How to do it...

The steps for Event log analysis using Magnet AXIOM are as follows:

  1. Open the case you used for the Recycle Bin forensic analysis and go to the OPERATING SYSTEM artifacts list again, but now choose Windows Event Logs, as in the following figure:
Figure 7.11. Operating system artifacts list
  1. As you can see in the preceding figure, we have a huge number of event logs. To make your analysis easier, you can sort them. For example, we used the Created Date/Time column to sort our event logs. You can see partial results in the following figure:
Figure 7.12. Sorted Event Logs records

Of course, you can use other columns to sort your logs, for example Event ID or Event Description Summary—it depends on the specific requirements of your case.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.149.233.72