Overview
This lab is part of a series of lab exercises intended to support courseware for Forensics training. The development of this document is funded by the Department of Labor (DOL) Trade Adjustment Assistance Community College and Career Training (TAACCCT) Grant No. TC-22525-11-60-A-48.
Log analysis is an important task in digital forensic investigations. It can give insight to investigators about potential issues that caused a data breach. Operating systems and applications often document key events in logs. Logs can contain valuable information such as failed login attempts, significant operating system events, user administration events, web server events, and other pertinent information related to security on devices. Applications use logs to document key events and also can be used by the vendor to troubleshoot issues with the application.
OUTCOMES:
In this lab, you will learn to:
- Examine Windows Event Logs
- Examine Windows IIS Logs
- Examine Linux Log Files