Solution Guide

4 Contents
Checking the Installation . . . . . . . . . . . . . . 81
Finding Files on the Network
. . . . . . . . . . . . . . 81
Analysis Using FTK
. . . . . . . . . . . . . . . . . . . . 82
Open an Existing Case
. . . . . . . . . . . . . . . 82
Processing Case Evidence
. . . . . . . . . . . . . 82
Analysis Using EnCase
. . . . . . . . . . . . . . . . . . 82
Open an Existing Case
. . . . . . . . . . . . . . . 82
Create an Analysis Job
. . . . . . . . . . . . . . . 83
Run an Analysis Job
. . . . . . . . . . . . . . . . 83
Performing a Signature Analysis
. . . . . . . . . . 84
Viewing Signature Analysis Results
. . . . . . . . 84
6Present. . . . . . . . . . . . . . . . . . . . . . . . . . 85
How to Create Reports Using the Dell Digital
Forensics Solution
. . . . . . . . . . . . . . . . . . . . 85
Create and Export Reports Using EnCase 6
. . . . 85
Reports Using FTK
. . . . . . . . . . . . . . . . . . 86
7 Archive . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Client One-Click Archive Solution. . . . . . . . . . . . 88
Dell Backup Recommendations
. . . . . . . . . . . . . 89
Backup of Evidence and Case files
. . . . . . . . . 89
Off-host vs. Network
. . . . . . . . . . . . . . . . 90
How to Archive Using the Dell Digital Forensics
Solution
. . . . . . . . . . . . . . . . . . . . . . . . . . 93
On-Demand Archiving
. . . . . . . . . . . . . . . 93
Requirements
. . . . . . . . . . . . . . . . . . . . 93
Installation
. . . . . . . . . . . . . . . . . . . . . 93