This document provides an overview of enterprise forensics from Mona Arkhipova of QIWI. It discusses common use cases for enterprise forensics including internal incidents, external incidents, and fraud investigations. It then outlines the steps of a typical live response including collecting system details, network information, processes, logs and disk/memory images. Specific collection for Linux and Windows systems is also covered. Forensic toolkits for both operating systems are listed and carving techniques are discussed for deep diving non-volatile evidence through timelines, file filtering and malware analysis. The document concludes with an overview of QIWI's forensic lab and tools used as well as considerations for reporting.
Related topics: