = ], [PREVIEW length=100] (not complete)!
• SHOW= BOTH, REPORTONLY (not complete)!
Besides the default templates, you can define your own custom reports and save
them as part of a case template. For more information, see “Creating a new case”
on page 118.
• Report sections: groups of similar information and formatting that provide the
ability to organize your report.
• Report formatting: page layout, section design, and text styles.
• Report elements: collections of bookmarks. Bookmarks are a key element of the
report structure. You do not embed bookmarks into a report template, but embed
a reference to the contents of a bookmark folder.
To display the template, click Report Templates on the Case home page.
1. Highlight the row above the new element you want to add. Right-click and
select New from the dropdown menu.
3. Enter a Name.
6. Click OK. The new template component is displayed below the row you
highlighted.
• Section Name: Used for organizational reference in the template only and does
not populate the report.
• Paper: Includes orientation and size.
• Margins: Set values for top, bottom, left, and right margins.
• Header/Footer: Specifies a header and/or footer.
• Data Formats: Specifies how a bookmark is displayed, including style and
content.
• Section Body Text: Specifies the layout and content of each section in the Body
Text.
• Show Tab: Determines if this report or section is displayed in the View Report
dropdown menu.
• Excluded: Provides the ability to exclude part of a report.
1. Right-click the Paper column, then click Edit in the dropdown menu. The Paper
layout dialog opens.
2. Click a paper size option. This includes options for millimeters or inches.
3. The default orientation is Portrait. Select the Landscape check box to change the
orientation.
4. Click User defined to enable the Page Width and Page Height boxes, where
you can specify dimensions manually.
Margins
1. Right-click the Margins column, then click Edit in the dropdown menu. The
Margins dialog opens.
2. Enter the margins you want in inches. By default, the top margin is 1 inch, the
left margin is 0.75 inches, and the right and bottom margins are 0.5 inches.
All reports in EnCase obtain their paper settings from the Windows operating
system. Windows stores paper size in the Default Printer settings, so unless a
specific paper size is defined in a report template (Paper option), EnCase uses the
paper size indicated there.
When reports are generated, margins are set for the indicated paper size and the
report is rendered in that composition. Users should utilize the ability to set tab
stops relative to a specific margin (described above) to ensure that tab stops also
scale properly with the different paper variations. Report templates supplied with
EnCase are configured in this manner.
1. Right-click the Header or Footer column, then click Edit in the dropdown
menu. The appropriate dialog opens.
2. Formatting options (Document, Styles, Case Info Items, etc.) display at the top
of the dialog.
• Double-click Font to open the Font dialog, where you can specify:
– Font face
– Font style (Regular, Italic, Bold, Bold Italic)
– Size
– Effects (Strikeout, Underline)
– Color
• In the Alignment box, choose how you want the text to align relative to the
tab. Choices are Left (left side of the text block is aligned with the tab stop),
Center (text is centered in relation to the tab) or Right (right side of the text
block is aligned with the tab stop).
• Set the Position for the tab stop in Inches.
• In the Relative box, set the margin that the tab stop should be relative to.
Choose Left to position the tab stop a set distance to the right of the left
Note: The ability to set the relative position of the tab enables users to
create a report template that you can use with various paper sizes (that is,
letter, landscape, A4, etc.) and various orientations (portrait or landscape)
without having to reset the margins for the various page widths. Default
templates supplied with EnCase are configured in this manner so they can
be used in different locales without requiring significant modifications.
8. When you finish, click OK. The new style and its attributes display in the User
Styles list.
You can customize reports by specifying which fields to add to the report template.
You can choose to include the value in the field as well as the name of the field.
Then, when you generate a report, EnCase includes both specified fields and the
content with which they are populated, in the specified area of the report.
All entry, artifact and item (bookmark) fields can be added to report templates.
Multi-value fields, such as file extents and permissions, have two options for
inclusion: cell and table. Adding the cell data displays the value of the field as
displayed within the Entry table view. Adding the table data displays the value of
the field as displayed in the Details tab.
2. The Edit dialog is displayed. Select the Body Text tab, then place your cursor
where you want to insert the picture in the Report Object Code.
3. Click Picture.
4. The Picture dialog is displayed. In the Picture dialog, browse to the file you
want to insert, specify a size (width and height in inches), then click OK.
• On the Columns tab, select the check boxes for the columns you want to
display.
• On the View Options tab, select the check boxes for the visual elements you
want to display. The tabs and options vary depending on the selection you
make from the Add Table list in step 3.
5. When you finish, click OK.
• Document
• Styles
• Case Info Items
• Case
• Bookmark Folder
• Add Table
• Picture
• Language
• Text
To test if the code is well-formed, click Compile. To return to the last compilable
code, click Revert.
Note: Unless you have experience writing and editing code, we recommend
using default code in the report templates.
The following examples assume that a bookmark folder structure exists and items
have been added to the bookmark folders. The examples include both menu based
customization and the use of ROC to modify reports.
17.3.3.2 Editing the report template to include the item path in reports
The following sections describe how to include the item path in reports based on
documents and Internet artifacts.
1. Bookmark your file to the required folder in your bookmark folder structure as
a single item. If you have more than one item to bookmark, use Bookmark >
Selected items. This example bookmarks relevant Documents into the
Documents Folder.
2. Open Report Templates from the case home page or select View> Report
Templates. Since the item to bookmark is in the Documents folder, this
example shows how to edit the Documents Report Section to include the Item
Path.
3. In the Edit Documents window, select the Formats tab. Select Notable File>
Edit. Make sure the blinking cursor is positioned correctly, as the Item Path
Field is added here. This example shows the blinking cursor after the
fieldname(field=Accessed) tab cell (field=Accessed) par statement.
4. Drill down in the Item Field menu and select Item Path. fieldname(field=
ItemPath) tab cell(field=ItemPath) displays on the last line. Adding par
adds a line break in the report.
6. View your report. The Item Paths are added to the Document section of the
report.
1. Bookmark your file to the required folder in your bookmark folder structure as
a single item. If you have more than one item to bookmark, use Bookmark >
Selected items.
2. Open Report Templates from the case home page or select View > Report
Templates. Since the item to bookmark is in the Internet Artifacts Folder, edit
the Internet Artifacts Report Section to include the Item Paths.
3. In the Edit Internet Artifacts window, select the Formats tab. Select Record >
Edit. (Internet artifacts are Record data types.) Make sure the cursor is
positioned correctly, as the Item Path Field is added here. This example
positions the cursor after the record () par statement.
4. Drill down in the Item Field menu and select Item Path. fieldname(field=
ItemPath) tab cell(field=ItemPath) displays on the last line. Adding par
adds a line break in the report.
6. View the report. The Item Paths are added to the Internet Artifact section of the
report.
Other than defining the specific report section to modify, the only difference in
adding the Item Path field to the report is the category to be formatted. When
adding Item Path to documents, the format category Notable File is being modified.
When adding Item Path to Internet Artifacts, the format category Record is
modified.
1. Bookmark your file to the required folder in your bookmark folder structure as
a single item. If you have more than one item to bookmark, use Bookmark >
Selected items. This example demonstrates bookmarking relevant Email into
the Email Folder.
2. After bookmarking your entry, open the Bookmarks tab and locate the file.
Add comments to your files by editing the Comment field. The comments
made here are displayed in your report.
3. Click the Report Templates tab from the case home page or select View >
Report Templates. Since the item to bookmark is in the Email folder, edit the
Email report section to include Comments.
4. In the Edit Emails window, select the Formats tab. Select Email> Edit. Make
sure the cursor is positioned correctly, as the Comment field is added here. In
this example, the cursor is positioned after the email () par statement.
5. Drill down in the Item Field menu and select Comment. fieldname(field=
Comment) tab cell(field=Comment) is displayed on the last line. Adding par
adds a vertical line spacing on the report.
7. View your report. Comments are added to the Email section of the report.
We recommend that if you want to modify a report template or create your own,
first refer to one of the supplied templates and read the examples in the following
sections to see how ROC is structured and used.
Example: hline(height=x)
Example: lang(x)
Example: image(path="C:\\Users\\user.name\\Pictures\
\EnCase_big.bmp", width=760, height=400)
width and height are numbers that express the width and height of
the image in twips
hyperlink Inserts a hyperlink to a web location.
Example: hyperlink("http://www.link.com") {
text("Hyperlink") }
Example: list(path="Examination\\Report\\Introduction",
options="RECURSIVE, SHOWFOLDERS")
options:
• RECURSIVE: Display all items within all subfolders in that folder.
• SHOWFOLDERS: Display the folder name before displaying the
contents of a subfolder
• If you select no options, only the bookmarked items in the
specified folder display.
table Displays a table of items of the specified type.
options:
• SHOWTABLE: Display the items in a table where each item has
one row, and the fields are displayed in columns.
• SHOWBORDER: Display a border on the table.
• SHOWHEADER: Display column names in a header row.
• SHOWICONS: Display the icon associated with the name field.
• SHOWROWS: Display the number of each row.
• SHOWALL: Combine all display options.
Valid types for use in body text and formats: LogRecord, Bookmark,
Evidence, CaseInfo.
options:
• PAR: Add paragraph only if text exists.
options:
• PAR: Add paragraph only if text exists.
data Inserts the contents of a Table view bookmark.
data()
folder()
image(width=1440, height=1440)
Example: counter(<name>)
1. On the Bookmarks tab, click Reports, then click Add folder to report from the
dropdown menu.
4. Click Next. The second Add folder to report dialog is displayed. It enables you
to apply commonly used formatting to the report. When you select a Report
section formatting check box, the wizard generates Report Object Code
automatically.
5. Click Preview to see how the formatting will display in the report.
6. To add metadata, click Customize metadata. The Customize metadata dialog is
displayed.
• In the Metadata fields pane on the left, click the field you want to work with
(Item fields, Entry fields, Common email fields, Record fields).
• In the Name pane in the middle, click the name of a metadata type you want
to add to the report, then click the double right arrow button (>>) to add it to
the Display order list.
– Note that as you add metadata items to the Display order list, the
preview pane updates dynamically to reflect your choices.
• To change the order, click the item in the Display order list you want to
change, then click the Up or Down button. Repeat as necessary to get the
order you want.
• To remove an item from the Display order list, click it, then click the double
left arrow button (<<).
You can view the Report Object Code that the Report Template Wizard added to the
template.
1. On the Bookmarks tab, click Reports > View Report, then click the report you
want to view.
2. The report is displayed. Select the Hide empty sections check box. Any empty
sections no longer display in the report.
1. In Report Templates view, check the part of the report where you want the
bookmarks to display, then click the Body Text tab in the lower pane.
2. In the Add Table dropdown menu, click Bookmark Folder.
3. The Bookmark dialog is displayed.
4. In the Destination Folder tab, select the folder where you want the table to be
saved and enter a folder name.
5. In the Columns tab, select the check boxes for the columns you want to display
in the table.
6. In the View Options tab, select the check boxes for the options you want. Be
sure to select the Hyperlink to files check box.
7. Click OK. The bookmarks display as hyperlinks in the table in the report.
1. Right-click, then click Save As from the dropdown menu. The Save As dialog is
displayed.
2. For the Output Format, select RTF, HTML, or PDF, then select the Export items
check box.
Note: The Export items check box is disabled for the other formats.
3. Accept the default path or enter another path. If you want to view the exported
report after saving, click the Open file check box.
1. In the Evidence tab, select the item you want to display as a hyperlink in the
report.
3. Right-click and select Save As from the dropdown menu. The Save As dialog is
displayed.
4. Select the Output Format you want. The supported formats are RTF, HTML,
and PDF.
5. Click the Export items check box. If you want to view the report after saving,
click the Open file check box.
6. Accept the default path, or enter a path of your own, then click OK.
1. Go to Report Templates view. Select the part of the report where you want to
add a hyperlink, then click the Body Text tab in the lower pane to display the
text.
2. Place the cursor where you want to insert the hyperlink, then click Hyperlink in
the Document dropdown menu.
• Report name
• Examiner
• Grouping results
• All files or specified files
• Display fields
2. In the Report Title field, enter the name of the report. The default report title
format is [Case Name] - File Report.
3. In the Report Prepared By field, enter the name of the examiner. The default
examiner name is drawn from the specified examiner in Case Info.
4. On the left side of the dialog, specify how you want to group your report.
• File Path sorts files by the file system's location of each file, sorted according
to Item Path.
• File Size sorts files according to size in Kilobytes.
• File Category sorts files alphabetically, according to file category. To sort by
the three-character file extension within a category, click the Sort by
Extension check box.
5. On the right side of the dialog, specify whether to include all files, only files in
the current view, and/or files created within a specified range. To specify a
creation date range:
6. At the bottom of the dialog, use the field selector to include/exclude and order
the fields for your report.
• In the Available fields box on the left, select any field you want to include in
your report and click the right arrow.
• In the Selected fields box on the right, select any field you want to exclude
from your report and click the left arrow.
7. To order the selected fields for your report, select each field and move it with
the Up or Down buttons.
8. Click OK. The File Report EnScript generates the file report, and it is displayed
in the File Report window.
3. Specify a path for the output. To browse your file system, click the ellipsis
button.
4. To open the report in the selected output format, select the Open file check box.
5. Click OK. If you selected the Open file check box, the file opens in the selected
output format.
1. In the Report Templates tab, click View Report from the tab toolbar. The
dropdown menu lists all reports that have the Show Tab option set.
2. Select the report you want to see. The report is displayed in the viewer.
• TEXT
• RTF
• HTML
• XML
• PDF
Once you select the output format, specify a Path and optionally set the Open file
option if you want the file to open in the default application after saving.
Note: To edit a report in Microsoft Word, save the report in RTF format. The
EnCase RTF report is fully compatible with Microsoft Word.
Acquired or imported mobile data is saved as an EnCase Logical Evidence File in the
folder you specify in the Output File Settings.
Before beginning acquisition on a mobile device, you will need to download and
install the Mobile Driver Pack from OpenText My Support.
Note: If you are running Windows 7, you will need to install two security
updates before you can install the Mobile Driver Pack. Windows 7 needs to be
upgraded to SP1 before installing the security updates.
Note: If you are running Windows 7, you will need to install two security
updates before you can install the Mobile Driver Pack. Windows 7 needs to be
upgraded to SP1 before installing the security updates.
1. Download the Mobile Driver Pack for the corresponding version of EnCase
Endpoint Investigator you are using.
3. Click Next.
5. On the Customize Setup screen, leave Drivers and Tools set to Will be installed
on the local hard drive. Click Next.
6. Click Install.
During the Logical Acquisition Process, the program uses the commands and
protocols that allow you to work with the device using its own OS. This means that
each device has some commands that allow it to exchange data with the PC by the
means of some simple protocols (for example, the AT protocol).
Due to this, you can acquire only data designed by the OS to be passed using the
protocol. But the main part of the data will be completely parsed and shown in a
readable format.
During the Physical Acquisition Process, the program doesn't use commands of the
device’s OS. Usually, a special program is written into the device memory (into a
part where data is not stored). A complete memory image is acquired and all data is
extracted from it if possible.
In this case, the data is usually not parsed but the required information can be found
in it anyway.
Note: During acquisition, the data on the device cannot be damaged or lost
and its structure and content do not change.
There are three options for acquiring data from cloud sources:
• Acquire via Add Evidence > Email. Microsoft Exchange and Google Gmail are
supported. On-premises acquisitions are also supported for Microsoft Exchange.
See Acquiring from Microsoft Exchange and Acquiring from Google Gmail.
• Acquire via Add Evidence > Storage. Several storage platforms are supported.
On-premises acquisitions are supported for Microsoft SharePoint. See Microsoft
SharePoint, Microsoft Teams, Amazon S3, Dropbox, Box, Google Drive, Azure
Blob, Instagram, and Twitter.
• Acquire via Add Evidence > Social Media using the Cloud Data Import Wizard.
See Importing cloud data.
Data parsing is usually done automatically for any type of data that can be parsed.
Note: Not all types of data can be parsed and not all plug-ins contain parsers.
For more information, see the description of each plug-in.
EnCase Endpoint Investigator can acquire data from the apps in the following table.
Once acquired, another application, like EnCase Mobile Investigator, would be used
to parse and analyze the data.
DJI Go
Dolphin
browser
Dolphin X
browser
Evernote
Facebook
Messenger
(iOS 7.x and
higher)
Firefox
Fitbit
Gmail
Google Maps
Google Drive
iCloud
Backup*
Jott
Messenger
KIK
Mail.ru
Opera
Opera Touch
Pinger
Skype
Snapchat
Telegram
TextFree
TextPlus
TigerConnect
TikTok
Tinder
Viber
Vkontakte
VoiceMail
Waze
Whisper
Note: iCloud Backup is not a parsed application but is included here because it
is accessed via the Cloud Data Import Wizard.
For most plug-ins, data acquisition is performed using the standard process and
does not include any additional interaction with the devices. For some plug-ins,
however, the acquisition process requires some additional steps.
The data acquisition process differs from the general process for the following types
of devices:
It is highly recommended that you read the instructions for each of these devices
before you start acquisition.
There are two methods of device detection: automatic detection and manual plug-
in selection.
1. Preparation Step: Prepare the device for working with the program.
We recommend the following:
• Check whether the device is charged in order to prevent power loss during
the acquisition process.
2. Selection Step: Go to Add Evidence > Acquire > Mobile Device to start the
Acquisition Wizard, which will guide you through the process of acquisition.
The following items must be selected:
– The manufacturer and type of acquisition (see the list of acquired data for
the corresponding device for the differences between the amount and
type of data acquired with the logical and physical acquisition methods).
– The model of your device (most of the plug-ins allow the program to
detect the model automatically).
– Type of connection (the port to which the device is connected).
3. Instructions Step: You can read special acquisition instructions if they are
available for the selected device.
4. Acquisition Step: The program acquires information from the device. In some
cases, you might need to perform more actions with the device, such as pressing
special buttons on it or entering special information. The process of acquiring
the device features is displayed in the progress table.
5. Final Step: Acquisition finishes, and you can disconnect your device from the
computer.
There can be certain specifics about acquisition of different types of devices. For
more information, see the description of data acquisition of the type of device you
want to acquire.
Note: The application allows you to work with other data in the case during
the acquisition. You can add, view, and process other evidence in the case
while the device is being acquired.
Note: If you use the dongle version of the program, shut down the
program and unplug your dongle before installing the drivers. Please note
that installing drivers without unplugging the dongle can damage it.
4. In EnCase Endpoint Investigator, select Add Evidence > Acquire > Mobile
Device.
On the Acquisition Wizard > Welcome page, an icon representing your device
will be displayed.
5. Click the icon of your device. If your device is not displayed, click the
troubleshooting link in the bottom of the page.
6. On the Acquisition Type page, select the type of acquisition you would like to
perform.
Note: The application allows you to work with other data in the case
during the acquisition. You can add, view, and process other evidence in
the case while the device is being acquired.
Note: Samsung and Siemens cell phones must be turned off before
performing physical acquisition.
3. Connect the device to the computer with a data cable. If a USB connection is
used, check that the proper drivers are installed.
Note: If you use the dongle version of the program, shut down the
program and unplug your dongle before installing the drivers. Please note
that installing drivers without unplugging the dongle can damage it.
5. On the Acquisition Wizard > Welcome page, click Manual plug-in selection.
6. On the Plug-in Selection page, select the plug-in corresponding to the device
manufacturer and the type of acquisition you want to perform, and click
Continue.
7. On the Connection Selection page, select the port to which the device is
connected. Click Start Acquisition.
Note: For some device types, like Samsung GSM, Siemens, and Psion
16/32-bit devices, you will need to select a model of the device.
Data acquisition starts, and its process is displayed on the Acquisition Progress
page. On this page, you can see which features have been successfully acquired
and which features have not and why.
Note: The application allows you to work with other data in the case
during the acquisition. You can add, view, and process other evidence in
the case while the device is being acquired.
Note: The data acquisition process will be different for some devices. For
more information, see the description of data acquisition of the type of
device you want to acquire.
Note: The custom name will be displayed in the header of the corresponding
Acquisition Wizard.
To rename a device:
1. In the Acquisition Wizard, right-click the device name you want to change, and
select Rename Device.
2. In the Device Name window, enter a custom name of the device and click OK.
The custom name is assigned.
The application allows you to acquire information from iPhones, iPods, iPads, and
iPod Touches.
Note: For devices running iOS 7 and later, a message that reads Do you trust
this computer? appears on the device when it is plugged into a computer. Tap
Trust to establish a trusted connection before beginning acquisition.
Note: If the OpenSSH package is not installed on the device, the acquisition
process will be terminated.
3. Click Install.
If your device is non-jailbroken, you need to put it into Device Firmware Upgrade
(DFU) mode before acquisition. DFU mode allows all devices to be restored from
any state. Please note that no data will be damaged or lost after putting the device
into DFU mode.
Note: Devices running iOS 8.4 may be acquired only after being jailbroken via
the TaiG jailbreak. For more information, visit http://www.taig.com/en/.
4. Hold the Home button without releasing the Power button for 10 seconds.
5. Release the Power button, but keep holding the Home button.
6. Keep holding the Home button until your device screen becomes completely
blank (for about 15 seconds). Please note, if a device in the DFU mode is being
connected to the PC for the first time, the driver installation will automatically
start.
7. Make sure the device screen is blank and no logos are present.
8. When acquisition finishes, exit the DFU mode on your device. To do this, hold
the Home and Power buttons until the Apple Logo appears.
• Parsed data
• Deleted parsed data in binary files (including Address Book, Calendar, Call
History, iMessages, Network Connection, Email messages, Notes, Safari
Bookmarks, Messages, and SMS Search)
• File system in binary files
• Device properties
• Backups to iOS 16.x
Note: Device properties are acquired only from devices with iOS 5.x and
higher.
Usually, the amount of acquired data depends on the model and state of the phone.
Note: The file system is acquired only partially, e.g., it does not contain system
files of the iPhone.
Messages
Voice memos
Cookies
Authentication data
Passwords
Call history
iMessages*
Calendar
Notes
Maps bookmarks
Maps history
Maps directions
Mac address
Installed applications
Email messages
Safari tabs
Safari history
YouTube bookmarks
Dynamic text
WiFi locations
Cell locations
Mail accounts
Filesystem Partial
Application data
Safari history
Safari bookmarks
Notes
Calendar
Call history
Contacts
Contacts properties
Messages
WiFi locations
Voicemail
Cell locations
Other Data
Device properties
* There are known issues with the group chats in the iOS 16 (see https://
discussions.apple.com/welcome for details). They might cause group chats being
incorrectly displayed after acquisition (for example, incorrect chat ID, data displayed
as belonging to an individual chat not a group one, etc.). All these data
misinterpretations correspond to how data is displayed on the device. Once the
issue with the group chats is resolved by Apple, data will be correctly displayed.
** iOS 13.x, 14.x and 15.x parsed recovered data are available only if the device is
acquired using iPhone/iPad/iPod Touch (physical) plug-in.
Note: For iOS 8.x and higher devices, two grids may be present:
Call History 1.x–7.x (call history from before the update to 8.x)
and Call History 8.x (call history after the update to 8.x;
sometimes it may include the call history from before the
update).
iMessages A grid containing the fields
• User Account
• Type
• Text
• Date Sent
• Date Created/Received
• Contact
• Date Read
• Is Deleted
• Date Deleted
• Is Recalled
• Is Edited Version
• Date Edited
• Attachments
Note: For devices with iOS 8.x parsing of notes is not fully
supported in the current version of EnCase.
Safari Tabs (for iOS This grid provides the following information:
15 and higher)
• ID
• Group
• Title
• URL
• Is Favorite
• Last Visit Time
• Order Index
• Is Pinned
Passwords This type of data contains several grids with passwords and
password related data.
Each grid may contain the following fields:
• Service Name
• Account
• Password (or Data)
• Access Group
• Type
• Description
• Comment
• Labels
• Tags
• Creation Date
• Modification Date
• Source File
Address Book A folder containing images used as contact photos on the device.
images
• Jott Messenger
• Kik (Kik Messenger)
• LinkedIn
• MailRu (Mail.ru)
• Skype
• TigerConnect
• TikTok (If available, data from multiple user accounts is parsed.
When multiple accounts data is parsed, the Published Videos data
is absent and the Activity Timeline data is common for all user
accounts.)
Note: For Parsed Recovered Data, fields in any data type may contain an N/A
value if corresponding data was not parsed. This might happen because
deleted data associated with an item in the list was partly overwritten by the
device OS.
You can view the parsed application data in the Application Data folder.
• Deleted data in parsed format (including Address Book, Calendar, Call History,
iMessages, Network Connection, Notes, Safari Bookmarks, Messages, and SMS
Search) and deleted unparsed data (as in the iPhone/iPad/iPod Touch Advanced
(logical) plug-in)
Note: Depending on the iOS version, some features may not be acquired.
Note: The resulting size of the bit-by-bit image is equal to the size of the
device flash memory.
Usually the amount of acquired data depends on the model and state of the device.
iPhone 2G
iPhone 3G
iPhone 3GS
iPhone 4G
iPhone 4S
(Jailbroken only)
iPhone 6s Plus
iPhone SE
iPhone 7
iPhone 7 Plus
iPhone 8
iPhone 8 Plus
iPhone X
iPhone XS
iPhone XS Max
iPhone XR
iPhone 11
iPhone 11 Pro
iPhone 12
iPhone 12 Pro
iPhone 13
iPhone 13 Pro
iPhone 13 Mini
iPhone 14
iPhone 14 Pro
iPhone 14 Plus
iPhone 15
iPhone 15 Pro
iPhone 15 Plus
iPad Air
iPad Air 2*
iPad Pro*
* The current version of of the application does not support physical acquisition of
iPads with iPadOS.
2.x
3.x
4.x
5.x
6.x
7.0.x
7.1
7.1.1
8.0.x
8.1.x
8.3
8.4
9.0
9.1
9.2
9.2.1
9.3
9.3.1
10.0
10.0.1
10.0.2
10.0.3
10.1
10.1.1
10.2.x
10.3.x
11.0.x
12.0.x
13.0.x
14.x
15.x
16.x
17.x
13.1.2
13.1.3
13.2
13.2.2
13.2.3
13.3
13.3.1
13.4
13.4.1
13.5
13.5.1
13.6
14.0
14.1
14.2
15.x
16.x
17.x
• If the device you are trying to acquire has been successfully connected to another
PC previously, you can try copying the content of the Lockdown folder (by
default its location is C:\Program Data\Apple\Lockdown) to the same folder on
your PC.
• Try uninstalling the Apple software components and then reinstall the Mobile
Driver Pack. Follow the Apple support instruction (http://support.apple.com/kb/
ht1923) to properly uninstall Apple software components. After this, uninstall
the Mobile Driver Pack and install it again.
• For physical acquisition of non-jailbroken devices, check that you have correctly
put the device in DFU mode. Follow the instructions in the Data acquisition
section. If the device is placed into the DFU mode, there must be no logos on the
screen.
Q: I have a jailbroken device, but I cannot acquire application data. How can I fix
this?
A: Yes. If the device you are trying to acquire has been successfully connected to
another PC previously, you can try copying the content of the Lockdown folder (by
default its location is C:\Program Data\Apple\Lockdown) to the same folder on your
PC. Please note that this will only work if the password on the device was set before
the device was connected to the PC.
Q: The acquisition process was broken. The device is in the Recovery mode. What
do I do?
A: Start acquisition of the device once more. If you don't want to acquire data, just
wait until the device restarts and disconnect it from the computer.
A: Reset the iPhone by holding the Sleep/Wake button at the top right of the device
and the Home button at the bottom center of the face at the same time.
A: The iPhone/iPad/iPod Touch Physical plug-in allows you to acquire all data from
your iPhone/iPad/iPod Touch device. The amount of parsed data both in logical and
physical plug-ins is the same. But the total amount of data is larger in the physical
plug-in. It contains the file system that is inaccessible for the logical plug-in.
A: iPhone/iPad/iPod Touch devices with iOS 7 and later require you to establish
trusted connection after connecting it to the computer and on the start of acquisition.
For this purpose, you need to tap Trust on the device each time a message appears
on the device screen.
Q: I get the message that limited application data has been acquired. What does it
mean?
A: Generally, it means that the version of the application on your device is higher
than the one supported in the current version of OpenText EnCase Endpoint
Investigator. Please contact OpenText Support.
A: You need to install a special AFC2 tweak to unlock the device file system. To
install the tweak:
2. On the Cydia home screen, tap Sources > Edit > Add.
3. Enter apt.taig.com in the text box and then tap Add Source.
5. After the source is added, tap TaiG in the Sources list and select All Packages.
18.3.2 iPod
18.3.2.1 Data acquisition - iPod
Only physical acquisition can be performed on an iPod. Physical acquisition is
performed via the iPod Physical Plug-in.
• Device
• Accessories
• iTunes
• Music
• Notes
• If that doesn't work, disconnect other USB devices from your computer and
connect the iPod to a different USB 2.0 port on your computer.
• If that doesn't work, turn the iPod off and turn it on again.
• If that doesn't work, restart your computer and reconnect the iPod to your
computer.
• If that doesn't work, download and install (or reinstall) the latest version of
iTunes (http://www.apple.com/itunes).
Depending on the manufacturer and the model of your device and the data you
want to acquire, different plug-ins must be used:
Note: Any device with Android OS 14 and lower can be acquired via the
Android/GrapheneOS Logical plug-in regardless of its manufacturer and
model. If the device is locked, you can try to acquire it using the Android
Samsung Bootloader Physical, Android LG Advanced Physical, Android
Spreadtrum Expert (physical), Android MTK Expert (physical) or Android
Qualcomm EDL (physical) plug-in if the plug-in supports the corresponding
device model.
Rooting can be performed either by the user prior to acquisition, or by the program
during an acquisition. In the latter case, rooting is temporary and all effects of device
rooting are reverted after acquisition finishes.
In the program, rooting can be performed for the majority of devices with Android
OS 4.4.4 and lower. Rooting of devices with higher Android OS is not possible in
most cases. Please also note that some device models or model lines with Android
OS 4.4.4 and lower may have custom modifications, which makes it impossible to
root them.
3. Tap the USB connection selection menu (it will have the Touch for other USB
options message).
8. Follow the instructions in the setup wizard to install the required drivers.
9. After the installation finishes, click Finish in the wizard.
10. On the device, swipe down from the top of the screen again.
13. The drivers are installed, and the device is now ready for acquisition.
2. Make sure that you have logged in to the device as an Admin user.
• For Android OS versions up to 3.0: In the device menu, select Settings >
Applications > Development and then select the USB debugging option.
Tap OK in the confirmation message.
• For Android OS 4.0 and higher and GrapheneOS: In the device menu,
select Settings > Developer Options and then select the USB debugging
option. Tap OK in the confirmation message.
6. For Xiaomi devices, enable the Install via USB option under Developer
Options.
7. For some devices, you may need to enable installation from unknown sources
on the device:
• For Android OS lower than 4.0: Select Settings > Application Settings and
then select the Unknown sources option.
• For Android OS 4.0-7.x: Select Settings > Security and then select the
Unknown sources option.
• For Android OS 8.x and higher and GrapheneOS: Select Settings > Apps,
then go to Special Access in the menu and select the Unknown sources
option.
8. Connect the device to the computer using a data cable. Make sure that the
required drivers are installed (the required drivers for most Android devices are
included in the Mobile Driver Pack).
• For Android OS 4.x: In the device menu, select Settings > Storage, tap More
options/Menu, and then tap USB computer connection. Then select the
MTP (Media Transfer Protocol) option.
• For Android OS 5.0 and higher and GrapheneOS: In the device menu,
select Settings > Developer Options and then Default USB configuration,
and select the MTP (Media Transfer Protocol) option or the Transferring
files option.
• For some devices, the USB computer connection option is not available or
the connection method does not change to MTP even after changing settings.
In this case, open the Connected as/Use USB for notification and select the
Media device (MTP)/File transfers option.
10. If the device is locked, the lock must be removed to allow interactions with the
device during acquisition. For some devices, you may need to also select the
Stay awake option under the Settings > Developer Options.
11. To use Application Downgrade, make sure that the device is not actively
connected to the networks.
• For 2nd generation devices: Select Settings > Security > Enable ADB.
• For 3rd and 4th generation devices: Select Settings > Device > Developer
Options > Enable ADB.
Note: For the 1st generation Kindle Fire devices, the required option is
enabled by default.
3. Connect the device to the computer using a data cable. Make sure the required
drivers are installed (the required drivers for most devices are included in the
Mobile Driver Pack).
Important
During data acquisition, your device may reboot a few times and you will need
to enter its PIN/password. Make sure you know the device PIN before
performing acquisition. For devices with Android OS up to 4.1, if the phone is
in the USB debugging mode, the program can bypass the PIN/password.
– Select Unlock the file system to unlock the device file system if the
device is rootable. Selecting this option allows you to root the device that
is required for the file system and application data acquisition.
– Select Downgrade application versions during acquisition and define
the path to the archive with the correct applications versions. See
“Application downgrade” on page 570 for more details.
Note: Unlocking a device file system does not cause any damage to the
device or its data integrity.
4. Move between the other pages of the wizard and, when you are ready to start
acquisition, click Start Acquisition.
Before acquisition starts, the device file system will be unlocked. The file system
unlocking process is performed as follows: the AndroidService.apk installation
package is written to the /data/local/tmp folder and a special service is
installed to the system folder with applications. They will be removed
automatically after the acquisition process finishes.
Note: This does not cause any damage to the device or its data integrity.
Data acquisition starts, and its process is displayed on the Acquisition Progress
page.
• Allow USB Debugging: When this message appears on the device, tap OK
in it to continue the acquisition. If you do not tap OK for 60 seconds or
accidentally close the message, the notification is displayed in the Electronic
Evidence Examiner informing that the connection has timed out; click Retry
in the notification and then tap OK on the device. If there are multiple
Allow USB Debugging messages on the device, click OK on all of them.
Important
The Allow USB Debugging message might appear several times
during the acquisition. If you do not tap OK for 60 seconds, the
acquisition will be paused until the connection to the device is re-
established. DO NOT UNPLUG THE DEVICE!
• Permissions: To acquire data from the device, the Seizure Service requires
certain permissions to be granted. Tap Allow on each permission message to
make sure that the Electronic Evidence Examiner has access to all required
data.
• Full Backup: If this message appears on the device, tap Back up my data in
it to continue acquisition. This message appears if device rooting failed. In
this case, backing up data on the device allows acquiring at least some part
of the device file system, and allows using Application Downgrade.
1. The application installers for the current versions of the applications are backed
up.
2. The lower versions of the supported applications are installed on the
investigated device from the downloaded archive.
3. The ADB backup of the device data is created. It contains the application data for
the supported applications.
4. Application data is parsed if the corresponding feature is selected.
5. The original versions of applications are installed via the backed up installers,
and the device is returned to its initial state.
• Pre-installed applications: Depending on the device vendor and model, the list of
pre-installed applications might vary.
• Already downgraded applications.
• Applications installed in the Secure Folder.
• Applications installed for multiple users of the same device.
Contacts
SMS History
MMS History
Media Store
Browser History
Settings
Calendar
Installed Applications
Application Data
Authentication Data
Contacts
SMS History
MMS History
Call History
Calendar
Other Data
Device Properties
SMS History Both sent and received SMS and a The SMS History is a grid
folder with the attachments containing the fields:
shown in the binary files
• Date
(including deleted data)
• Read
• Address
• Status
• Type
• Subject
• Body
• Service Center
Call History History of call logs (dialed A grid containing the fields:
numbers, received calls, etc)
• Date
• Type
• Duration
• New
• Number
• Number type
• Name
Browser History (up Includes browser history URL history is a grid containing
to Android 6.x) including visited URLs and the fields:
performed searches.
• Title
• URL
• Date
• Bookmark
• Visits
All data is acquired using the USB, Android Debug Bridge, and the program internal
protocols.
Note: Acquisition of the device filesystem and recovery of deleted data are not
guaranteed for devices with Android OS 2.3.6.
The device properties are acquired and displayed in the Properties pane.
• Full Flash - includes raw partition images and parsed deleted data.
• File system - file system content is displayed in binary nodes.
• Authentication Data
• Recovered Contacts
• Recovered Call History
• Recovered Calendar
• Recovered SMS History
• Recovered MMS History
Note: Flash partitions data might be acquired partially from some devices with
Android OS 9.
The device properties are acquired and displayed in the Properties pane.
Q: I get the message that limited application data has been acquired. What does it
mean?
A: Generally, it means that the version of the application on your device is higher
than the one supported in the current version of EnCase Mobile Investigator. Please
contact OpenText Support.
A: An Android backup file is acquired only in case device rooting fails. If device
rooting is successful, the acquired data contains all files that may be included in a
backup file; therefore, the acquisition of an Android backup file is not necessary.
Q: After the application downgrade, versions of some applications have not been
restored.
3. Connect the device to a computer using a USB cable while still holding the
button.
4. Keep the Volume Up button pressed until the device enters Download Mode.
Note: To return the device to a normal mode, simply press and hold the
Power button or remove the battery and place it back.
3. Swipe the device screen from the bottom-left to the top-right corner to put the
device into Download Mode.
• LG G4
• LG G3 (all variants)
• LG G3 Beat
• LG G2 (all variants)
• LG G2 Mini
• LG G Pro 2
• LG G Pad
• LG G Watch
• LG F60
• LG L90
• LG Tribute
• LG Spirit
• LG Volt
• LG G Vista
A: The device may have been connected to a computer before pressing the Volume
Up button, or the button was released too early.
Q: Can I acquire other devices with Android 4.4.2 – 5.1.1 using the Android LG
Advanced Physical plug-in?
A: The Android LG Advanced Physical plug-in works only for LG devices and only
with a limited number of models. Successful acquisition of other LG models is not
guaranteed.
Q: I cannot acquire data from my smartwatch device. How can I fix this?
A: If you have problems acquiring smartwatches, try one of the following solutions:
To prepare a Samsung smartphone with Android OS 4.4.4 – 6.0.1 for acquisition, put
it into the Download mode:
To perform acquisition, a custom forensic recovery image file has to be written into
your device memory. Once it is done, you will need to reboot your device into
Recovery mode.
Note: Please keep in mind that the firmware of your device will be changed as
a result of acquisition by this plug-in.
7. Once the program has written the forensic recovery image file into your device
memory, a dialog window opens with an instruction on how to reboot your
device in the Recovery mode. Follow the instructions and reboot your device.
8. After your device is rebooted into Recovery mode, the acquisition starts
automatically. The progress of acquiring the flash partitions and the file system
of your device is displayed in the Flash Partitions and File System status lines,
respectively.
10. The case is saved. Disconnect the device from the computer.
Note: If your device model is not on this list, please do not try to acquire it via
the Android Samsung Bootloader (Physical) plug-in. This may result in your
device not being functional after your acquisition is complete.
A: No. If the device model you are trying to acquire does not correspond to the
model you select in the Acquisition Wizard, the device data may be wiped
completely.
Q: The device starts normally when I try to put it into the Download Mode. Why?
A: This may happen if the Volume Down, Home, and Power buttons are released
too early, or if they are not pressed simultaneously. Do not release the buttons until
the device enters Download Mode.
• For Android OS 4.x: In the device menu, select Settings > Storage, tap More
options/Menu, and then tap USB computer connection. Then select the Media
device (MTP) option.
• For Android OS from 5.0 and higher: In the device menu, select Settings >
System > Developer options > Select USB configuration and select the MTP
(Media Transfer Protocol) option.
For some devices, the USB computer connection option is not available, or the
connection method does not change to MTP even after the settings are changed. In
this case, try the following:
• On the device, open the Connected as/Use USB for notification and select the
Media device (MTP)/File transfers option.
1. Make sure that the device is turned on, prepared for acquisition, and connected
to the computer.
4. The case is saved, and you can disconnect the device from the computer.
• Internal Storage
• SD card (if inserted)
• Data from the /data, /cache, /system and other file system directories (for devices
with Android 4.x-5.x only)
1. Download the Firmware Update Drivers from the trusted Internet source to the
computer.
2. Download the firmware PAC file (ROM image) for your Spreadtrum device
model from the trusted Internet source to the computer. The PAC file contains
the boot image required for physical acquisition of the Spreadtrum device. PAC
files are unique for each device model. To find out the device model, in the
device settings, go to About phone > Model number.
Note: The PAC file will be loaded into the memory of the device. Once the
data acquisition is completed, the file will be automatically removed from
the device memory.
Note: SCI Usb2Serial port may disappear in a few seconds, and the device
will reboot into the charging mode.
7. Install the drivers and disconnect the device from the computer.
8. Connect the device onсe more. COM virtual port appears in the Device
Manager.
Note: It is recommended to remove the device battery for a few seconds every
time after disconnecting the device from USB.
4. On the Pre-acquisition Options page, click Browse next to the Image file path
field and navigate to the downloaded ROM image file.
5. While the device is turned off, press and hold the Volume Up button on it.
6. Connect the device to the computer without releasing the Volume Up button.
Note: You will have only 3–5 seconds to click Continue after connecting
the device to the computer, after which the device will return to the
standard mode. If the time runs out, disconnect the device, remove the
device battery, place it back again, and repeat the steps 7–9 again.
8. On the Connection Selection page, select the connection type and click Start
Acquisition.
Note: Each device model requires specific Firmware Update drivers and ROM
image file to be acquired.
1. Make sure that the Mobile Driver Pack is installed on your computer.
2. Download the DA file to your computer from the trusted source. The DA file
contains the boot image required for physical acquisition of the MTK device.
Note: The DA file will be loaded into the memory of the device. Once the data
acquisition is completed, the file will be automatically removed from the
device memory.
2. Make sure the device is turned off and disconnected from the computer.
5. On the Plug-in Selection page, select the Android MTK Expert Physical plug-
in and click Continue.
6. On the Pre-acquisition Options page, click Browse next to the Image file path
field and navigate to the downloaded DA file.
Note: It is not possible to identify which DA file supports the device. If the
acquisition process fails, please try downloading another DA file from the
Internet from a trusted source.
7. While the device is turned off, click Continue and connect the device as soon as
possible, within 10 seconds at most.
8. On the Connection Selection page, select the connection and click Continue.
9. The data acquisition process starts. Its progress is displayed on the Acquisition
Progress page.
11. The case is saved and you can disconnect the device from the computer.
Note: Each device model requires specific MediaTek USB VCOM drivers and
the DA file to be acquired.
1. Make sure that the Mobile Driver Pack is installed on your computer.
Note: Due to the Windows driver signature check, EDL drivers might fail
to install. In this case, the EDL connection will not be listed on the
Connection selection page. Follow the instructions described in step 4 of
this section.
2. Make sure that you have a programmer file(s) downloaded from the trusted
source on the Internet to your computer. The programmer file required for
physical acquisition of the Qualcomm device will be loaded to the device RAM
and will be automatically deleted from there after rebooting or turning off the
device.
Option 1:
Option 2:
Option 3:
Note: Before using this method, install the Android Debug Bridge
application to your PC.
Note: To exit from the EDL mode, close the Command Prompt, disconnect
the device from the PC, and then press and hold the Power button within
5–10 seconds. After that the device either reboots automatically or should
be turned on manually (depending on the device).
Note: To exit from the EDL mode, press the Power button.
4. If the EDL driver has not been installed during the Mobile Driver Pack
installation and the EDL connection is not listed on the Connection selection
page of the Acquisition wizard, disable the driver signature enforcement in
Windows and then re-install the EDL driver.
1. Open the Advanced Boot Menu. To do this, hold down SHIFT and click
Restart.
2. In the Advanced Boot Menu, click Troubleshoot.
3. On the Troubleshoot screen, click Advanced Options.
4. On the Advanced options screen, click Startup Settings.
5. On the Startup Settings screen, click Restart. You will see the list of settings.
6. Press the key corresponding to the Disable driver signature enforcement
setting (it is 7, as a rule). The computer will restart with the driver signature
enforcement disabled.
• If you have a folder with programmer files, select the Use the programmer
files collection and try to auto-detect the matching programmer file option,
click Browse next to the selected option, and navigate to the folder with the
programmer files.
• If you want to use a specific programmer file matching the chipset of the
acquired device, select the Use the matching programmer file option, click
Browse next to the selected option, and navigate to the file.
7. Click Continue.
8. On the Connection Selection page, select the connection and click Continue.
9. The acquisition process starts automatically. Progress is displayed on the
Acquisition Progress page.
Note: If the acquisition process fails, please reboot your device before
starting the next acquisition.
10. After the acquisition finishes, the device will be rebooted automatically.
The case is saved and you can disconnect the device from the computer.
1. In the device menu, select Settings > Device Info, and then select the USB
debugging option.
2. Connect the device to the computer using a data cable. Make sure the required
drivers are installed (the required drivers for most Tizen devices are included in
the Mobile Driver Pack).
Note: Unlocking a device file system doesn't damage the device or any
data on it.
4. Move between the other pages of the wizard and, when you are ready to start
the acquisition, click Start Acquisition.
5. Before acquisition starts, the device file system will be unlocked. For this
purpose, the program writes special files to the /tmp/, /opt/usr/apps/tmp/
and /home/developer/sdk_tools/gdbserver/ folders. The files will be
removed automatically after the process of acquisition finishes.
Note: This does not damage data integrity and does not cause any damage
to the device.
6. Data acquisition starts, and its process is displayed on the Acquisition Progress
page.
If your device is locked by a password you will be asked to enter it. The password
can only be entered 10 times. If you enter a wrong password on the last attempt, all
data on the device will be erased.
If acquisition is performed via a COM port and the device is locked by a password,
then only the Memory Image can be acquired.
• Memory images from BlackBerry Devices with Java (OS v. 4.0) will probably not
be acquired. Their acquisition depends on the state of the device.
• SMS messages once opened on BlackBerry and marked as Unread manually have
a Read flag in the program.
• Address Book
• Auto Text
• Browser Bookmarks
• Calendar
• Categories
• Handheld Agent
• Hotlist
• Memo
• Messages
• PhoneCall
• Profiles
• QuickContacts
• Service Book
• SMS
• Task
Type Contents
BlackBerry Pager (devices of series 85x) Memory (in one binary node called Memory
Image)
Simple BlackBerry Devices (this devices have Databases stored in the physical memory
Intel 386 processor inside)
Some databases are parsed (see list below)
BlackBerry Devices with Java (Devices with Memory (in one binary node called Memory
OS version 3.7,3.8,4.0) Image)
• Simple BlackBerry Devices (these devices have the Intel 386 processor).
A: Disable the Content Protection option. To do this, set the Options > Security
Options > General Settings > Content Protection option to Disabled, then save
your changes and restart the device.
Q: I get the message that limited application data has been imported during the
BlackBerry backup 10 import. What does it mean?
A: Generally, it means that the version of the application on your device is higher
than the one supported in the current version of OpenText EnCase Endpoint
Investigator. Please contact OpenText Support.
Note: Data on the device will not change in the process of acquisition. No data
and no applications are written to the device file system.
• Nokia 9290
Note: Data on the device will not change in the acquisition process. No data
and no applications are written to the device filesystem.
Please note that Symbian OS 6.1 devices can be connected via IrDA or Bluetooth. We
recommend that these forms of connection only be used as a last resort as neither
connection is secure. Data cables should always be your first choice as they are
secure. Pay attention to the steps for connecting your device using IrDA or
Bluetooth.
Note: Symbian OS 6.1 device can be acquired only via manual plug-in
selection.
Note: The number and names of the fields in the grids depend on device
model and settings.
A: Parsing the acquired data is not yet supported by OpenText EnCase Endpoint
Investigator. You can use the hex viewer or other forensic tools to view the data.
Acquisition is performed via the Nokia Symbian 7.x - 8.x Logical Plug-in.
Contacts grid:
• ID
• Group
• Last name
• First name
• Tel. (home)
• Tel. (home)
• Web addr. (home)
• Street (home)
• Postal/ZIP (home)
• City (home)
• Job title
• Job title
• Company
• Tel. (business)
• Mobile (business)
• Web addr. (bus.)
• P.O. Box (bus.)
• Extension (bus.)
• Street (business)
• Postal/ZIP (bus.)
• City (business)
• St.Prov. (bus.)
• Ctry./Reg. (bus.)
• Telephone
• Telephone
• Mobile
• Pager
• Fax
• Email
• Email
• Street
• City
• State/Province
• DTMF
Config grid:
• Parameter
• Value
Config grid:
• Parameter
• Value
ToDo list This type of data contains grids with the information on To Do list
acquired from the device and the last changes made to the list. Each
grid contains the following data:
Calendar grid:
• #
• Status
• Description
• Location
• Type
• Start date
• Start time
• End date
• End time
• Alarm time
• Alarm days warning
• Repeat type
• Repeat specification
• Repeat interval
• Repeat forever
• Repeat start date
• Repeat end date
• Creation date
Acquisition is performed via the Nokia Symbian 9.x. Devices Logical Plug-in.
Note: Data on the device will not change in the acquisition process. No data
and no applications are written to the device filesystem.
– Logs
– ToDo list
– Calendar
– Parsed Backup data
– MailBox (including deleted messages)
• MMS History
• SMS History
Config grid:
• Parameter
• Value
ToDo list This type of data contains grids with the information on ToDo list
acquired from the device and the last changes made to the list. Each
grid contains the following data:
Calendar grid:
• Status
• Description
• Location
• Type
• Start date
• Start time
• End date
• End time
• Alarm time
• Alarm days warning
• Repeat type
• Repeat specification
• Repeat interval
• Repeat forever
• Repeat start date
• Repeat end date
• Creation date
A: SMS and email history are not acquired for Symbian 9.1.
Q: It seems like not all the files from the filesystem are acquired. Why?
A: This may happen because of the specific device. Some system files may be locked
and cannot be acquired.
1. Open the Symbian Dumpers subfolder of the program installation folder (you
can find it in the Symbian Dumpers folder of the program installation
directory).
2. Copy the SymbianDumper.exe file (for Symbian OS version 6.1 and higher) or
the SymbianDumper6.0.exe file (for Symbian OS version 6.0) to an external
memory card using a special Card reader.
3. Insert this external memory card into the device being investigated. Pay
attention that the supporting file is not written to the device so it cannot damage
the data stored on it.
6. On the Plug-in Selection page, select the Nokia Symbian OS (physical) plug-in.
9. On the Connection Selection page, select the port via which the acquisition will
be performed. Click the Instructions navigation link.
10. Once you have the instructions on the Instructions page, click Start Acquisition.
11. The data acquisition starts and its process is displayed on the Acquisition
Progress page.
12. When the data acquisition finishes, the case is saved. Click Finish.
1. Open the Symbian Dumpers subfolder of the EnCase installation folder (you
can find it in the Symbian Dumpers folder of the program installation
directory).
2. Copy the SymbianDumper.exe file (for Symbian OS version 6.1. and higher) or
SymbianDumper6.0.exe file (for Symbian OS version 6.0.) to an external
memory card using a special card reader.
3. Insert this external memory card into the device being investigated. Please note
that the supporting file is not written to the device so it cannot damage the data
stored on it.
4. Connect the Infrared adapter to your computer. Wait until the device is
installed on your computer.
7. On the Plug-in Selection page, select the Nokia Symbian OS (physical) plug-
in.
10. Connect the device to the computer using the IrDA connection (place the
Infrared adapter next to the Infrared port of your Symbian device). You will see
the notification item in the Windows taskbar if the device is connected.
11. On the Connection Selection page, select the port via which acquisition will be
performed. Click the Instructions navigation link.
12. Once you have read the instructions on the Instructions page, click Start
Acquisition.
13. Data acquisition starts, and its process is displayed on the Acquisition Progress
page.
14. When data acquisition finishes, the case is saved. Click Finish.
1. Open the Symbian Dumpers subfolder of the program installation folder (you
can find it in the Symbian Dumpers folder of the program installation
directory).
3. Insert this external memory card into the device being investigated. Please note
that the supporting file is not written to the device so it cannot damage the data
stored on it.
4. Connect the Bluetooth device to a USB port. Wait until the Bluetooth icon
appears in the taskbar.
5. Right-click the Bluetooth icon in the taskbar and select Open Settings.
6. In the Bluetooth Settings window, select the Options tab and select the Allow
Bluetooth devices to find this computer check box. Click Apply.
7. Right-click the Bluetooth icon in the taskbar and select Add a Device. In the
newly-opened window, select the detected Symbian device and click Next.
8. Enter the code displayed by Windows into your Symbian device and press OK.
9. Wait until your device is completely connected. You will see the following page
of the Add a Device wizard. Click Close.
11. On the Plug-in Selection page, select the Nokia Symbian OS (physical) plug-
in.
13. Select the Bluetooth connection (as shown on the following picture).
14. In the list of Bluetooth devices on the phone, select the name of the computer
with the program installed and click OK.
15. Data acquisition starts, and its process is displayed on the Acquisition Progress
page.
16. When data acquisition finishes, the case is saved. Click Finish.
Pay attention to each connection process. You should define the correct settings for
IrDA, Bluetooth, and COM port connection.
Note: Data on the device will not change in the process of acquisition. No data
and no applications are written to the device file system.
A Processes dump includes all binary files used by the processes currently running
on the device.
All data is acquired in the form of binary files and stored in folders whose names are
the names of the currently running processes.
A: Check that you correctly set the Bluetooth, IrDA, or COM port connection for
your device.
4. If you enter the code correctly, you'll see the developer mode application icon.
6. After the device reboots, the developer mode will be on and you will be able to
acquire the device.
Note: After Palm Web OS is updated, the developer mode settings are
reset. So the Developer Mode application can sometimes show that the
developer mode is on while it is actually off.
Note: Use only the USB ports placed on the back of your system block.
The acquisition is performed via the WebOS Based Devices Logical Plug-in.
• Contacts
• E-mails
• SMS
• Memos
• Calendars
• Tasks
• Call history
• Accounts
The amount and the type of acquired data depends on the type of device.
Usually PDA plug-ins for the program allow you to acquire the following data:
• RAM
• ROM
• Databases Stored in the Memory
Siena series
Series 3c
Series 5
• Link: Cable
• Baud rate: 19200
Note: For other Psion device settings, please read the instructions for your
device.
The acquisition is performed via the Psion 16/32 bit devices logical plug-in.
Note: Acquisition of Psion 16/32-bit devices can only be performed via manual
plug-in selection.
Note: Some models of Psion devices lock ROM (disk C:) and RAM (internal
disk). If they are locked, the program will not be able to acquire them. Locked
disks are usually marked ABSENT in the menu of the device.
All data is acquired in the form of binary nodes and is not parsed.
Psion devices with SIBO (EPOC 16) OS: WorkAbout, SERIES SIENA, SERIES 3,
SERIES 3a, SERIES 3c, SERIES 3MX
Psion devices with EPOC 32 (ER3, ER5) OS: SERIES 5, SERIES 5MX, SERIES 7
The properties of the acquired data can be seen in the Properties pane.
Properties Notes
Device node
Vendor N/A
Device For Psion devices with SIBO (EPOC 16) OS, it
will be defined only if RPC service is loaded.
Program timestamp N/A
Binary node
Name N/A
Status May have the following value: Acquired,
Not acquired.
Version N/A
Size The size of the acquired file defined in its
properties on the device.
Acquired Size Actual size of the acquired file (it's usually
equal to the Size value).
Date/Time N/A
Attributes N/A
N/A
MD5 N/A
SHA1 N/A
Q: The acquisition stops and the device stops responding. What do I do?
A: If this happens, restart the device and start the acquisition again. In some cases,
you may need to do this multiple times before the proper acquisition process is
completed. After restarting, please check the connection settings of the device
thoroughly.
Note: Some Palm devices (for example Treo 750) have the Window Mobile OS
and must be acquired with the “Data acquisition - Windows Mobile”
on page 626 or “Data acquisition - Windows Mobile” on page 626.
– If the device has the graffiti area: Draw the following combination in the
graffiti area: ShortCut (looks like a lowercase cursive l) + period +
period +2.
Note: These instructions only work for Palm devices. The program
should work with devices running the Palm OS made by other firms,
but we can't guarantee it. Consult the instructions to your device to
find out how to put it into the console mode.
• To acquire the Logical Image (Databases), put your device into the Sync
mode. Press the Sync button on the cradle or activate the Sync mode
through the screen dialog on the device, then click Continue.
3. If acquisition from a Palm device is being performed for the first time, the driver
installation for it begins. This may lock the device.
Note: If the device gets locked while acquiring Databases, press Cancel. If
you are acquiring Memory and the device gets locked, restart the device
(turn it off and then back on).
4. Acquisition starts.
5. There can be some files locked by the Palm OS on your device. If the program
tries to acquire these files, it adds the file to the “black list” and stops
acquisition. Files added to the black list are omitted on next acquisition. You
have to repeat acquisition until all locked files are added to this list. After that,
all unlocked files will be acquired without errors.
ROM Card Information contains the password field which will be filled if the device
is locked by a password and runs Palm OS v4.0 or lower.
Some parts of data in databases will be parsed and displayed in grids form
(MemoDB, AddressDB, DatebookDB, etc).
Properties Notes
Device node
Name N/A
State Acquired/Not Acquired.
Size Actual size defined on the device.
Acquired Size This size can be less than actual size.
MD5/SHA1 Hash codes.
Databases
Properties Notes
Name N/A
State Acquired/Not Acquired/Parsed.
Create/Modify/backup dates N/A
Version N/A
Resource Resource (resources or executable code)/
Database (data).
Size N/A
Identifier N/A
MD5/SHA1 Hash codes.
A: Check whether your device has Palm OS. Some Palm devices (for example, Treo
750) have the Window Mobile OS and must be acquired by the Windows Mobile/
PocketPC logical plug-in or Windows Mobile 5.x - 6.x physical plug-in.
A: To resolve this problem, the user must reset the Palm device (use the hole on the
back side of the device) before starting a new acquisition. It is strongly
recommended that you acquire Databases before the Memory Image.
Q: I can't put the device into the console mode even when following the
instructions given in the Data Acquisition topic. Why?
A: The given instructions are only suitable for devices made by Palm.OpenText
EnCase Endpoint Investigator should work with any Palm devices made by other
firms, but it is not guaranteed. Consult the instructions for your device to find out
how to put it into the console mode.
Q: I experience difficulties while acquiring ROM from devices with Palm OS 5.0.
Why?
A: The problem is that some databases in the ROM are locked. When OpenText
EnCase Endpoint Investigator starts the acquisition and runs into a locked file, it
freezes. You just need to restart the device and continue the acquisition. When this
happens, the locked file will not be read again. It will be added to the list (its size
will be near 70 - 80 bytes).
Q: When syncing the Palm device, the device reports “Unable to initiate HotSync
operation because the port is used by another application”. What's using the port?
A: Usually, this is caused by the device being placed into the console mode and not
being reset. To fix this problem, soft reset the device using the pin hole on the back
(usually labeled “Reset”).
A: There can be files locked by the OS on the device. These files cannot be acquired.
They are added to the black list and omitted during the following acquisitions. You
have to repeat the acquisition process until all locked files from your device are
added to the black list. After this the acquisition is performed without errors.
Logical acquisition is performed via the Windows Mobile Devices Logical Plug-in.
Physical acquisition is performed via the Windows Mobile 5.x – 6.x Devices Physical
Plug-in.
Please note that, for logical acquisition, when a connection with the device is being
established, the device will probably ask for a confirmation to write the .dll library
into its memory. Please agree to this or else the connection won't be established.
Note: Data acquisition can be done only with the help of a special .dll library
which is written to the free space in the device memory. This guarantees that
data stored in the device memory won't be lost.
Logical acquisition allows you to acquire the following data in the form of binary
nodes:
For Windows Mobile 5.x for Pocket PC Phone Edition, Windows Mobile 5.x for
Smartphones, Windows Mobile 6.x Professional for Pocket PC, and Windows
Mobile 6.x Standard for Smartphones, the following data is acquired in grid form:
Physical acquisition allows you to acquire data stored in the memory of the device
and on the internal cards.
Note: Data acquisition is performed with the help of a special DLL library,
which is written to the free space in the device memory. This guarantees that
data stored in the device memory won't be lost.
Note: All data stored in the device memory (storage) is acquired. But only the
filesystem is parsed.
The information about memory stores from which data was read (physical
characteristics) can be seen in the Properties pane.
Physical acquisition should work with any device running Windows Mobile 5.x –
6.x.
A: Make sure the SIM card is inserted in the device and the phone functionality of
the device is turned on.
Q: I cannot acquire Call History, SIM data and Pocket Outlook items. Why?
A: Make sure you confirmed the DLL installation by tapping Yes on your device
when the acquisition started. Also make sure that the security settings of your
device allow internal applications to copy data to your device and to run unsigned
applications on it.
• If you use a USB cable, make sure the required drivers are installed. The
installation of these drivers is included in the Mobile Driver Pack.
• Turn off all external applications working with the Garmin GPS device.
• In the device settings, define Garmin USB as the connection protocol.
Besides the standard case file containing the acquired data, the application allows
you to create a GPS file. This file contains information about tracks, routes, and
waypoints stored on the Device.
The GPS file (GarminGPS.gps) is placed as a sub-node of the device node and can be
exported for future examination.
Data is read from the device as from a mass storage device. The acquired .gpx files
are parsed and shown in the form of a grid:
Note: The types and amount of acquired data depend on the type of device.
The Garmin GPS Logical Plug-in acquires the following data from Garmin Devices
(eTrex, Rino, Edge, GPSMAP, etc.):
• Waypoints
• Proximity waypoints
• Tracks
• Routes
• Almanac
• Maps
• Device properties
Proximity Waypoints and the area around them. A grid containing the fields:
waypoints
• Name
• Attributes
• Waypoint class
• Waypoint color
• Display option
• Position
• Altitude
• Depth
• Proximity distance
• State
• Country code
• Waypoint symbol
• Subclass
Physical acquisition acquires the Internal Memory Dump and Main Firmware from
the Garmin GPS devices. Both files are acquired as binary files and are not parsed.
• Make sure the drivers for the USB connection of your device are installed.
• Make sure you set Garmin USB as the connection protocol of your device.
• Make sure all external applications working with your device are turned off.
A: Some models of GPS devices need to have the Acquiring Satellites option turned
ON to acquire the Almanac.
Note: Connect the device to the computer and make sure it is detected on the
computer before you start the Acquisition Wizard.
Besides the standard case file containing the acquired data, the application allows
you to create a GPS file. This file contains information about tracks, routes, and
waypoints stored on the device. GPS files can be opened within the program and
you can view information in Google Earth without exporting this file.
The GPS file (TomTomGPS.gps) is placed as a sub-node of the device node and can
be exported for future examination.
The acquired files are parsed and shown in the form of a grid:
• Alcatel
• CDMA Devices
• Kyocera CDMA
• LG CDMA
• LG GSM
• Motorola
• Motorola iDEN
• Nokia GSM
• Nokia TDMA
• Samsung CDMA
• Samsung GSM
• Sanyo CDMA
• Siemens
• Sony Ericsson
• ZTE
The types and amount of acquired data depend on the type of device. Usually, the
feature phone plug-ins in the program allow you to acquire the following data:
• GUID properties
• NV Memory Dump
• Memory Dump (for all phone models except Samsung CDMA)
• SMS history
• Phonebook
• Filesystem
• Memo
• Call Logs
• Calendar
Filesystem
Users files (Java files, The amount of data acquired Binary nodes
Multimedia, Sounds etc.) depends on the model of the
phone and its state.
System files
Memo
Memo • Memo
Call Logs
A: After acquiring data using the BREW protocol, you can't acquire data until you
restart your mobile phone. In this case, turn off your mobile phone and then turn it
back on.
18.11.6 LG GSM
Use EnCase Endpoint Investigator to acquire from LG GSM.
• Phonebook
• SMS History
• Memos
• Filesystem (if present)
• Scheduler
• Call Logs
• ToDo list
SMS history Both sent and received SMS. A grid containing the fields:
• Text
• State
• Memory Type
• Sender/Recipient Number
• Response/Reception Date
• SMS Center Number
Call Logs History of call logs (dialed A grid containing the fields:
numbers, received calls etc).
• Number
• Type
ToDo A grid containing the fields:
• Text
• Date
• Status
Memos A grid containing the fields:
• Text
• Date/time
Scheduler A grid containing the fields:
• Text
• Date/time
• Alarm date/time
• Repeat
Filesystem
A: It means that the support of your model has not been added to OpenText EnCase
Endpoint Investigator yet. Please send us your log files so that we are able to add
support (the logs are located in C:\Program Files (x86)\Guidance Software\Mobile
Acquisition\logs by default).
18.11.7 Motorola
Use EnCase Endpoint Investigator to acquire from Motorola.
Motorola drivers are included in the Driver Pack so you need to have it installed on
your computer.
1. The Found New Hardware message will appear in the right bottom corner of
the screen.
2. At the same time, the Found New Hardware wizard appears on the screen.
Click the Next button.
3. The drivers search starts (the drivers are copied to the disk when the program is
installed).
7. This means the first step of the drivers installation has been performed
successfully and you can acquire data through the AT modem now (Phonebook,
Calendar, Calls History, and SMS history).
This part of the installation is performed when a Motorola device tries to acquire the
file system (or SMS and quick notes dump).
1. When you try to acquire this data for the first time, acquisition will be stopped
and you will see an error message.
2. You will see a number of Found New Hardware messages in the tray
notification area in the bottom-right corner of the screen, and then the
installation of all these subdevices will begin. They will be installed one after
another. Please note that this make some time. Sometimes there will be a pause
between the installation of different subdevices.
Note: Whenever you make selections, please leave the radio button
selections as they are.
Please note that some devices, such as the Motorola VU 204, require the phone to be
turned off before acquisition.
Logical acquisition
Users files (Java files, The amount of data Binary nodes TCI protocol (for
Multimedia, Sounds acquired depends on GSM phones)
etc) the model of the
phone and its state. BREW protocol (for
System files CDMA phones)
The amount of acquired data depends on the model and state of the phone. The
types of data listed above should be available; however, some of them can be empty
or absent.
Physical acquisition
A: When acquiring data through a USB connection, make sure the process of drivers
installation is performed correctly.
Q: Data is not being read even though previous data was read without errors.
Why?
A: After acquiring data by the TCI or BREW protocol, you can't acquire data until
you restart your mobile phone. In this case, turn off your mobile phone and then
turn it on.
Logical acquisition acquires the following data from the phone SIM card:
The amount of acquired data depends on the model and state of the phone. The
types of data listed above should be available; however, some of them can be empty
or absent.
Physical acquisition acquires the following parts of memory from the phone:
Please note that data stored on the SIM card is not acquired.
A: This may happen because the phone is not charged. Restart the phone, recharge
it, and try again.
Nokia drivers for new Nokia phone models (Nokia N97, Nokia 6700, etc.) and older
ones are included in the Driver Pack.
Logical acquisition
Logical acquisition acquires the following data using the FBUS protocol:
SMS
Calendar
ToDo List
Logos
Physical acquisition
Physical acquisition acquires EEPROM memory using the FBUS protocol. The
following data will be parsed:
Missed, Incoming, Outgoing Restored from the phone A grid containing a number
memory Call logs. of fields that depends on the
amount of data stored in the
device's memory.
Possible fields:
• Name
• General Phone Number
• Mobile Phone Number
• Home Phone Number
• Work Phone Number
• Call Date
Calendar
The following phone properties stored in the EEPROM are parsed and shown in the
Properties viewer:
• Serial Number
• Product code
• Basic product code
• Module code
• Hardware version
• Security Code
• ICC-ID
• Name
• General
• Location
SMS History
Sounds
Other files
Call History
Notes
The amount of acquired data depends on the model and state of the phone. The
types of data listed above should be available; however, some of them can be empty
or absent.
A: Try downloading and installing the Kies application. It contains all necessary
drivers for Samsung devices: http://www.samsung.com/in/support/usefulsoftware/
KIES/JSP#versionInfo (http://www.samsung.com/in/support/usefulsoftware/KIES/).
Q: When recovering audio from a Samsung CDMA phone, there are files that are
unplayable with various types of media players after exporting. What do I do?
A: Samsung CDMA devices store *.wav files in their internal QCP format. For
playing such wav files, you should use QUALCOMM’s PureVoice Player.
It is strongly recommended that you enter the PIN code on your device before
starting an acquisition. Otherwise, some data (SMS, Calendar, Call Logs, and Phone
Book) from the device might not be acquired.
Data acquisition is performed using the standard process. Before acquisition, turn
off the phone, remove the battery, and insert it back again. After that, connect the
phone to the computer with the cable.
Data acquisition is performed using the standard process. Before acquisition, turn
off the phone, remove the battery, and insert it back again. After that, connect the
phone to the computer with the cable.
Data acquisition is performed using the standard process. Before acquisition, turn
off the phone, remove the battery, and insert it back again. After that, connect the
phone to the computer with the cable.
When the phone is connecting to the computer (the Connection page appears), press
the Power button on your cell phone for 1-2 seconds. This activates the connection to
the phone. Be careful that the phone does not turn on. If it turns on, you should
disconnect it and start the acquisition procedure from the beginning (this can be
tricky and may require many attempts). Then click the Next button on the Complete
Acquisition window.
Data acquisition is performed using the standard process. Before the acquisition,
turn off the phone, remove the battery, and insert it back again. After that, connect
the phone to the computer with the cable. Turn on the phone and wait until it loads
to the desktop or to the Enter Your PIN screen. If it is a flip-phone, it should remain
closed.
Calendar
SMS History
Outbox • Text
• State
• Memory type
• Sender/Recipient name
• Response/Reception
number
• Response/Reception date
• SMS Centre number
File System
Sounds
Other files
The amount of acquired data depends on the model and state of the phone. The
types of data listed above should be present, however, some of them can be empty
or absent.
Generally, all data is acquired by the AT protocol. The OBEX protocol is used for
some models.
VLSI
Conexant
The program acquires only EEPROM from Conexant generation phones and the file
system from Conexant 2 generation phones.
Sysol
The program acquires three types of data: RAM, EEPROM, and NAND.
Agere
The program acquires only EEPROM (with PIN Code extraction) and flash file
system.
A: Try downloading and installing the Kies application. It contains all necessary
drivers for Samsung devices: http://www.samsung.com/in/support/usefulsoftware/
KIES/JSP#versionInfo.
Q: I can't acquire the SMS, Calendar, Call Logs and Phonebook from this device.
Why?
A: Some Samsung phones don't allow you to acquire these features until the PIN
code is entered.
Q: The acquisition has finished but the phone won't turn back on. What
happened?
A: This happens because it takes time for the phone to switch off from the service
mode. Try pressing the power button for varying lengths of time. If the phone still
doesn't turn on (some firmware versions don't have a software reset), you should
disconnect and then reconnect the battery and try again.
A: This happens when the buffers are filled with trash data. In this case, turn the
phone off and then on or, if this does not help, disconnect and reconnect the battery.
SMS history Incoming and outgoing SMS. A grid containing the fields:
• Phone number
• Callback
• Date
• Priority
• Status
• Message
18.11.14 Siemens
Use EnCase Endpoint Investigator to acquire from Siemens.
Before acquisition, turn off the phone, remove the battery, and insert it back again.
After that, connect the phone to the computer with the cable.
Please note that physical acquisition of Siemens devices can only be performed via
manual plug-in selection and you need to define the exact model of the phone.
When the phone is connecting to the computer, the Information screen appears.
Press the Power button of your mobile phone for 1-2 seconds. This activates the
connection to the phone. Make sure the phone stays turned off. If it turns on, you
should disconnect it and re-start the acquisition process.
Usually the amount of acquired data depends on the model and state of the phone.
The types of data listed above should be present but sometimes some of it can be
empty. Some old models of phones do not support the standard version of the OBEX
protocol. Data read by the OBEX protocol in these phones cannot be acquired.
Physical acquisition acquires data stored in the memory of the mobile phone. After
acquisition, it is automatically parsed and represented as a set of binary nodes. Even
• Phone book
• SMS History (Inbox, Outbox)
• Java Files
• Multimedia Files
• User Settings
• Other Files Stored in the Memory
The amount of acquired information depends on the model of the phone and its
state.
A: In some models of Siemens phones (A56i,C56, etc.), after the acquisition of the
Calendar, the file system cannot be read. In this case, turn off the device and then
turn it back on. After this, the file system can be acquired.
SMS
Other Files
Calendar
Usually the amount of acquired data depends on the model and state of the phone.
Parts of the data listed above should be available but sometimes some of them can
be absent.
Some old models of phones do not support the standard version of the OBEX
protocol. Data read by the OBEX protocol from these phones cannot be acquired.
18.11.16 ZTE
Use EnCase Endpoint Investigator to acquire from ZTE.
File System User data and system files. Files in the binary format
If the card is locked by a PIN code, you will be asked to enter it before acquisition
starts.
Note: You only have 3 attempts to enter the PIN code. After that, the PUK code
will be requested. After you enter the right PUK, the SIM card PIN will be reset
to 0000.
Data like SMS and phone numbers (Abbreviated Dialing Numbers and Service
Dialing Numbers) is acquired in two formats: parsed and unparsed.
Most of the data listed above can be found in the file system folder in a parsed
format.
Note: Usually the amount of acquired data depends on the model and state of
the phone.
For more information about data stored on the SIM card and abbreviation
explanations, see International Journal of Digital Evidence (http://www.utica.edu/
academic/institutes/ecii/publications/articles/A0658858-BFF6-
C537-7CF86A78D6DE746D.pdf).
Besides the data listed above, the system and provider-specific data which wasn’t
included in any specification, if found on the device, will be acquired from GSM SIM
and CDMA RUIM cards.
Note: There may be problems acquiring some SIM cards with mass storage
SIM card reader when running Windows 7 or later.
• Make sure your SIM card reader is supported, connected to your PC, and is not
damaged.
• Thoroughly read the instructions on how acquisition should be performed.
Q: After acquiring information from the SIM card from a Siemens phone, I see the
last symbol in the names in the phone book is invalid. Why?
A: Siemens phones save the name of the group to which the number belongs in the
last character. That's why it cannot be parsed.
A: Yes. You can enter an invalid PIN code 3 times and then enter the right PUK.
After that, the PIN code will be reset to 0000.
A: By default, the latest available driver for SIM card readers is automatically
installed on Windows 8/10. You can try selecting an older driver.
2. In the device list, right-click your SIM card reader and click Update Driver
Software in the context menu.
4. On the How do you want to search for driver software page, click Browse my
computer for driver software.
5. On the Browse for driver software on your computer page, click Let me pick
from a list of device drivers on my computer.
6. On the Select the device driver you want to install for this hardware page,
select the required driver in the list and click Next.
A: Check that your card reader is supported, connected to your PC, and is not
damaged.
A: A folder acquired from the device may be empty in the following cases:
Q: What is the difference between acquiring a device with its native plug-in and
Portable Device plug-in?
A: Portable Device plug-in guarantees to acquire only the user media content from
the device. Generally, a native plug-in allows to acquire more data. For example,
many devices store media files, such as music and photos, within the area of the
device that can mount as media for acquisition while the user data is stored in other
areas only accessible with acquisition by the native plug-in.
A: Not all devices with enabled MTP mode can be auto-detected as Portable Device.
Please enable the PTP mode on the device to acquire it through the auto-detection.
Note that some devices do not have the PTP mode option. In this case, you can
acquire such devices with enabled MTP mode manually through the Portable Device
(logical) plug-in.
Note: It can take a long time to acquire data from high capacity mass storage
devices.
Note: The current version of the application allows you to start multiple
import tasks simultaneously.
Before importing Cellebrite iPhone backup, you should locate the archive file with
iPhone backup stored in the same folder as the UFD case. To do it:
1. Open the UFD case (.ufd file) using Notepad. Pay attention to the File Dump
name. That is the name of the archive file containing iPhone backup.
1. In OpenText EnCase Endpoint Investigator, select Add Evidence > Acquire >
Mobile Backup File from the menu bar. The Output File Settings dialog is
displayed.
2. Complete the fields and select the output folder, and click OK. The Import
Wizard is displayed.
5. Click Browse and browse to the Manifest.plist file contained in the extracted
backup data. Click Finish.
The data importing starts and a new Import stored mobile data task is added to
the Tasks pane, where you can view its general progress.
The progress is also displayed on the Import Wizard > Importing File Process
page.
6. If the importing process finishes correctly, you will see the last page of the
Import Wizard. Click Finish. Data is imported to the case.
1. In EnCase Endpoint Investigator, select Add Evidence > Acquire > Mobile
Backup File from the menu bar.
The Output File Settings dialog is displayed.
2. Complete the fields and select the output folder, and click OK.
The Import Wizard is displayed.
5. Click Browse and browse to the .xml file to be imported. Click Finish.
The data importing starts and a new Import stored mobile data task is added to
the Tasks pane, where you can view its general progress.
The progress is also displayed on the Import Wizard > Importing File Process
page.
6. If the importing process finishes correctly, you will see the last page of the
Import Wizard. Click Finish.
Data is imported to the case.
Encrypted data can be imported from iOS 17 devices if you have the encryption key.
EnCase Mobile Investigator allows you to parse the following data from iPhone
backups:
Calendar
Call History
Cell Locations
Contacts
Contact Properties
Cookies
Dynamic Text
Mail Accounts
Maps Bookmarks
Maps History
Notes
Safari Bookmarks
Voicemail
WiFi Locations
YouTube Bookmarks
Installed Applications
* The recovered parsed data is not available in backups made from devices with iOS
13.x.
In addition, encrypted iOS backups include extracted authentication data, which can
be used to “Imported cloud data” on page 703.
Note: Call History, Safari History, Safari Suspend State data, etc. might be
absent from non-encrypted backups.
To import data:
1. In EnCase Endpoint Investigator, select Add Evidence > Acquire > Mobile
Backup File from the menu bar.
The Output File Settings dialog is displayed.
2. Complete the fields and select the output folder, and click OK.
The Import Wizard is displayed.
Note: To import iPhone files, load the Manifest.plist file to make sure
you have all the supporting files in the backup folder intact. If you load an
*.mdbackup file for iPhones, you will not need any supporting files.
5. If the backup file is encrypted, you will be asked to enter a password. Enter a
password and click Next.
The data importing starts and a new Import stored mobile data task is added to
the Tasks pane, where you can view its general progress.
The progress is also displayed on the Import Wizard > Importing File Process
page.
6. If the importing process finishes correctly, you will see the last page of the
Import Wizard. Click Finish.
Data is imported to the case.
To import data:
1. In EnCase Endpoint Investigator, select Add Evidence > Acquire > Mobile
Backup File from the menu bar. The Output File Settings dialog is displayed.
2. Complete the fields and select the output folder, and click OK. The Import
Wizard is displayed.
4. Click Browse and browse to the *.ab file to be imported. Click Finish.
5. If the backup file is encrypted, you will be asked to enter a password. Enter a
password and click Next.
The data importing starts and a new Import stored mobile data task is added to
the Tasks pane, where you can view its general progress.
The progress is also displayed on the Import Wizard > Importing File Process
page.
6. If the importing process finishes correctly, you will see the last page of the
Import Wizard. Click Finish. Data is imported to the case.
To import data:
1. In EnCase Endpoint Investigator, select Add Evidence > Acquire > Mobile
Backup File from the menu bar.
The Output File Settings dialog is displayed.
2. Complete the fields and select the output folder, and click OK.
The Import Wizard is displayed.
Note: To import BlackBerry backup files, load the backup file with the
*.ipd extension to make sure you have all supporting files in the backup
folder intact.
5. If the backup file is encrypted, you will be asked to enter a password. Enter a
password and click Next.
The data importing starts and a new Import stored mobile data task is added to
the Tasks pane, where you can view its general progress.
The progress is also displayed on the Import Wizard > Importing File Process
page.
6. If the importing process finishes correctly, you will see the last page of the
Import Wizard. Click Finish.
Data is imported to the case.
Note: A BlackBerry 10 backup may be incomplete. To make sure all data from
the device is present in a backup, make a complete backup of the device if you
have access to it.
EnCase Mobile Investigator parses the following types of data from RIM BlackBerry
10 backup data:
• Calendar
• Contacts
• Call Logs
• SMS
• Notes
• BlackBerry Messenger
• Evernote
• Skype
• WeChat
• WhatsApp
To import data:
1. In EnCase Endpoint Investigator, select Add Evidence > Acquire > Mobile
Backup File from the menu bar.
The Output File Settings dialog is displayed.
2. Complete the fields and select the output folder, and click OK.
The Import Wizard is displayed.
5. You will be asked to enter a password. Enter a password and click Next.
The data importing starts and a new Import stored mobile data task is added to
the Tasks pane, where you can view its general progress.
The progress is also displayed on the Import Wizard > Importing File Process
page.
6. If the importing process finishes correctly, you will see the last page of the
Import Wizard. Click Finish.
Data is imported to the case.
1. In EnCase Endpoint Investigator, select Add Evidence > Acquire > Mobile
Backup File from the menu bar.
The Output File Settings dialog is displayed.
2. Complete the fields and select the output folder, and click OK.
The Import Wizard is displayed.
5. If the importing process finishes correctly, you will see the last page of the
Import Wizard. Click Finish.
6. Double-click a *.gps or *.kml file in the Data View pane (it is placed as a
subnode of the device node).
7. In the Data View pane, the Open Street Viewer opens. The information
received from the device is displayed in a tree-view structure on the right side
of the pane.
8. Select the location (waypoint, route, etc.) in the tree view to navigate to it in the
Open Street Viewer.
1. In EnCase Endpoint Investigator, select Add Evidence > Acquire > Mobile
Backup File from the menu bar.
The Output File Settings dialog is displayed.
2. Complete the fields and select the output folder, and click OK.
4. On the GrayKey Case page, select if you are importing iOS or Android data.
Note: Importing all data includes importing of the full file system dump
and might take much time.
6. Click Next.
8. If the importing process finishes correctly, you will see the last page of the
Import Wizard. Click Finish.
Data is imported to the case.
To use this option, you have to receive two files from the GSM provider (this
information cannot be acquired from the device; it can only be received from the
provider):
• Tower location file. Data should have the following format in a *.csv file: LAC,
CID, Site, Switch, Latitude, Longitude, ACG, Sector, and Orientation.
• The list of the towers via which the calls from the investigated phone were
performed. Data should have the following format in a *.csv file: Switch, Date,
Time, Duration, Inbound / Outbound, Customer Number, Tower Name, and
Tower Number.
Note: *.csv files with data in other formats are not supported in the current
version of EnCase Mobile Investigator. Data headers are not case-sensitive.
If you have issues importing tower information files, double-check the spelling of
headers and make sure there are no misprints in them.
1. In EnCase Endpoint Investigator, select Add Evidence > Acquire > Mobile
Backup File from the menu bar.
Note: Alternatively, you can also get to the Import Wizard by doing one
of the following:
4. Click Browse beside the Towers box and navigate to the file with the
information about tower locations.
5. Click Browse beside the Phone calls box and navigate to the file with the
information about phone calls.
6. After the phone call file is selected, the Import phone calls settings group of
options appears. Select the date format of imported data from the drop-down
list, and then select the period for which phone calls are to be imported in the
Import phone calls from and Import phone calls to boxes. Click Finish.
Note: If the selected date format does not correspond to the date format of
the selected files, data may be imported but will be displayed incorrectly.
The data importing starts and a new Import stored mobile data task is added to
the Tasks pane, where you can view its general progress.
The progress is also displayed on the Import Wizard > Importing File Process
page.
7. If the importing process finishes correctly, you will see the last page of the
Import Wizard. Click Finish.
8. After the importing finishes, navigate to a GPS file under the acquired device
node and double-click it to view its data on Open Street maps.
Note: The support of extraction from logically acquired iOS devices will be
added in the future releases.
Using the Cloud Data Import Wizard, you can obtain data from online services,
such as:
• Amazon Alexa
• Facebook
• Facebook Messenger
• Gmail
• Google Drive
• Google Locations
• iCloud Backup
• Twitter
Notes
You can examine Facebook user data acquired via the Cloud Data Import Wizard
within EnCase Endpoint Investigator and by processing the resulting output file
with the Social Media Parser option in the evidence processor. See “Parsing social
media artifacts” on page 257.
After acquisition/importing, you will find the authentication data file in the
Authentication Data folder in the device/backup root folder. The file name contains
the name of the device from which it was extracted and the time of extraction.
This file is used to obtain data from the corresponding cloud-based service accounts
via the Cloud Data Import Wizard.
• Amazon Alexa
• Facebook
• Facebook Messenger
• Gmail
• Google Drive
• Google Locations
• Twitter
Note: For iOS backups, Gmail and Google Drive authentication data can be
extracted only if the user logged in to these services via a mobile browser.
• Using authentication data file extracted from logically acquired Android OS data
or from imported encrypted iTunes backups
• By manually entering credentials from the user’s account
1. If you have an authentication data file in your case, export it to your computer.
2. Select Add Evidence > Acquire > Social Media from the menu bar.
The Output File Settings dialog is displayed.
4. If necessary, in the Cloud investigation name field, define the name under
which imported data will appear in the case.
• To add accounts from an authentication data file, click Add Auth Data File
and select the previously exported authentication data file.
6. Select the check boxes of the accounts from which you want to import data and
click Authenticate.
7. The authentication of the selected accounts starts and its progress is displayed
on the Authentication Process page.
8. During Google data import, the account owner might need to perform Google
Verification before import is possible. The accounts that require Google
Verification will have the Google authentication failed status.
Note: Once all steps of verification are done, the Google Verification
page might look frozen by not changing status. You can close the
Google Verification page at this point and retry authentication.
9. During iCloud Photos data import, for accounts protected with the two-factor
authentication, additional verification is required:
Note: The accounts that require verification have the Click to verify
(Two-Factor Authentication is enabled) status.
Important
For iCloud Photos, the sign in notification is sent to the trusted device
even before you click the Click to verify status. Never tap Do Not Allow
on this notification, even if you are going to use another verification
method (for example, SMS). Otherwise, you will not be able to continue
the authentication.
• Select the Select custom date range for time related data check box and then
select the date range for which time-related data (messages, calendar, etc.)
must be imported from selected accounts.
Note: Data that does not have timestamps, such as contacts or images,
is imported to the full extent.
• Select accounts in the accounts table and then select which data must be
imported from each account. To import all data from an account, select the
check box next to it; to import no data, clear the check box next to it.
The cloud data importing starts and a new Import data from cloud task is
added to the Tasks pane, where you can view its general progress.
The progress is also displayed on the Cloud Data Import Wizard > Importing
Progress page.
Conversations
Gmail Inbox Gmail messages include email attachments.
Depending on the number and size of attachments,
Sent Mail importing may take some time.
Draft
Trash
Spam
Chats
Google Drive User storage During importing, all files from selected folders are
files downloaded. This may take a while.
Files shared
with a user
Conversations
Posted Tweets
A: It depends on the type of the service. Token lifespan may be unlimited or may be
just half an hour.
A: No, the passwords are stored in an encrypted format and cannot be viewed.
Q: The type of device connection is not shown in the Connections Selection page
of the Acquisition Wizard. Why?
• The PC port is locked by another program (close the programs which may be
locking the port).
• The port of the cell phone is locked. Restart the phone (if this doesn’t help, take
out the battery and re-insert it).
• If a USB Connection is not shown, it may be because the drivers of the USB port
are not installed.
• Some devices require special actions to be performed so that the device is
detected. Click the troubleshooting link in the bottom of the Home page of the
Acquisition Wizard or see the FAQ for the corresponding device for more
information.
A: The error message contains the description of the error and advice on what to do
to solve the problem.
1. Phone problems:
• Check whether the cable is connected to the device and to the computer
properly.
• Check whether the cable is compatible with your device.
• Check whether the cable working.
• Check whether the drivers for the USB port are installed (if you use a USB
connection).
• Check that your port is not locked by any other program.
• There may be issues with Microsoft ActiveSync on some computers. Try
uninstalling it if you have problems with acquisition.
4. Manual selection problems:
1. Disconnect the cable from the computer as well as from the phone and then
reconnect it again.
2. Turn on/off the phone and turn it off/on again and reload the phone.
3. Pull out the battery from the phone and insert it back again.
Q: The Data Acquisition Process starts correctly but, in the middle of the
acquisition, an error appears. Why?
• Bugs in the device’s operating system. In this case, try reloading your device.
• The phone ran out of power. Charge the phone and try again.
• The connection was broken. Maybe the cable was unplugged accidentally or has
a loose connection.
A: Bugs in the device's operating system may cause this error. Try reloading your
device. You can also try acquiring each type of data separately.
Q: I have X phone from Y manufacturer and I get the message that the phone isn't
supported. Why isn't this particular phone supported yet?
A: There are currently thousands of models of phones out on the market, and new
phones are being introduced every day. It is impossible to support and test every
make and model that is available. We are trying to add support for all the most
popular model phones on the market and are adding more model support every
month. If you have a model that isn't currently supported, please follow these
instructions for submitting log files, and we'll work on adding support for your
phone as soon as possible:
1. Once the device is connected properly to your computer, begin the acquisition.
2. After the acquisition finishes (timeout, error, problem), close OpenText EnCase
Endpoint Investigator.
3. Browse to the Logs folder (by default, it is C:\Program Files (x86)\Guidance
Software\Mobile Acquisition\logs).
4. In the Logs folder, find the log that corresponds to the manufacturer of the
phone you tried to acquire. For each plug-in, there are two logs present: *.txt
and *.dump (for example, plugin.psion_logical.txt and
plugin.psion_logical.dump).
5. Rename the log file to include the model number of the phone. For example
motorola_log.txt should be renamed to motorola_c331_log.txt.
6. Check the size of the log file to ensure that information from the acquisition was
captured. If the file is a zero byte file, try acquiring the phone again.
7. Once the log file has been renamed, place the file in a .zip archive to ensure that,
when we receive the file, the data is unaltered. Some mail servers alter the data
contained in *.txt files. Sending it in a zip file ensures that this does not happen.
8. Contact OpenText Support.
Q: OpenText EnCase Endpoint Investigator shuts down after the first 10 minutes
of acquisition. Why?
A: Chances are that you are running a personal firewall on the same machine that
you are using OpenText EnCase Endpoint Investigator on. The personal firewall will
block the communication between your device and the computer. Disable the
firewall and start the acquisition process again. This will most commonly occur
when you work with a Windows Mobile 5 device.
Q: How can I check that the Prolific drivers for my device are installed correctly?
A: If you want to check whether the Prolific drivers were properly installed, do the
following:
A: Drivers for most supported types of devices are included in the Mobile Driver
Pack, which you can download fromOpenText My Support. If none of the drivers
installed from the Mobile Driver Pack work, try searching the web or contacting our
support staff.
Q: I acquired a GSM phone and later on I acquired the same GSM phone and I
had more results the second time around. What is causing this?
A: The first time you performed acquisition, the SIM card in the phone hadn't fully
initialized yet. When you power a phone with a SIM card, it takes anywhere from
one to three minutes for the phone to fully initialize the SIM card. If you perform
acquisition before the SIM card is done initializing, OpenText EnCase Endpoint
Investigator won’t be able to acquire all the data located on the phone. The solution
to this is to wait one to three minutes before starting your acquisition.
A: Yes. OpenText EnCase Endpoint Investigator can recover deleted SMS text
messages from SIM cards and phones. However, as with any deleted data, there is a
possibility that some data recovered will be in fragments and incomplete or that the
data has been entirely overwritten. This all depends on when the message was
deleted and what other information had been written to the phone or SIM card.
Deleted data recovery can also depend on whether the plug-in(s) for your device
support deleted data recovery.
A: Depending on the make and model of the device, yes. OpenText EnCase
Endpoint Investigator can acquire pictures that are either downloaded or created
through the use of the built in camera.
A: For some devices, it is necessary to place a file on the phone to gain access for
acquisitions. To acquire more of the memory, OpenText EnCase Endpoint
Investigator has to place a small file in an empty section of the device memory
which is removed after the acquisition. This is well documented in the report and
does not affect any user data.
Q: Why does the file DB_notify_register change when I acquire the device?
A: Such situation might occur if LG feature phone was acquired previously. If this is
the case, open the Device Manager, right-click LG Modem and disable it. After that,
restart your PC and launch the Acquisition Wizard again.
2. Select the Debug tab and click Show Logging to show the Logs dialog box.
3. From the Log Categories table, locate Mobile Acquisition in the Category
column, then select its Summary check box.
Note: When selected, a dialog box will appear noting that log message
destinations do not apply for Mobile acquisition logging. The destination
filename is DefaultLog.log00000 and cannot be changed. The file location
is [Encase installed folder]\lib\Mobile\Analysis\. Click OK to
dismiss.
4. Click OK.
This chapter describes how to use EnCase when working with evidence in
languages other than English.
The Unicode standard attempts to provide a unique encoding number for every
character regardless of platform, computer program, or language. Unicode
encompasses a number of encodings. In this document, Unicode refers to UTF-16
(Unicode 16-bit Transformation Format). Currently more than 100 Unicode code
pages are available. Because EnCase applications support Unicode, investigators can
search for and display Unicode characters, and thus support more languages.
EnCase also supports code pages, which describe character encodings for a
particular languages or set of languages that use the same superset of characters. In
some cases, it is necessary to assign a code page to properly display the language.
Thus, EnCase supports both Unicode character sets that do not require a code page
as well as legacy character encodings (for example, ISO Latin, Arabic, and Chinese)
that do require a specific code page to display properly. You need to use a code page
in EnCase only when your non-English document contains a set of these legacy
character mappings.
EnCase supports character codes other than 16-bit Unicode for working with non-
Unicode, non-English-language text.
• Changing the default Code Page. See “Changing the default code page”
on page 712.
• Adjusting the date format. See “Setting the date format” on page 713.
• Assigning a Unicode font. See “Assigning a Unicode font” on page 714.
• Creating non-English language search terms.
• Bookmarking non-English language text.
• Viewing Unicode files. See “Viewing Unicode files” on page 714.
• Viewing Non-Unicode files.
• If you are running a non-English version of Windows, make sure that you have
correctly installed and configured the appropriate Microsoft language pack.
• Make sure that you have installed the set of fonts needed to support the character
set for your non-English version of Windows, or have installed a Unicode font.
• Optionally, configure your system to support the keyboard and input language
desired.
• Optionally, set the date format that is commonly used with the language.
• You can create and search for non-English language search terms, bookmark
non-English language text, browse through tables and trees in non-English text,
etc.
• You can override global settings when viewing content in the Text or Hex tabs of
the View pane. For more information, see “Changing text styles” on page 312.
Global internationalization settings are located in the Options dialog. From the
Global tab you can configure EnCase to display non-English characters in status
bars and tabs, dialogs, tables, data views (including text, hex, transcripts), and in the
EnScript script editor.
1. Click Tools > Options. In the Options dialog select the Global tab.
2. Configure the desired date and time format. See “Date options” on page 67.
2. Double-click the font box for the interface element. The Font dialog opens.
3. Change the font to Arial Unicode MS or another available Unicode font and
click OK.
5. Click OK. The interface elements you selected in the Fonts tab are now
configured to display characters according to the non-English, Unicode
character set. See “Font options” on page 71 for more information.
To properly display the characters in certain code pages, you should select a
Unicode display font.
Characters that are not supported by the font or code page display as a default
character, typically either a dot or a square. Modify this character when using text
styles in the Text and Hex tabs of the View pane.
By default, EnCase displays characters in ANSI (8-bit) format on the Text and Hex
tabs in Courier New font. Viewing Unicode files requires modifications to both the
formatting and the font. First, the file or document must be identified as Unicode.
This is not always straightforward.
Text files (.txt) containing Unicode usually begin with a Unicode hex signature \xFF
\xFE. However, word processor documents written in Unicode are not so easy to
identify. Typically, word processor applications have signatures specific to the
document, making identification of the file as Unicode more difficult.
You can change the code page from either the Text or Hex tabs in the View pane by
clicking Codepage. A list of the most recently used codepages is displayed.
1. To select a new codepage, click Codepages. The Code Pages dialog is displayed.
2. Select the desired Unicode-based text style. See “Changing the default code
page” on page 712.
3. EnCase updates the text displayed in the Text or Hex tab to reflect the new
encoding.
• Line wrapping
• Line length
• Replacement character
• Reading direction
• Font color
• Class of encoding
• Specific encoding
Text styles are global and can be applied to any case after they are defined. Apply
text styles in the Text and Hex tabs in the View pane. See “Changing text styles”
on page 312.
These instructions are for Windows 7 and Windows 8. Configuring other Windows
versions is similar.
1. Click Start and type change keyboard in the search bar, or click Start > Control
Panel > Change keyboards or other input methods. The Keyboards and
Languages tab of the Region and Language dialog is displayed.
2. Click the Change keyboards button. The General tab of the Text Services and
Input Languages dialog is displayed.
3. In Installed services, click Add. The Add Input Language dialog is displayed.
4. Click on the plus box next to the language you want to add, click the plus box
next to Keyboard, and click the check box next to the language you want to add.
5. Click OK.
The keyboard is now be mapped to the selected language. Repeat steps 3 and 4 for
any additional languages you want to add.
1. Click the two letter language code in the notification area of the Windows
taskbar.
2. Keyboard mapping options display. Select the language you want to use.
1. From the Windows Desktop, click Start, type charmap into the search box, and
press the Enter key, or click Start > All Programs > Accessories > System Tools
> Character Map. The Character Map utility is displayed.
2. Click the desired character, then click Select to add the character to the
Characters to Copy box.
4. Click Copy, then paste the characters where you want to use them.
LinEn is a tool included with EnCase that can be used to acquire evidence from
system disk drives. This tool does not alter any potential evidence on the drives to
be acquired. LinEn can be run independently or injected into a Linux distribution for
use on a bootable device. Once a bootable device has been created the LinEn tool is
can then be run independently from within the boot disk to perform drive-to-drive
and crossover acquisitions. LinEn is a 32-bit application.
1. Using your EnCase application on the investigator's machine, click Tools >
Create Boot Disk. The Choose Destination page of the Create Boot Disk wizard
is displayed.
2. Click ISO Image, then click Next to advance to the Formatting Options page.
3. In the Image Path field, provide a path to the ISO file of your Linux distribution
Note: If the ISO does not boot after completing this procedure, select the
Alter Boot Table check box and try again.
4. In the Destination field, select a name for the new output ISO file. Click Next to
advance to the Copy Files page.
5. Click New to specify the files to be included in the new ISO. The file browser
opens.
7. Click Finish. The Creating ISO progress bar is displayed on the Copy Files
page. When complete, the modified Linux distribution containing LinEn is
created and placed in the destination location.
8. Create a bootable USB device with this ISO. Free applications like Rufus
(https://rufus.ie/ ) can be used to create a bootable USB device.
You now have a boot disk to run Linux and LinEn while you acquire the subject
device.
Note: LinEn does not boot Windows 8 computers when UEFI Mode and
Secure Boot are enabled. The UEFI (Windows 8 BIOS) has additional checks to
prevent malicious software from booting Windows 8 computers. Every
operating system requires a key. Linux cannot provide this, so it is not allowed
to boot. You must disable the UEFI to allow Linux to boot a Windows 8
computer.
• SUSE 9.1
• Red Hat
• Knoppix
This process describes an ideal setup that effectively runs the LinEn application in a
forensically sound manner.
To prevent inadvertent disk writes, you must make modifications to the operating
system. Linux has an autofs feature, installed by default, that automatically mounts
and writes to any medium attached to the computer. It is essential that you disable
autofs to prevent automatic mounting.
If you intend to use a LinEn boot disk, you must have a live distribution, such as
Knoppix, to create a boot disk. If you intend to run LinEn on an installed version of
Linux on your examiner machine, we recommend SUSE or Red Hat.
For the Linux distributions discussed in relation to LinEn, obtain a distribution from
one of the following:
2. Open a command shell on your Linux machine and run LinEn as root/super
user.
5. Select Main Menu > System > Configuration > YaST. Yet Another Setup Tool
(YaST) is used to configure various settings for your Linux operating system.
2. Open a command shell on your Linux machine and run LinEn as root/super
user.
• Drive-to-drive
• Crossover cable
Drive-to-drive acquisitions provide the means to safely preview and acquire devices
without using a hardware write blocker. Drive-to-drive acquisitions use either the
subject machine or the examiner machine to perform the acquisitions.
Crossover cable acquisitions require both a subject and examiner machine. This type
of acquisition also does not require a hardware write blocker. It may be desirable in
situations where physical access to the subject machine's internal media is difficult
or not practical. This is the recommended method for acquiring laptops and exotic
RAID arrays. This method is slower than a drive-to-drive acquisition because data is
transferred over a network cable, making it especially sensitive to the speed of the
network capabilities of both machines.
• IDE
• USB
• Firewire
• SATA
• SCSI
There are three key methods used to perform a drive-to-drive acquisition using
LinEn:
• The examiner machine, running LinEn from the LinEn Boot Disk, connected to
the subject hard drive.
• The examiner machine, booted to Linux and running LinEn, connected to the
subject hard drive.
• The subject machine, running LinEn from the LinEn Boot Disk, connected to the
target hard drive.
If the FAT32 storage partition to be acquired has not yet been mounted, do so.
Navigate to the folder where LinEn resides and enter ./linen in the console. The
LinEn main window is displayed.
1. Select the Load > Local Devices option to add a local device to the Device
Window.
2. The Add Local Device dialog is displayed. Here you can add one or more
devices to LinEn.
The Add Local Device dialog contains a list of all devices, both full drives and
partitions.
Path
The Path option changes the directory scanned for devices. Selecting Path and
pressing Enter opens a dialog that changes the directory according to your input.
Device list
The columns displayed in the Add Local Device window can be scrolled using the
scroll bar at the bottom or the left and right arrow keys.
One device is currently highlighted with a black background. Pressing the arrow
keys moves the highlighted selection. Pressing the PageUp and PageDown keys
moves the highlighted selection by one page. Pressing the Space key selects a
device. Choose Select All from the Edit menu, or press CTRL + A to select all
devices.
After selecting one or more devices, select Close to add the devices to LinEn. No
processing of the devices, such as hashing, is done at this time.
The Devices Window contains the following information for each device that has
been added.
• Name - Filename of the block device as it is seen in the /dev directory. The same
name is displayed in EnCase.
• Label - Full path to the device.
To remove the selected device, use the Delete option either from the menu, or by
pressing the Delete key. Note that this removes the device from LinEn only. No
changes such as deleting files or formatting are made to the actual device.
• Location
• Format
• Advanced
After you set the parameters in the Acquire Device dialog and click OK, acquisition
begins. A thread is added to the Thread Monitor.
The Acquire Device dialog Location tab sets file location information used when
acquiring a device.
The Acquire Device dialog Location tab displays the following fields and options.
• Name - Generates the name of the file in the Output Path control. By default, the
Name field has the same value as the name in the Devices Table in the Device
Window. Changing this value changes the name of the file.
• Evidence Number - Stored in the evidence file as Evidence Number.
• Case Number - Stored in the evidence file as Case Number.
• Examiner Name - Stored in the evidence file as Examiner Name.
• Notes - Free text up to 32 characters. Stored in the evidence file.
• Output Path - Evidence File Path. Use to enter or browse to a different output
path.
• Alternate Path - A semicolon delimited list of alternate paths, used to enter or
browse to an alternate path. The alternate path provides a secondary location for
LinEn to use for continuing to write segments of the evidence file if the location
designated by the Output Path does not have enough space to write the entire
evidence file.
The Acquire Device dialog Format tab sets format options used when acquiring a
device.
The Acquire Device dialog Format tab displays the following fields and options:
The Acquire Device dialog Advanced tab sets block size and sector options used
when acquiring a device.
The Acquire Device dialog Advanced tab displays the following fields and options:
• Block Size (Sectors) - (Minimum: 64, maximum: 1024). Higher block sizes allow
slightly faster acquisitions and create smaller evidence files. However, with large
block sizes, if evidence files are damaged, larger blocks of data are lost.
• Error Granularity - Portion of the block zeroed out if an error is encountered.
– Reader Threads - Controls how many threads are reading from the source
device, enabled only if the file format is E01. (1-5 available; default is 0).
– Worker Threads - Controls data compression calculation, enabled for both
EnCase evidence file formats, E01 and Ex01. (1-20 available; default is 5).
If the device has not been acquired, the Name, Start Sector, and Stop Sector are
populated and all other fields are blank.
After acquisition begins, the Start time is displayed. If the device has been acquired,
the following information is displayed when a device is selected:
• Status - Acquiring (while the thread is running). Acquired (when the operation
finishes).
• Start - Start time of the operation.
• Stop - Finish time of the operation.
• Time - Elapsed time of the operation.
• Start Sector - Start sector of the part of the device that is hashed. By default, if
you hash the full device, this value is 0.
• Stop Sector - Final sector of the part of the device that’s hashed. By default (if
you hash the full device), this is the maximum sector number.
• Verification MD5 - MD5 hash of the part of the device that is hashed. This is
displayed only when you select MD5 in hash options.
• Verification SHA1 - SHA1 hash of the part of the device that is hashed. This is
displayed only when you select SHA1 in hash options.
If you acquire a device more than once, only the latest information is displayed.
If you try to hash a device that is currently being used in LinEn (for example,
already hashing or acquiring), a dialog asks if the current thread should be canceled.
A new hashing thread for the same device is created only when the current thread is
not running.
The file name is automatically generated and cannot be changed. For example,
acquisition information for a device with the name “hdd1” is saved in: [current
directory]/hdd1.acq. If the file already exists, the new information is appended to
the end of the file.
• Verify individual segments of the evidence file (for example, the .EO3 segment).
This confirms that the files are not corrupted, but does not confirm that the files
match the underlying device.
• Hash the original device and the acquired evidence image, then compare the
hashes to make sure that the correct data has been acquired.
The Device/Hash option hashes a device or part of a device, using MD5, SHA1, or
both. This option opens the Hashing Device dialog.
Use this dialog to select the type of hash: MD5 or SHA1. One, both, or neither check
box option may be selected. Select or clear a check box with the spacebar.
Use this dialog to select start and stop sectors. When you open this dialog, the Start
Sector and Stop Sector fields are populated with 0 (Start Sector) and the maximum
sector (Stop Sector).
Clicking OK starts the hashing process, changes the status of the device in the
Devices Window, and creates a new thread in the Thread Monitor Window. Both
hash values are calculated in the same thread, so only one thread is started. If none
of the check boxes is selected, the dialog exits and no thread is created.
After a device has been hashed, it can be saved when selected in the Device
Window. The information displayed in the status pane is saved in a file.
The Evidence Files window contains information about the evidence displayed in
the Evidence box on the left and the segments they contain if the evidence has
multiple files, shown in the Files box on the right.
Changing the current selection in the Evidence list will refresh the list of the files.
The Verify Evidence button uses the current selection from the Evidence box to
begin verifying the entire evidence. If the evidence file does not have acquisition
information, the verification begins and verifies the evidence to ensure that the file is
readable. In this example, the verification is done after selecting all segments and
clicking the Verify Single button. No hash value is calculated.
The Verify Single button uses the current selection from the Files box and verifies
the selected evidence segments. The Single file verification only option reads a
segment to make sure that it is readable and that the information is consistent.
• If the evidence has not been verified, the Name, Acquisition, MD5, and SHA1
fields and are populated. The other fields are blank.
• Once verification begins, the start time is shown.
• If the evidence has been verified, verification information for MD5 and SHA1 is
displayed.
The following fields are optional. Their values depend on the results of the
verification.
• Acquisition MD5 - The MD5 hash of the evidence file when created. Not
displayed if MD5 is not selected during the acquisition.
• Acquisition SHA1 - The SHA1 hash of the evidence file when created. Not
displayed if SHA1 is not selected during the acquisition.
• Verification status - Status of the verification.
• Verification MD5 - Displays only if it does not match the Acquisition MD5 value
after the verification ends.
• Verification SHA1 - Displays only if it does not match the Acquisition SHA1
value after the verification ends.
Acquisition MD5
• Before the verification, this is the MD5 hash of the evidence file when it was
created.
• After the verification ends:
– If no errors occur, this value is replaced with the MD5 hash value.
– If the verification fails, this value remains and the verification MD5 is
displayed.
Acquisition SHA1
• Before the verification, this is the SHA1 hash of the evidence file when it was
created.
– If no errors occur, this value is replaced with the SHA1 hash value.
– If the verification fails, this value remains and the verification SHA1 is
displayed.
Verification status
– Verified, no errors - Indicates the verification process did not find any errors.
– Verify errors # - Displays the number of errors found during the verification
process.
If the verification is started again, the display is cleared, and new information is
displayed.
To add evidence files to the Evidence Files window, use the Add Evidence menu.
To remove the selected evidence, use the Delete option from the menu, or press
Delete on your keyboard.
The Save command saves the information to a file using the same name as the
evidence file.
To save evidence verification information, select Save from the Device Window (or
enter Ctrl-S). The information displayed in the status pane is saved in a file.
• Hashing
• Single file verification
• Evidence file verification
• Evidence acquisition
• Name - Name of the type of thread, such as hashing device, verify single, verify
evidence, acquire.
• Status - Thread status, such as running, suspended, canceled, done.
• Errors - The number of errors. This is blank if there are no errors.
• Progress - Percent complete.
• File Path - A processing comment. For example, “Hashing: /dev/hda5” or
“Verifying: myfile.E01”.
Threads are shown until removed by deletion. The status window shows a history of
actions performed.
If you begin running a job or task, such as hashing, acquiring, or verifying evidence,
and need to end it before it finishes, press the Delete key while in this window.
Delete
• If the current top window is the Device Window, the currently selected device is
deleted from the table. It is removed from LinEn, not deleted on disk. When a
device is deleted it is removed from the LinEn Devices Window.
• If the current top window is the Evidence Files Window, the currently selected
evidence is deleted.
• If the current top window is the Thread Monitor Window, the currently selected
thread is deleted. If the thread is currently running, LinEn asks if you want to
cancel it.
If a running thread is associated with the current item you want to delete, LinEn will
ask if you want to cancel the thread before the item is removed from the table.
• If you select No, the thread is resumed and the item is not deleted.
• If you select Yes, the thread is cancelled and the item is deleted.
Notes
• The thread itself is not deleted from the Task Manager window, unless this is
the current window.
• When anything is deleted from the current window, LinEn does not provide
the option to save textual data, such as hash results.
Options
• Default Examiner Name - By default the Default Examiner Name field is set to
the username of the account that is running LinEn. If the value is set, the text is
transferred to the Examiner field in the Acquisition dialog.
• Default Case Number - Default Case Number works in the same way as
examiner name, but the value is transferred to the Case Number field in the
Acquire dialog.
• Home Path - The Home Path field points to a directory. If the directory path does
not exist, LinEn creates it when you click OK. This directory is used as a root
directory to organize stored information, such as logs and evidence files.
• Default Evidence Path - Default Evidence Path is a read-only field that shows
where evidence files are stored.
Both the Logging Directory and Default Evidence Path fields contain recommended
values. These values can be changed in the Acquire dialog.
Note: You must use the -cl option to activate this feature.
Select an operation:
Note: You must choose either Acquire Mode or Hash Mode. LinEn displays an
error message if you attempt to use both.
You can enter command line options with a single dash and the shortcut (for
example, -p <Evidence Path>) or with a double dash and the full tag (for example,
--EvidencePath <EvidencePath>).
During the acquisition or hashing process, a pipe character ( | ) prints to the console
for each percentage completed.
• Configuration file
Non-interactive command
When the -cl (CommandLine) option is set, LinEn is non interactive, allowing third
party software to use its own scripting. Users must pass all LinEn settings via a text
file or via command line arguments.
Configuration file
You can create a configuration file to fill in some or all of the variables. The
configuration file must be in the format OptionName=Value. These options have the
same restrictions as their command line counterparts.
Note: Any options specified on the command line take precedence over those
in the configuration file.
Once the selected operation is complete, results print to the console. Read errors and
read error sectors display only if there are errors.
Hashing results
Name: <EvidenceName>
Sectors: 0-<TotalSectors>
Acquisition results
1. Boot the target machine from the LinEn bootable device. Ensure the target
machine has an operable optical drive or USB port and can actually boot from a
DVD, CD or bootable LinEn device.
2. Connect the examiner machine to the subject machine using a crossover cable or
an Ethernet cable.
Note: If an Ethernet cable is used, both the target and examiner machine
must have gigabit Ethernet.
3. On the target machine running LinEn, ensure an IP address has been assigned
correctly to the default Ethernet adapter by typing ifconfig eth0. If the adapter
does not have an IP address assigned, assign one manually by typing ifconfig
eth0 10.0.0.2 netmask 255.0.0.0. Verify the IP address assignment completed
successfully by typing ifconfig eth0.
4. Navigate to the folder containing LinEn and type ./linen in the console to run
the application in Server Mode.
5. When you select a device, a variation of the following information is displayed:
9. Select Add Evidence > Preview > Computer Using Crossover Cable.
The Computer Using Crossover Cable dialog is displayed, and lists crossover
devices.
11. Select the physical disk or logical partition to acquire or preview and click OK.
You can preview and acquire the contents of the device through EnCase. For more
information about acquisition, see “Acquiring Device Configuration Overlays (DCO)
and Host Protected Areas (HPA)” on page 221 and “Acquiring a disk running in
direct ATA mode” on page 223.
3. Press Enter.
4. The man page is displayed.
EnCase Decryption Suite (EDS) enables the decryption of encrypted files and folders
by domain and local users. EDS is included with EnCase Endpoint Investigator in
most countries. EDS supports the following forms of encryption:
– Microsoft BitLocker
– GuardianEdge Encryption Plus/Encryption Anywhere/Hard Disk Encryption
– Utimaco SafeGuard Easy
– McAfee SafeBoot
– McAfee Endpoint Encryption
– WinMagic SecureDoc Full Disk Encryption
– PGP Whole Disk Encryption
– Checkpoint FDE (Full Disk Encryption)
– Dell FDE (Full Disk Encryption)
– Apple File System (APFS) Encryption
• File based encryption
If the disk is encrypted, EnCase Endpoint Investigator requests user credentials (see
“Supported encryption products” on page 746 for a table listing required
credentials for supported encryption products). Note that the disk/volume
encryption support in EnCase Endpoint Investigator works only at the physical
level.
• If the credentials are not correct, the User Credential dialog is displayed again. If
this occurs, enter the correct credentials to exit the dialog or press Cancel.
• If the correct credentials are entered, EnCase Endpoint Investigator decrypts the
disk. No password attacks are supported.
1. Right-click the volume you want to analyze, then click Device > Analyze EFS
from the dropdown menu.
3. The second Analyze EFS dialog is displayed with the Documents and Settings
Path and Registry Path fields populated by default. For unusual system
configurations, data disks, and other operating systems, these values are blank.
You can modify them to point to the user profile folders and/or the registry
path.
5. When the scan completes, the EFS Status dialog shows statistical information on
keys found and decrypted and registry passwords recovered.
Note: Analyze EFS can also open the Syskey and Password Recovery Disk
screens.
Missing images
If images that should have rendered display as blank, select the gear dropdown
menu in Evidence view and click Clear invalid image cache.
Although the tab is always present in the interface, the EDS module must be
installed to enable most of the functionality.
You can enter Syskey information before running the Analyze EFS wizard, or
afterwards if the wizard is already completed.
2. In the Table tab, click the hamburger icon, then click Enter Items from the
dropdown menu.
4. Click OK.
User password
1. In the Table tab, click the hamburger icon, then click Enter Items from the
dropdown menu.
If the Syskey is protected and you do not know the password, an attack on the SAM
file for user passwords will fail. This is a rare situation. Most Windows machines do
not have a protected Syskey. EnCase Decryption Suite includes a dictionary attack
option to get past a protected Syskey. You can obtain dictionary files from a number
of sources. To open setup, right-click the root of Secure Storage and select
Dictionary Attack.
While Analyze EFS scans the registry, EnCase alerts you if the Syskey is password
protected or has been exported. In these cases, the Analyze EFS wizard prompts you
to enter the Syskey password or browse to the Syskey file location. The Syskey file is
called startkey.key. You should examine any removable media collected at a scene
for the presence of this file. If the Syskey file is recovered on removable media, it can
be copied/unerased from EnCase to the examination machine, and you can browse
to the startkey.key location. This process is the same as when you use the
Password Recovery Disk.
Windows XP and 2003 Server enable local users to create a recovery disk with a file
containing their encrypted passwords. The userkey.psw file allows users to reset
their passwords, without losing all of their EFS encrypted files and other important
security credentials. You should examine evidence recovered at the scene for the
presence of this file.
1. With file on removable media, or copied to a hard drive, click the hamburger
icon in the Table tab, then click Enter Items from the dropdown menu.
If the logon password is unavailable, you can obtain the Domain Administrator's
private key (PFX). This also works for a user key. To export and use the key:
7. Accept the default for the export file format, then click Next.
8. Select a path and name the key (this assigns a .PFX extension), then click Next.
Note: The password cannot be left blank. It is needed when using the key.
10. Click Next. A confirmation window displays details about the export.
12. Click the hamburger icon in the Table tab, then click Enter Items from the
dropdown menu.
13. In the Enter Items dialog, select the Private Key File tab.
15. Enter the Password in the next dialog, then click OK.
A status screen confirms successful completion and the Private Key is displayed in
the Secure Storage tab.
You can enter a .PFX certificate to use for decrypting S/MIME-encrypted email
found in PST files.
1. Click the hamburger icon in the Table tab, then click Enter Items from the
dropdown menu.
2. In the Enter Items dialog, select the Enter Mail Certificate tab.
3. Enter the path to the .PFX certificate and the password.
4. Click OK.
2. Click the hamburger icon menu in the Table tab and click Associate Selected....
4. Expand the Volumes tree and select the volumes you want to associate.
• Name
• Encrypted
• Type
• Subtype
• Password
• Password Type
• Aliases: Security Identifiers (SIDs) that point to one or more SID entities. They
include a name and a comment.
• Groups: SIDs that point to one or more SID entities. They include a name and a
comment. These are defined groups such as Administrators and Guests.
• SAM Users: Local Users; details are listed in the Report tab of the View pane.
• Passwords: Found and examiner added passwords.
• Net Logons: Local Users; details are listed in the Report tab of the View pane.
• Nix User/Group: Unix users/groups.
• Lotus: Lotus Notes.
• Email Certificates: Certificates used for S/MIME decryption and signature
verification.
• Disk Credentials: Persistent key cache for disk/volume encryption products.
• Master Keys: A master key that protects every user's private key. The master
key itself is encrypted with a hash of the user’s Windows password.
• Private Keys: Keys used in the decryption of EFS files.
• Internet Explorer (IE) Passwords: Passwords from IE 6.
• Policy Secrets: LSA secrets which include the default password and passwords
for services. Some of these secrets are not passwords but binary data placed there
by the system and applications.
• SAM Keys/Policy Keys/Dpapi/CERT: Items for internal use.
EnCase can export data to Passware after processing evidence with the Evidence
Processor and creating an index, or after running Analyze EFS. EnCase displays a
warning if no index exists or if Analyze EFS was not previously run.
3. Click Next. A dialog is displayed, showing evidence and current status of data
available for export to the Passware folder, including index words, hiberfil.sys
files, EFS passwords, and registries.
6. You can optionally add one file in the Extra Data field to be added to the
Passware Export Folder.
7. Click Finish. EnCase displays a green progress bar and an Export Successful
dialog when the exporting process completes.
EnCase creates a text configuration file for Passware that includes system
information.
When you add additional words to the Passware dictionary list, EnCase exports the
full dictionary list, overwriting previously exported data.
You can begin the export process alternately by right-clicking an evidence file entry,
then selecting Open with > Passware.
The result is Passware displays data associated with the evidence file selected.
2. Select Open with > File Viewers. The Passware configuration dialog is
displayed.
Note: You must add [passwaredata] [file] to the Command Line field.
2. Enter your email and password in the Sign in box and click Login or, if you
have not registered with OpenText, enter your email and password in the
Register box and click Create account. The My Support welcome page is
displayed.
3. Select Products on the top menu bar. The My Support Products page is
displayed.
4. In the search box, enter the name of the product for which you want to
download Encryption Module installers.
5. Select the Software Download link. The product page displays folders with
current and recent version numbers.
6. Select the EnCase Encryption Modules folder link. The page displays available
encryption module installers.
8. Copy the installer to the destination workstation and run the executable. The
installer dialog is displayed.
– If you do not have or cannot get the SDMCFG.INI file, try creating a new
empty text file with this name instead. It must be there to work (even if it
is an empty file).
2. Restart EnCase.
Once these steps are completed, SafeBoot is displayed in the Help > About
screen.
Note: If the Export Restricted license flag is not enabled or the integration
DLL files are not properly installed, the physical device mounts, but the
encrypted file structure cannot be parsed. Since SafeBoot overwrites the
original MBR for the boot disk only, always preview the boot disk first,
then preview any other disk in a multi-disk machine configuration.
2. In the Evidence tab, click the device under the Name column.
3. When prompted, select the appropriate encryption algorithm from the list, then,
in online mode, enter a user name, server name, machine name, and password.
The SafeBoot encrypted drive is parsed.
The offline dialog is similar. The Online check box is blank and only the
Machine Name, Transfer Database field, and Algorithm are available:
4. Save the case once a successful decryption is complete. The credentials entered
in the dialog are stored in Secure Storage, eliminating the need to enter them
again.
When a decryption is successful, the Tree pane shows a SafeBoot folder, the Table
pane contains a list of decrypted files while the Text pane shows contents of a
decrypted file.
Note: The Safeboot encryption .dll causes EnCase to crash when the encryption
algorithm for the server does not match the one implemented in SBAlg.dll.
• Username/password
• Challenge/response
When decrypting data that uses this form of encryption, begin as follows:
1. Add your evidence or preview the local disk that contains the Check Point
encrypted volumes.
3. A dialog is displayed and prompts you for credentials. EnCase supports two
types of authentication: username/password and challenge/response. EnCase
determines which type of authentication is used based on the username you
enter in the dialog.
1. Select Evidence > Table, and select a disk. A dialog is displayed showing the
username and location of the recovery file path.
2. Click Next.
3. The Password Authentication dialog is displayed, with the password in the text
field.
The screenshot belowshows a successful decryption. Note the folder tree in the
Evidence tab, and the DLL files listed in the Table tab.
If the decryption was unsuccessful or if the user canceled the dialog, this screen is
displayed:
Note that the highlighted string “Protect!” in the View pane is a Check Point
indicator that the disk is encrypted.
1. Select Evidence > Table, and select a disk. A dialog is displayed showing the
username and location of the recovery file path.
2. Click Next.
3. The following dialog indicates that the Challenge-Response form of Check Point
Full Disk Authentication was used to encrypt the selected disk. Use the Check
Point tool to generate a response for the challenge shown in the dialog. Copy
the response value from the tool to the EnCase dialog.
4. Click Finish.
If the EnCase Evidence tab and the Table pane display as they do below, with
no partitions, folders, or files visible, and if the “Protect!” string is visible in the
View pane, then the decryption failed (or the user canceled the dialog). It is
possible that the response is incorrect or that Check Point is unable to decrypt
the selected disk.
When BitLocker is enabled, a large file is created that holds all unallocated (UAC)
space, minus six gigabytes.
You can find a list of currently supported versions of BitLocker in your product's
latest release notes.
The recovery password is stored in a file with a GUID name (for example,
AE15E17A-C79E-4D3F-889F-14FBF6E0F9E.TXT).
These keys are matched by Key Protector GUID in the BitLocker metadata.
3. The Recovery Key option button is selected by default. Browse to the location of
the required .BEK recovery key.
4. Browse to the folder containing BitLocker keys and select the specified .BEK file.
5. Click OK.
5. Find and open the .TXT file that matches the Password ID.
6. Copy and paste the recovery password into the BitLocker Credentials dialog.
7. Click OK.
The following AutoUnlock registry keys are displayed for three volumes:
The following displays Secure Storage after the Analyze EFS process:
1. Add a BitLocker encrypted primary RAID 1 volume into EnCase using Add
Device or drop and drag. This primary volume consists of:
5. Add each additional physical disk in order, repeating steps 2-4 for each disk, as
needed.
To parse a RAID 5 drive, you must first build the RAID in EnCase.
1. Add a BitLocker encrypted primary RAID 5 volume into EnCase using Add
Device or drop and drag. This primary volume consists of:
2. Add each additional physical disk using Add Device or drop and drag.
Note: The BitLocker Credentials dialog does not display until you finish
building the RAID.
3. When you finish building the RAID, EnCase displays the BitLocker Credentials
dialog.
When you preview a machine's disk or open an evidence file, the Master Boot
Record (MBR) is checked against known signatures to determine whether the disk is
encrypted. The SecureDoc signature is WMSD.
Each SecureDoc user has a key file which can contain multiple keys encrypted using
a password associated with the file.
• SDForensic.dll
• SDC.dll
• SDUser.dll
• The path to the file containing the user keys (extension .dbk).
• The password associated with the key file.
• The path to the emergency disk folder corresponding to the physical disk
under examination.
3. If the credentials are correct, EnCase decrypts the disk and parses the file
system structure.
4. When you save the case, the ranges of encrypted sectors and the original MBR
are retained in the case file for previewed drives as well as evidence files.
The disk view shows encrypted information in the Text and Hex panes for
encrypted drives.
A local acquisition at the physical device level results in acquisition of all decrypted
logical volumes, when the correct credentials are provide.
Note: To obtain decrypted data, perform a local acquisition on the result of the
remote acquisition by providing the correct credentials.
3. Open the device and enter your SecureDoc credentials when prompted.
4. Click OK. EnCase parses the file system, and the SED is unlocked and presented
to EnCase (but it is still invisible to the OS).
Note: Self encrypting drives cannot be unlocked if the drive has been
write blocked.
To decrypt, you need a cert file for your dongle to activate the EDS module in
EnCase, and you will need two DLLs that can only be obtained if you have access to
a licensed copy of GuardianEdge. These DLLs can be found under C:\Program Files
\GuardianEdge.
EnCase also supports decryption for Symantec Endpoint Encryption, the successor
product to GuardianEdge encryption products. To view supported versions of
Symantec Endpoint Encryption, see “Symantec Endpoint Encryption support”
on page 776.
• AES128
• AES256
The following DLL files are required to decrypt an SEE encrypted device on a 32-bit
examiner machine:
• EAECC.dll
• EPCL32.dll
The following DLLs files are required to decrypt an SEE encrypted device on a 64-bit
examiner machine:
• EAECC.dll
• EPCL.dll
Note: The version of the EAECC.dll must match the product version of SEE.
In addition to the above, you may need to install the following if they are not
already present on the system:
You can obtain the DLL library you need from the SEE installation folders on the
client machine.
Because GEHD has domainless client administrators, you need to use a default field
for the domain:
1. Make sure you have the EnCase Decryption Suite module with PC Guardian
support installed. Check by selecting Help > About.
2. In the domain field, enter EA#DOMAIN as the client administrator account.
PC Guardian-Guardian Edge\EAHD\EAECC.dll
PC Guardian-Guardian Edge\EAHD\EPCL32.dll
PC Guardian-Guardian Edge\EAHD\msvcp71.dll
PC Guardian-Guardian Edge\EAHD\msvcr71.dll
PC Guardian-Guardian Edge\EAHD\EPCL32.dll
PC Guardian-Guardian Edge\EAHD\EPcrypto.dll
If you are using a GuardianEdge Overall Authority (GEOA) account, you must use
EA#DOMAIN for the domain.
• PGPsdk.dll
• PGPsdk.dll.sig
• PGPce.dll
• PGPce.dll.sig
5. Place these four files in your EnCase Endpoint Investigator installation folder:
[Encase_Installation_Dir]\Lib\PGP\WDE
Once these files are added to the correct folder, you can decrypt evidence encrypted
with Symantec Endpoint Encryption.
To use Sophos SGN, you must obtain keys from a forensic administrator.
1. Open the SafeGuard Management Center to create a virtual client on the Sophos
SGN server.
3. Select the Keys and Certificates option from the left navigation pane.
10. The new virtual client name (EnCaseVirtualClient) is displayed in the right
pane.
11. Select the new virtual client (EnCaseVirtualClient) in the right pane.
4. The keys (KEKs) encrypting the data encryption key (DEK) of the current
partition display.
To populate the EnCase Challenge/Response dialog with data obtained from the
Sophos SGN website, complete the steps described in the following section.
The plain DEK of the partition is derived from the KEK obtained previously thus
decrypting the sector data.
4. Enter your security officer ID and password, and click Log on.
6. Select Virtual Client, then select the virtual client that was provided to EnCase
(recoverytoken.tok). Click Next.
9. The Select key/key file for Virtual Client recovery dialog is displayed.
10. Click the browse icon and select the key based on your previously selected key
ID in EnCase, then click Next.
12. Enter the challenge codes from the EnCase Challenge/Response dialog in the
challenge fields.
1. Return to the EnCase Challenge/Response dialog and enter the response codes
obtained from the Sophos SGN website in the Response Code fields.
2. Click OK to complete the challenge/response data collection process.
2. EnCase detects the device and displays a username and password dialog.
4. Click OK.
5. Once a successful decryption is complete, save the case. The credentials entered
in the dialog are stored in Secure Storage, eliminating the need to enter them
again.
• AES192
• AES256
• DES
• 3DES
1. In the SGE credentials dialog, enter a username but leave the password field
blank.
2. Click OK.
4. Log in as Administrator. Click the Windows Start button, then click All
Programs > Utimaco > SafeGuard Easy > Response Code Wizard.
6. Click Next to begin generating a one time password (OTP). The Authorization
Account dialog is displayed.
8. Enter the User ID that was used to derive the challenge code, then click Next.
9. The Challenge Code dialog is displayed. Enter the challenge code generated by
EnCase from step 3.
12. The Summary dialog is displayed with the response code displayed in blue/
bold font.
13. In the EnCase dialog from step 3, select the code length and enter the response
code to enable decryption of the selected encrypted evidence.
15. In the Summary dialog from step 12, click Close to close the SafeGuard Easy
Response Code Wizard, or click New to generate a new response code from a
different challenge code.
In contrast, EnCase examines each hard drive individually. This creates a problem:
• SafeGuard Easy overwrites the Master Boot Record (MBR) of the boot disk only.
• Only the boot disk is detected as encrypted and then decrypted (when the correct
credentials are entered).
This means EnCase support for SafeGuard Easy is limited to decrypting only the
boot disk, because this is the only drive detected as encrypted by examining the
MBR.
Workarounds
• The internal disk holding the SafeGuard Easy kernel (disk 1).
• The external (that is, non-bootable) disk (disk 2).
There are two scenarios for decrypting files that have been encrypted with Dell Data
Protection Enterprise/Credant Mobile Guardian:
1. The dialog populates with a known user name and password, Server, Machine
ID, and Shield Credant ID (SCID). If the credentials are correct, Dell Data
Protection Enterprise/Credant Mobile Guardian files are processed and
decrypted with no further action needed.
• If the registry file is unencrypted, then the Server, Shield CID, and Machine
ID are prepopulated for the boot volume disk.
• In an offline scenario, the Online check box is blank and the Machine ID and
SCID fields are unavailable.
2. Save the case when a successful decryption is complete. The credentials entered
in the dialog are stored in Secure Storage, eliminating the need to re-enter them.
• Confirm that your EnCase Endpoint Investigator license includes the EnCase
Decryption Suite (EDS). EDS is included with EnCase Endpoint Investigator in
most countries.
• Download and run the Credant Installer on your examiner machine. You can
obtain the installer from OpenText My Support. The installer places required
Credant DLLs and the CEGetBundle.exe application in the EnCase Endpoint
Investigator \EnCase8\Lib\Credant Technologies\CMG subdirectory of your
examiner machine.
• Obtain the URL for the Dell Data Protection Enterprise/Credant Mobile Guardian
Device Server.
• Obtain an Administrator username and password.
– Administrator's login domain (for CMG 6.0 and later servers only)
– Machine ID for the target device (MUID)
– Shield Credant ID (SCID)
– Username that the key material is being downloaded for
– Password to use to encrypt the output .bin file
1. From a computer that can communicate with the Dell Data Protection
Enterprise/Credant Mobile Guardian Server, run the CEGetbundle.exe utility
from the Windows command prompt.
2. Place the .bin file downloaded from the Dell Data Protection Enterprise/
Credant Mobile Guardian server in a path accessible from the examiner
machine. Open EnCase Endpoint Investigator and create a new case or open an
existing one. EnCase Decryption Suite must be installed on the Examiner
machine.
Note: In legacy mode, you must execute this utility for each user targeted
for investigation on the target device while specifying the same output file.
The keys for each user are appended to this output file.
Note: In offline mode, the only information you must provide is the
password and server/offline server file (full path and filename to the .bin
file downloaded using the CEGetBundle.exe utility).
To enable EnCase Endpoint Investigator to identify and decrypt Dell Full Disk
Encryption:
1. Obtain a whole disk recovery key from the Remote Management Console.
2. Mount the evidence, and provide the whole disk recovery key when prompted.
The current version of Dell Data Protection supports the following modes:
• Microsoft EFS files that have already been decrypted. See “Analyze EFS”
on page 748.
• An EnCase Endpoint Investigator machine with EnCase Decryption Suite and
Credant DLLs installed.
• The CredDB.CEF file residing in the folder. This is essential, since it contains the
information to get to the decryption key.
– If the file is encrypted, the CredDB.CEF stream is automatically stored with the
file as metadata.
– If the file is decrypted, the CredDB.CEF stream is not automatically stored, as it
is not needed. This does not prevent you from storing the stream by
specifically saving it to the LEF.
Note: If an encrypted file is decrypted and added, this is noted and displayed
in the report.
There are two scenarios for using McAfee EE in EnCase: Online and Offline. Both
are described in the following sections.
Upon connecting, EnCase analyzes the Master Boot Record to detect the McAfee
Endpoint Encryption boot signature, then a dialog is displayed.
Online scenario
The Keycheck ID is pre-populated, as read from the device. The keycheck uniquely
identifies the device.
Offline scenario
Clear the Online check box and get the recovery file either directly from the ePolicy
Orchestrator (ePO) server or by using RequestMachineKey.exe from a machine that
can access the ePO Server.
When using the offline method, enter the recovery file in the McAfee Endpoint
Encryption Recovery File field.
When using either the Online or Offline method, EnCase stores the credentials
entered in the dialog in Secure Storage, eliminating the need to re-enter them.
When decryption is successful, results display in the Tree pane. Save the case.
2. Open the folder that contains your version of EnCase Endpoint Investigator.
1. On the online machine, navigate to OpenText My Support and sign into your
account.
2. Open the folder that contains your version of EnCase Endpoint Investigator.
3. Download and run VeraInstaller.exe on both the online and offline machines.
For more information about decryption keys, see the Secure Storage Tab section.
1. In the Tools drop down menu under Vera Encryption, select Export Entries.
2. Specify an output file name and path for the .JSON configuration file.
3. Transfer the configuration file to C:\VeraEx on the machine with online access
to the Vera portal. If the VeraEx utility was installed to a different location, use
that path instead.
6. Transfer the Vera decryption key to the machine running EnCase Endpoint
Investigator.
8. Select the file that was transferred in step 6. EnCase Endpoint Investigator
decrypts the files and saves the configuration files and decryption keys in
Secure Storage. For more information about decryption keys, see the Secure
Storage Tab section. If the file cannot be decrypted, you are prompted to locate
the appropriate decryption key.
Option Description
/? Display command information and usage.
files... Specifies one or more Vera metadata export files to examine.
The vif.json file name located in the current directory is
assumed by default. This file is usually exported by EnCase.
Wildcard characters ? and * may be used in the file name to
specify all matching files.
/cfg:filename Specifies the full path and file name of the Vera connection and
configuration file associated with documents referenced in the
specified export files. This option may be specified more than
once. Wildcard characters ? and * may be used in the file name
to specify all matching files.
1. Add an APFS encrypted image to your case using one of the following methods:
2. Mount the evidence by clicking on the device name. When APFS encryption is
detected, the Enter Password dialog window appears.
3. Type the password and click OK. The image is decrypted and the password is
stored in Secure Storage.
Deploy the macOS compatible agent to the target machine. The default location is in
your SAFE installation folder under …Agents/macos/installer/installer.zip.
The number of devices on your target machine may differ from the screenshot
above, but it will use the same disk labeling convention. Devices labeled disk[#] are
containers that hold system information about the APFS volumes within. APFS
volumes share the same disk number, with the added s[#], such as diskos1.
If a volume is encrypted, EnCase should detect the APFS encryption and prompt
you for your FileVault password.
In this scenario, adding disk0 will result in parsing two partitions: disk0s1 (the C
drive) and disk0s2 (a container):
You can view the disk structure on the target machine within macOS to match the
structure provided in the SAFE Network Preview:
2. Click on the Sidebar menu at the top left corner and select Show All Devices.
The sidebar expands to show containers and volumes for this device.
3. Verify that the device name selected in Disk Utility matches the device you have
mounted using the SAFE Network Preview.
Decrypting containers
EnCase Endpoint Investigator parses the volumes selected during the SAFE
Network Preview. If one or more of the volumes are encrypted, you are prompted to
enter the FileVault password. After the volume is parsed, the password is stored in
SecureStorage for future use.
This section shows you how to enable FileVault on a target machine and view a list
of users who have been enabled for FileVault decryption. Authentication issues are
sometimes the reason why an APFS encrypted volume fails to decrypt.
Enable FileVault on the target machine and specify an account for decryption:
4. Click on the lock icon in the lower left corner of the dialog. A password dialog
displays.
6. Click Turn on FileVault. You are presented with a list of users associated with
this machine.
7. Click on the Enable User button for the account that will access FileVault. A
new dialog appears, presenting you with different method to unlock your disk.
8. Select the option to use a recovery key. You will be asked to login with the key,
and the machine will restart.
If FileVault has been enabled on the target machine, it may be possible that your
user has not been properly authorized, or that the adminuserrecoveryinfo.plist
file has not been updated. After you have enabled FileVault, perform the following
steps:
2. Mount the preboot volume by running the command diskutil mount /dev/
disk1s2.
• This command will return the path where the preboot volume is mounted.
• If your preboot volume is mounted on a different disk, you must match the
command to the correct number.
5. Compare the output of this list to the list displayed in step 7 of Troubleshooting
FileVault Accounts to verify that the correct users have been enabled for
FileVault.
You must have PFX (PKCS 12 standard) certificates installed prior to parsing. PST,
EDB, and MBOX mail containers are supported.
2. Click the option icon on the top right of the Table pane to display available
options.
5. Enter the path to the PFX certificate and the password, then click OK.
The PFX certificate is decrypted and stored in Secure Storage.
The certificate is stored in Secure Storage under the E-Mail Certificates folder when
the proper password is entered. After you import the required certificates into
Secure Storage, you can parse the email container files using the View File Structure
feature in the Entry View.
The Artifacts tab lets you view and work with content.
• A Whole Disk Recovery Token (WDRT) from the PGP Universal Server
• An Additional Decryption Key (ADK) from the client machine
• The user's passphrase
2. Click the Users tab to go to the Internal Users page. Note which user displays
the Recovery icon associated with a user name.
3. Click the user name associated with the Recovery icon. The Internal User
Information page is displayed.
4. Click the Whole Disk Encryption button to see the machine associated with this
user.
7. In EnCase, enter the token key in the Whole Disk Recovery Token field of the
PGP Whole Disk Encryption credentials dialog, then click OK.
Note: You can enter the token key with or without dashes.
3. Locate the PGP SDK. Select it and drop it into the same folder as
PGPEnCase.dll.
4. In the PGP Desktop - PGP Disk window, click PGP Disk on the left and select
any disk listed.
6. In the User Access section at the bottom of the window, export the key as
an .asc file.
7. In EnCase, in the PGP Whole Disk Encryption credentials dialog, enter the full
path to the .asc file in the Additional Decryption Key (ADK) Path field, and
enter the passphrase protecting the file,
2. Click OK.
The EnCase suite can decrypt encrypted Notes Storage Facility (.nsf) documents and
send them to recipients within the same Domino server.
It also has an NSF file that represents the user's mailbox in 8.3 format in the default
path <domino installation folder>\data\mail\<user>.nsf.
Each Domino server user has a corresponding NSF file representing that user's
mailbox in 8.3 format. The default path is <Domino Installation Folder>\Data\Mail
\<user>.nsf. The Lotus Notes client is set up to use the local mailbox.
Synchronization between the local and server mailboxes occurs according to a
replication schedule determined by the Domino administrator.
Encryption of the local mailbox is not mandatory but it is advisable, because without
encryption a person familiar with the NSF file structure could read email without
needing Lotus Notes.
1. Obtain the corresponding ID file from the Domino server. All user ID files are
backed up on the server either on disk as a file or in the Domino directory as an
attachment to email.
2. Parse it using View File Structure, so that the private key is inserted in Secure
Storage.
The decryption algorithm uses a seed that is based on the basic seed from the header
and the block offset.
If the corresponding ID file cannot be parsed successfully, the Secure Storage is not
populated with the data needed to parse the locally encrypted NSF; thus, the Lotus
volume is empty.
For versions of Windows prior to Vista, you must install Microsoft Windows Rights
Management Services Client 1.0 (SP2) before running the RMS standalone installer.
EnCase stores the credentials you entered, so you do not need to enter them again.
MSO
1. Right-click the MSO protected file you want to decrypt (that is, a Word
document created with Office 2003), then click View File Structure. The View
File Structure dialog is displayed.
2. Select the Find RMS Content check box, then click OK.
EnCase stores the credentials you entered, so the next time you do not need to enter
them again.
OPC
1. Right-click the OPC-protected file you want to decrypt (that is, a Word
document created with Office 2007), then click View File Structure. The View
File Structure dialog is displayed.
1. Right-click the PST file, then click View File Structure. The View File Structure
dialog is displayed.
2. Select the Find RMS Content check box, then click OK.
In Windows 2000, however, the Master Key is protected by the user’s password hash
with a mechanism that slows down any attack. The Master Key protects the user’s
private key, and the user’s private key protects a key within the $EFS stream that
allows for decryption of the EFS encrypted file.
A large number of dictionary files (sometimes called word lists) are on the Internet,
or you can create your own list. Creating your own list may be preferable if the
person under investigation has particular interests that can be included in the list.
The web has freeware utilities you can use to create a dictionary from combinations
of letters, numbers, and characters up to a predefined length. A search engine search
for “Free Wordlist Generator” yields a number of options.
EDS can attack NT-based user account passwords and cached net logon passwords
using a dictionary attack.
• Local users
• Network users that logged on (cached domain users)
• Syskey (password mode only)
• Master Key, if the user’s SAM or domain cache can’t be accessed (due to
corruption, account deletion or Syskey protection). This is much slower than
attacking Local/Network Users.
External attack
Local users can be attacked with third party tools including freeware tools, whose
performance is much greater than EnCase because they can run on many computers
at the same time and/or use rainbow tables. EnCase can export the local user’s
password hashes in the PWDUMP format that most tools read. This is done from the
User List:
The User List of Secure Storage displays Local Users, Domain Users, Nix Users,
and/or Nix Groups from the local machine or evidence file. Information includes:
Integrated attack
• Append Digits
• Prepend Digits
• Combine Words: words are combined with each other. For example, if the
dictionary contains the words “old“ and “dog”, the result is these four words:
– old
– dog
– olddog
– dogold
The Virtual File System (VFS) module enables investigators to mount computer
evidence as a read-only, offline network drive for examination through Windows
Explorer. The feature allows investigators several examination options, including
using third-party tools to examine evidence served by EnCase.
The VFS module enables the use of third-party tools against hard drives previewed
through a FastBloc device or a crossover cable, including deleted files.
You can mount evidence at one of four levels; however, you can designate only one
mounting point at a time. To change the mounting point, you need to dismount the
evidence and mount at a new level to include the desired devices.
The four evidence mounting levels and associated VFS capabilities include:
Using the Server extension, you can also mount evidence to be shared with other
investigators through a LAN. The Virtual File System Server is discussed later.
Since VFS is mounting the evidence as a network shared drive, a local port must be
assigned. To allow recovery from errors in Windows, the VFS service runs for the
life of the Windows session. This means that the port number can be assigned the
first time the VFS service is run to mount evidence. Afterwards, the port number is
grayed out and the assigned port number cannot be changed.
1. On the Server Info tab, set the local port or use the default setting.
2. Set the Max clients allowed, up to the maximum number of clients purchased
for VFS.
Note: The Windows session must be closed to assign a new port number.
3. Click the Client Info tab to set the volume letter to be assigned to the network
share in Windows Explorer.
4. Windows Explorer assigns the next available volume letter by default. You can
also use any other unassigned letter.
Assigning a specific volume letter can be useful when attempting to virtually
reconstruct a mapped network drive, such as for a database.
If you currently have mapped networked drives or if you allow Windows to
assign the drive letter, it takes a few seconds for Windows to query the system
to find an available drive letter.
If you specify an available volume letter, the mounting is virtually
instantaneous.
A confirmation dialog informs you that the mount was successful with the
volume letter. The “shared hand” icon is displayed at the level you designated
as the mount point for the shared drive.
1. Select the Entry you want to mount in the entry window. Click Device > Share
> Mount As Network Share.
5. To mount the compound file, select Device > Share > Share as Network Share.
3. Select the parent folder of the file to view and open the file.
This is a view of the encrypted file in its decrypted state when using VFS in
conjunction with EDS:
For more information on using EDS to decrypt EFS protected files and folders, see
EnCase Decryption Suite.
22.2.5 RAIDs
You can browse RAIDs mounted inside EnCase in Windows Explorer. In this
example, a software RAID 5 comprised of three drives was mounted, then made
available for browsing in Windows Explorer with Virtual File System.
An investigator may locate a file in Windows Explorer to view or analyze and find
that it is not possible to open the file. If a file does not open, review the original data
in the EnCase interface to see if the file is valid, and is not corrupted or partially
overwritten.
For investigators, this means the RAM (sector) slack and drive (file cluster) slack are
not available to third-party tools through the Virtual File System in Windows
Explorer as a single file. However, you can access the data in slack with third-party
tools.
1. Launch EnCase.
3. Click Add evidence > Add > Local Device to load the device.
5. Clear any check marks from the Read File System column.
When the device is loaded into EnCase, the partition and file system are not
read and interpreted. You can then mount the entire device with VFS and have
it available for examination in Windows Explorer as unused disk area,
including slack space.
Another option is to copy only slack area from evidence to the examination
computer as a logical file.
3. In the From section, select All selected files, and in the To section, select Merge
into one file, then click Next.
4. In the Copy section of the Options dialog, select RAM and Disk Slack to copy
the RAM slack (also known as sector slack) and the Disk Slack (also known as
cluster slack).
6. Set the destination path and the name of the file to contain the slack and click
Finish.
7. The progress of the copying process is displayed on the bottom right and the
results are stored in the logs and the console.
The file containing the slack from the evidence is now available for examination by
third party utilities on the local examination machine.
In this example, the /(root) partition is represented by the high-dot. The /home
partition is represented by ·home.
In this example, the /(root) partition of a Solaris workstation is mounted and the
parent folder name (the partition name) is displayed as the high-dot.
Note: Windows has a limit of 264 characters in a full path and file name. This
limitation may impact some examinations in Windows Explorer, especially for
Unix and Linux devices. In this situation, the investigator may need to mount
at the partition or folder level.
1. Double-click the Virtual File System thread bar at the bottom right of the
screen, then click Yes.
2. The thread bar at the bottom right disappears, indicating the evidence was
successfully dismounted.
Note: Be sure to dismount evidence that is served through VFS before closing
EnCase. A reminder message is displayed if you try to close the case or EnCase
while evidence is mounted with VFS.
1. Mount the evidence through VFS either locally on the examiner machine, or
remotely through the VFS Server.
You can mount the evidence at the device, volume, or folder levels as described
previously. The “shared hand” icon indicates the level of the virtual file system
mount.
2. In Windows Explorer, select the gsisvr offline network drive.
3. Use antivirus software to scan the file.
With Symantec AntiVirus, for example, the Scan for Viruses option is accessed by
right-clicking the drive, and selecting it from the context menu.
The antivirus software can read the Virtual File System presented to Windows
Explorer. The requested data is served by EnCase to Windows Explorer, then to the
program for scanning.
The examination reports and logs generated by the third-party tools can be reviewed
and included in the investigator's report.
• Double-click a file served by VFS to open the data with the program assigned
according to the file extension.
3. Select the desired extension. The Details for section lists the program designated
for that extension.
4. Click Change.
Some files, such as in Unix and Linux, do not have file extensions. To view them:
2. In the Open With dialog, select the desired application from the Programs list
and click OK.
3. If the application is not listed, click Browse to find the application executable, or
allow Windows to search the Internet (if connected).
WordPad can open most text-based files to let you view the contents.
Another popular viewing program, Quick View Plus, can be used to view dozens of
file formats, without the native applications installed on the examination machine.
When you open a file mounted with Virtual File System in Windows Explorer with a
third-party tool, the Windows operating system controls the temporary file creation
on the operating system drive. Remember to check the Windows Temp folder to
perform any necessary post-examination cleanup.
• Only the machine that is running the VFS Server needs a security key (dongle)
inserted.
A security key is not required to connect to the VFS Server and access the served
data in Windows Explorer.
• The client machine(s) must have EnCase installed to access the VFS client drivers,
but can run in Acquisition mode.
The number of clients that can connect to the VFS Server depends upon the number
of VFS Server connections purchased. This information is contained in the VFS
Certificate or is programmed into the security key.
To determine if the VFS Server is enabled and to view the number of available client
connections:
2. If the VFS module is not listed, or if the number of clients is insufficient, contact
OpenText Support to purchase additional clients.
1. On the VFS Server machine (with the security key inserted), open EnCase.
• Case
• Drive/device
• Volume
• folder
Note: You have the option of creating a network share from any of the
cases, drives, or folders within it. This allows you to share only what is
necessary.
5. Since this is the VFS Server machine, select Establish local server for the
location on the Server Info tab.
6. Enter a Port number or use the default: 8177. The Server IP Address is grayed
out since the server's IP address is the one assigned to the machine where the
mount is taking place.
7. Note the server machine's IP address for use with the client.
8. Set the maximum number of clients who can connect to the server. The default
is the maximum allowed by your VFS Server certificate.
Since VFS is mounting the evidence as a networked shared drive, the serving port
must be assigned. To allow recovery from errors in Windows, the VFS service runs
for the life of the Windows session from that port.
The VFS Server can also serve the data locally to the investigator's machine. It uses
one of the server connections.
1. Select Allow IP Range and specify the high and low IP values.
7. To also mount and view the shared drive locally, leave the Mount share locally
box checked and specify a volume letter.
• By default, the volume letter field displays an asterisk, indicating that the
next available drive letter will be used. Mounting the share locally uses one
of your VFS Server connections.
• If you are serving the share to remote clients only, clear Mount share
locally. The volume letter is disabled.
The VFS Server mounts the share and allows connections on the assigned port. The
shared hand icon is displayed at the VFS mount point. You can continue your
examination while it is shared. Performance depends on the size and type of the
examined evidence, processing power of the server and client machines, and the
bandwidth of the network.
2. Reboot the machine after installation for Windows to access the VFS drivers.
When launching EnCase, it is not necessary to have a security key present.
5. On the Client Info tab, select the Volume Letter to assign the share, or accept
the next available letter.
A confirmation message is displayed.
On the client machine, the share is available in Windows Explorer as gsisvr
with the assigned drive letter. The shared computer evidence can be examined
as previously described.
A confirmation window reports that the evidence is dismounted and the connection
closed. The shared hand icon is removed, indicating that Windows Explorer has
disconnected the shared drive. Close EnCase on the client computer.
On the VFS Server machine, when all clients are finished and have dismounted the
share, close the VFS Server.
1. Double-click the flashing Virtual File System bar in the lower right corner of
EnCase.
2. You are prompted to dismount the evidence file. You can now close EnCase.
If you are using cert files, check to see that the Virtual File System certificate is
located in the proper Certs directory (typically C:\Program Files\EnCase[version
year]\Certs).
Make sure the security key is installed and working properly; check the title bar to
ensure that the software is not in Acquisition mode. You do not need to have the
security key installed on a machine connecting to a remote VFS Server.
If you are using cert files, the certificate file is issued for a specific security key.
Check the security key ID to verify it is the correct one issued for the certificate.
Select About EnCase from the Tools menu and ensure that Virtual File System
Server is listed under Modules. If the Server is not listed, you may have the wrong
cert installed, or you do not have access to the Server edition.
Confirm the IP address and port number of the Remote Server. If the IP address is
correct, ping the address to ensure connectivity.
Check to see how many machines are connected to the server, and determine how
many clients are permitted to connect to a VFS Server by selecting About EnCase
from the Tools menu on the machine running the VFS Server. Determine the
number of allowed clients by looking at the number listed next to the Virtual File
System Server module.
After adding evidence to a new drive on a client machine running EnCase, then
running Virtual File System, when you open the new drive the new evidence is not
available. Instead, the message, “Unused disk area” is displayed, rather than the
evidence added. To correct this, on the machine where EnCase is running, configure
Windows Explorer to Show hidden files, folders, and drives and to show system
files.
EnScript supports COM libraries from other applications and enables you to
automate document processing tasks and remote data retrieval through DCOM. You
can also integrate with .NET assemblies in the form of DLL files.
EnScript source code is processed internally as Unicode, but is stored as 8-bit text
unless non-ASCII text is present.
You can access EnCase App Central from within EnCase Endpoint Investigator.
Select EnScript > EnCase App Central from the application title bar to open a
browser and be directed to https://security.opentext.com/app/.
As an EnCase App Central Developer Network developer, you will receive the
following:
When the launcher opens for the first time, you are prompted to specify up to two
different file paths. You can update these paths at a later time if needed. The
EnScript Launcher queries both locations for EnScripts when you search.
Once configured, the EnScript Launcher scans the provided paths recursively,
keeping them up to date.
1. In the EnScript dropdown menu, click EnScript Launcher, or use the keyboard
shortcut Ctrl+Shift+R.
2. Enter the desired search term(s) and press Tab. Search results display in the
Matching Scripts area.
3. Use the up and down arrow keys to highlight the required script, then press
Enter to select the script.
The EnScript Launcher retains the list of paths and rescans all designated file paths
whenever loaded by EnCase Endpoint Investigator at startup. You can also
manually edit or view your file paths via the Edit Paths button or rescan via the
Rescan Paths button.
Note: The EnScript Launcher does not check for duplicate script paths. Avoid
entering script paths that overlap. Also, EnScripts run with the launcher do not
display in the MRU list under the EnScript toolbar menu.
The EnCase Physical Disk Emulator (PDE) module allows investigators to mount
computer evidence as a local drive for examination through Windows Explorer. The
PDE module permits investigators to employ numerous options in their
examinations, including the use of third-party tools with evidence served by
EnCase.
Using PDE
1. Select the device to mount as a physical disk under Entries in the Tree pane in
the Evidence tab and select Device > Share > Mount as Emulated Disk.
PDE does not use any other options in the Mount as Emulated Disk dialog Server
Info tab.
Cache options
If you select a physical device or volume (not a CD), you can decide whether to
cache data. By default, caching is disabled. Use the write cache if programs require
access to the files in an emulated read/write mode.
When a cache is enabled, changes made by programs are sent to a separate cache file
specified on your local system.
To create a new write cache file for an EnCase Differential Evidence File:
2. Select Create new cache in the Cache Type box and specify a write cache path.
To use an existing write cache file, select Use existing cache and browse to the
existing write cache file in the Write cache path field. Make sure to use a write cache
file that was created with the evidence you are currently mounting.
Caching is necessary for PDE to function with VMware. In this state, Windows
caches file deletions and additions. This is used to boot the drive with VMware as
described later in this section. Caching is also necessary when mounting certain
volume types.
CD options
If a CD is mounted, EnCase enables the CD Session to view option, which lets you
specify which session on a multi-session CD should display in Windows. The
default session is the last session on the active CD, which is the one usually seen by
Windows.
2. Choose a session.
3. Click OK to continue.
4. If a message is displayed stating that the software you are installing has not
passed the Windows Logo test, click Continue Anyway.
This lets Windows add the evidence file as a drive with its own drive letter.
Note: If using VMware, you must have the physical device number.
Verify that the evidence file has been mounted with a drive letter by browsing in
Windows Explorer. The drive letter lets you use third-party tools.
• Open hidden files: within a Windows folder, select Tools > Folder Options. Click
the View tab and select Show hidden files, folders, and drives.
• View deleted and system files and unallocated clusters.
• Mount an evidence file using the EnCase Virtual File System module.
Files and folders on the mounted device can be used in Windows in the same
manner as an additional drive, although changes will be written to cache (if in use)
instead of to the device itself.
• In EnCase, click Device > Share > Save emulated disk state.
EnCase saves the cache in the path specified for write caching. An instance
number is appended to the cache file every time you save, after the initial save.
You can later use these cache files to remount the evidence in its saved state, but
you must have all of the preceding cache files located in the same directory.
1. Double-click the flashing Physical Disk Emulator indicator in the lower right of
the application window.
2. Click Yes in the Thread Status window to cancel the disk emulation.
The purpose of the final cache is to create a compressed and merged Differential
Evidence File (*.D01) containing the cached data. Select the Save Emulated Disk
State option to have multiple cache files for the same mounted evidence session. The
final cache merges all these files. If you do not need to save the final file, select
Discard final cache.
Use the Differential Evidence File to open the evidence file and view the emulated
disk with the cached changes applied.
6. Browse in the Write cache path field to find the *.D01 file.
After the disk mounts, Windows Explorer reflects the cached changes.
When the device is dismounted, a status screen is displayed indicating the disk
dismounted successfully.
Note: Be sure to dismount evidence that is served through PDE before exiting.
A reminder message is displayed if you attempt to close the case or EnCase
while evidence is mounted with PDE.
When opening a file mounted with PDE in Windows Explorer with a third party
tool, the Windows operating system controls the temporary file creation on the
operating system drive, and any necessary post-examination cleanup is more
involved.
1. Open the file served by PDE to have Windows Explorer request and receive the
data from EnCase.
2. Open the data with the assigned program according to the file extension.
Quick View Plus is a popular viewing program, which allows the investigator to
view dozens of file formats without the native applications installed on the
examination machine.
Malware scanning
A common use for EnCase PDE is to mount computer evidence for scanning for
viruses, Trojans, and other malware programs.
1. Mount the drive or volume from the evidence file through PDE.
• Use the Windows Initialize Case module from the Case Processor EnScript
to determine the operating system.
• Check the contents of the boot.ini file, which is located on the partition root.
• Examine the folder structure, noting the following:
Windows 2000, XP, and 2003 Server all use the C:\Documents and Settings
folder for user profiles and folders.
Windows NT and 2000 use the C:\WINNT folder for the system root.
Windows 9X, XP and 2003 Server use the C:\Windows folder for the system root.
2. Mount the physical disk containing the operating system using Physical Disk
Emulator. Make sure to enable caching.
3. Determine the physical disk number assigned to it using one of these methods:
This information is provided when the device is mounted.
Select the Disk Management option: right-click My Computer in Windows, then
select Manage.
Notes
7. In the Name the Virtual Machine dialog, enter a virtual machine name.
9. Click Next.
10. Specify the amount of memory for VMware to use, then click Next.
12. Click Next to accept the default setting in the Select I/O Adapter Types dialog.
13. Select Use a physical disk (for advanced users) and ignore any subsequent
warning messages.
14. Select the disk that represents the mounted drive using PDE.
15. Accept the default setting of Use Entire Disk, then click Next.
16. Accept the default disk file specified in the Specify Disk File dialog, then click
Finish.
If the disk file is not recognized as a virtual machine, you can change the name
of the file. Do not change the .vmdk extension.
VMware returns to the main screen, displaying the newly created virtual
machine.
1. Start VMware.
2. Click the link for Start this virtual machine next to the green arrow. The
evidence file is write protected by EnCase, but PDE enables a write cache that
interacts with VMware as if it were mounting a disk in read/write mode. When
the virtual machine starts, the operating system is displayed as if the examiner
machine were booting the drive. It boots in the same manner as the native
machine.
As with booting restored hard drives, the virtual machine may require a user name
and password to proceed.
Since popups can cause driver problems, save the state of the virtual machine
regularly.
Live computer evidence (network nodes in EnCase Endpoint Investigator and local
CDs) can be mounted with PDE but cannot be booted with VMware.
You must launch VMware after emulating the disk with PDE, as VMware does not
recognize a physical drive added since it was started. In addition, VMware does not
successfully boot evidence files which contain Windows with a non-default IDE
driver. This is a known issue.
What do I do if I see the message “The file specified is not a virtual disk” after
running the New Virtual Machine wizard?
After completing the new virtual machine wizard in VMware, you may receive an
error message (“The file specified is not a virtual disk.”). This issue is with VMware.
Running the new virtual machine wizard again usually resolves this issue.
If your evidence is successfully mounted, but VMware states that the physical disk
on which the image is mounted is not a valid physical disk, this may be a result of a
non-IDE device on a physical device lower than the emulated disk.
The EnCase PDE module installs GSI-specific IDE drivers, which are loaded to
emulate the disk as a drive in Windows with an assigned drive letter. A virtual IDE
controller is created that can be seen in Device Manager. If Windows is allowed to
load default IDE drivers, the module will not work properly. You can prevent this
by canceling the attempt from the popup window. Once you have bypassed this
message, you can save the state so that the next time the system reboots, Windows
does not attempt to load the drivers again.
The VMware “suspend and resume” feature lets you save the current state of your
virtual machine, then resume later with the virtual machine in the same state as
when you stopped it. Once you resume and do additional work in the virtual
machine, there is no way to return to the state on which the virtual machine was
when you suspended it. To preserve the state of the virtual machine so you can
return to the same state repeatedly, you must take a snapshot. For instructions about
using snapshots, refer to the VMware Knowledge Base (https://kb.vmware.com/s/).
The speed of the suspend and resume operations depend on how much data
changed while the virtual machine was running. In general, the first suspend
operation takes slightly longer than later operations. When you suspend a virtual
machine, it creates a file with a .vmss extension. This file contains the entire state of
the virtual machine. When you resume the virtual machine, its state is restored from
the .vmss file.
1. If your virtual machine is running in full screen mode, return to window mode
by pressing Ctrl + Alt.
1. Start the VMware Workstation and choose a virtual machine you have
suspended.
Note: Any applications you were running when you suspended the
virtual machine are running, and the content is the same as when you
suspended the virtual machine.
If you are using cert files, check to see that the PDE certificate is located in the Certs
directory (typically C:\Program Files\EnCase8\Certs).
Make sure the security key is installed and working properly (check the title bar to
ensure that the program is not in Acquisition mode).
If you are using cert files, check the security key ID to verify it is the correct one
issued for the certificate.
Although menus exist for PDE Server operation, they are currently not functional.
A message is encountered stating that PDE cannot remove the device when
attempting to dismount the device mounted
This error message may occur if Windows is accessing a file on the mounted device
(for example, the directory is opened in Windows Explorer or a file is opened in a
third-party application). To resolve the issue, close all Windows applications
accessing the mounted device, then click OK.
This issue is due to the device driver not being released properly. The only way to
resolve this issue is to close all applications (including the EnCase application) and
reboot the examiner machine. You should not encounter the error again when the
machine is rebooted.
FastBloc SE
When the FastBloc SE module write blocking capability is enabled, it ensures that no
data is written to or modified on a write blocked device.
Three modes are available when using the FastBloc SE module on a USB, FireWire or
SCSI device:
4. Click Write Blocked. The progress bar indicates EnCase is waiting for a device
to be inserted.
Note: Because some SCSI devices are not initially hot swappable, you may
have to use a hot swappable carrier to protect the device, such as the
StarTech DRW150SCSIBK SCSI drive bay.
6. Click Close.
1. Click the New icon on the top toolbar to open a new case and complete the
required information.
3. Blue check Local Drives in the right pane, then click Next.
In the Choose Deviceswindow, on the write blocked channel, the device and
volume (if present) each have a green box around their icons in the
Namecolumn, and a bullet is displayed in the Write Blocked column for each.
4. Click Write Protected. The progress bar indicates EnCase is waiting for a device
to be inserted.
Note: Because some SCSI devices are not initially hot swappable, you may
have to use a hot swappable carrier to protect the device, such as the
StarTech DRW150SCSIBK SCSI drive bay.
6. Click Close.
1. Select the Safely Remove Hardware icon in the System Tray in the lower right
corner of the task bar. In Windows 7 and Windows 8, the icon is labeled Safely
Remove Hardware and Eject Media.
2. Remove the device physically when the wizard confirms safe removal.
25.3 Troubleshooting
The Write Block option does not display in the Tools menu
Check that the security key is in the machine. If the security key is missing or not
functioning properly, EnCase opens in Acquisition mode.
Check to see if the subject hard drive is spinning. If the device is connected via an
external drive bay, shut down the computer and try connecting the power connector
(not the data connector) to a Molex® power cable directly from the computer.
Restart the computer. If the drive starts spinning, shut down the computer again and
swap cables.
If the subject drive does not spin, or is making unusual sounds (whirring, clicking,
etc.), the drive may be defective and you may be unable to acquire it by usual
methods.
If the subject drive is spinning, check the data cables. If you are using an 80-wire
cable, try using a 40-wire cable.
Check the USB or FireWire port to ensure proper functioning. Insert a known good
device. Make sure the port is recognized in Device Manager.
If you can see the physical drive but cannot see the contents of the drive, EnCase
may be in Acquisition mode. This may indicate that the security key is not installed.
You may have a corrupt version of EnCase. Uninstall EnCase, then download and
reinstall the latest version.
Try to acquire on a different machine. This helps pinpoint the problem, as it may be
a hardware or operating system conflict.
If the acquisition started at a normal speed, then rapidly decreased later in the
acquisition, EnCase probably encountered bad sectors on the subject drive. Because
the software makes multiple attempts at reading bad sectors, acquisition time may
increase.
If you are acquiring to external media (that is, the storage media is an external hard
drive) transfer rates are significantly slower than with a directly connected hard
drive.
If the examiner machine has an old or slow storage drive, the acquisition is limited
by the drive's write speed.
If you are acquiring a newer drive, an 80-wire cable allows faster throughput.
Ensure the FireWire/USB cable is securely connected at both ends.
If FireWire is not available, use a USB 2.0 connection (USB 2.0 is up to 40 times faster
than USB 1.0). In addition, when using USB, limit any other CPU-intensive tasks
during the acquisition, since these contribute to a loss of transfer speed.
Use FireWire ports whenever possible, since the interface is faster than USB.
The data integrity of the cable may be an issue. If you are using an 80-wire cable, try
using a 40-wire cable, a shorter IDE cable, and/or a shielded IDE cable.
There are different hash values each time the drive is hashed
This indicates a failing drive. Because the number of sector errors increases each
time, hash values change. Since the first acquisition typically contains the least
number of bad sectors, use the file from that acquisition for analysis.
This can indicate a defective drive. Ensure that the cables are securely connected to
the controller and the drive.
If the subject drive is in an enclosure when you try to acquire it, it may become hot
during the acquisition. Try removing the drive from the enclosure to keep it cooler.
This may reduce the number of sector errors.
If you are using legacy security keys or legacy License Manager, you can confirm
you security key is working correctly by looking at the title bar of your desktop
client.
If you are using legacy security keys or legacy License Manager, and if No Cert or
No V7 Cert displays in the window title bar, verify that the correct certs are placed
in the License Manager certs folder. If Acquisition displays in the window title bar,
the program has lost contact with your security key. There are several possible
causes:
Cause Action
License Manager settings aren't See Configuring License Manager Options in the user
configured in the client guide of your EnCase product.
The License Manager service 1. Close the desktop client.
started before the CodeMeter 2. Open services.msc.
service
3. Right-click on the License Manager service and
select Properties.
4. Set Startup type: to Automatic (Delayed Start).
5. Click Apply.
6. Stop and Start the License Manager.
7. Repeat this process for the SAFE service.
8. Open the desktop client.
The security key is damaged Order a replacement from OpenText Support.
The security key was removed Replace the security key and restart the License
from the computer running Manager service.
License Manager
The wrong security key is inserted Replace the security key with your License Manager
into the computer running security key and restart the License Manager service.
License Manager
The USB port is damaged, or the Try a different USB port, or install the appropriate
security key driver is not installed security key drivers for your USB port.
Cause Action
The electronic license is inactive If the license was inadvertently deactivated, check if any
recent hardware changes have occurred. This is
especially common in virtualized environments. In
some circumstances, hardware changes will require
reinstallation of the SAFE and License Manager.
Node is not a SAFE The agent (or possibly another process) is using the
SAFE port on the SAFE machine. Perform the following
or steps:
Invalid Command 58 1. Uninstall the agent from the SAFE, or stop and
disable the service. See section 4.13 “Stopping and
removing agents” in OpenText EnCase SAFE - User
Help (ISSAFE-H-UGD).
2. Stop the SAFE with the command net stop safe.
3. Restart the SAFE with the command net start
safe.
There may be times when a processing job performs prohibitively slow or becomes
unresponsive. The following steps can resolve these issues:
1. Optimize EnCase Endpoint Investigator data transfer rate by ensuring all case
files, cache files, and evidence files are on distinct, local drives.
3. Perform the steps outlined in the section Removing Previous Files and Artifacts.
4. Verify that your evidence image was generated by an EnCase product. Images
generated by third party applications are not supported.
Be sure to back up all files and folders before performing the following steps:
Caution
Warning: all application settings will be removed.
1. Navigate to C:\Users\%username\AppData\Roaming\EnCase\.
3. Navigate to C:\ProgramData\EnCase\.
7. Install EnCase Endpoint Investigator, appending the installation path with the
product version. See “Installing EnCase Endpoint Investigator” on page 42 for
more information.