Solution Guide
Contents 3
Scalability . . . . . . . . . . . . . . . . . . . . . . . . 64
Security
. . . . . . . . . . . . . . . . . . . . . . . . . 64
Physical Access Layer
. . . . . . . . . . . . . . . 64
Administrative Control Layer and Active Directory
65
Computer-Based Security Layer and
Active Directory
. . . . . . . . . . . . . . . . . . 65
Tiered Storage
. . . . . . . . . . . . . . . . . . . . . . 66
Matching Evidence Archiving and Retrieval to the
Life of the Case
. . . . . . . . . . . . . . . . . . . . . . 67
How to Set Up Storage Security Using the Dell
Digital Forensics Solution and Active Directory
. . . . 68
Creating and Populating Groups in Active Directory
68
Applying Security Policies Using Group
Policy Objects
. . . . . . . . . . . . . . . . . . . 69
Creating and Editing GPOs
. . . . . . . . . . . . . 69
Editing a New GPO (Windows Server 2008)
. . . . 70
Active Directory Support for Secure Password
Policies
. . . . . . . . . . . . . . . . . . . . . . . 70
Active Directory User Accounts
. . . . . . . . . . 71
Create a Non-administrative User Account
. . . . 73
Setting Up Security for Individual Case and
Evidence Files
. . . . . . . . . . . . . . . . . . . 74
5 Analyze . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Types of Analysis. . . . . . . . . . . . . . . . . . . . . 77
Hash Analysis
. . . . . . . . . . . . . . . . . . . . 77
File Signature Analysis
. . . . . . . . . . . . . . . 78
What is Distributed Processing?
. . . . . . . . . . . . 78
Using Distributed Processing in FTK 3.1
. . . . . . . . 79