πŸ”
Windows Forensic Handbook
search
⌘Ctrlk
πŸ”
Windows Forensic Handbook
  • πŸ‘‹Welcome
  • Artifacts by Type
    • πŸ—„οΈRegistry Artifacts
    • πŸ“‚Filesystem Artifacts
    • πŸ“…Event Log Artifacts
  • Artifacts by Activity
    • πŸƒβ€β™‚οΈExecution
    • πŸ—’οΈFile Activity
    • πŸ‘¨β€πŸ”§Account Activity
    • 🌎Network Activity
      • Evidence of Network Activity
      • Destination Identification
      • Source Identification
        • Task Scheduler Files
        • Task Scheduler Operational Log
        • EventID 4624: An account was successfully logged on
        • EventID 21: Session logon succeeded
        • EventID 24: Session has been disconnected
        • EventID 1149: User Authentication Succeeded
      • Transmit Volume
      • Firewall Activity
      • Wireless Activity
    • πŸ”Browser Activity
    • πŸ–₯️System Enumeration
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Artifacts by Activitychevron-right
  2. 🌎Network Activity

Source Identification

Task Scheduler Fileschevron-rightTask Scheduler Operational Logchevron-rightEventID 4624: An account was successfully logged onchevron-rightEventID 21: Session logon succeededchevron-rightEventID 24: Session has been disconnectedchevron-rightEventID 1149: User Authentication Succeededchevron-right

Last updated 2 years ago