Forensic data

Malicious activities on a machine can be carried out by viruses, malware, and ransomware. The other case that may require investigations is stealing or changing data on a machine by means of different programs. Such activities may need to be investigated but it is possible only if you keep digital evidence on a machine to investigate. Unfortunately, evidence (files, traces, and so on) may be deleted or a machine may become unavailable.

The backup option called Forensic data allows you to collect digital evidence that can be used in forensic investigations. The following items can be used as digital evidence: a snapshot of the unused disk space, memory dumps, and a snapshot of running processes. The Forensic data functionality is available only for an entire machine backup.

Currently, the Forensic data option is available only for Windows machines with the following OS versions:

Note
• After a protection plan with the Backup module is applied to a machine, the forensic data settings cannot be modified. To use different forensic data settings, create a new protection plan.
• Backups with forensic data collection are not supported for machines that are connected to your network through VPN and do not have direct access to the Internet.

The supported locations for backups with forensic data are:

Backups with forensic data are automatically notarized. Forensic backups allow investigators to analyze disk areas that are usually not included in a regular disk backup.

Forensic backup process

The system performs the following during a forensic backup process:

  1. Collects raw memory dump and the list of running processes.
  2. Automatically reboots a machine into the bootable media.
  3. Creates the backup that includes both the occupied and unallocated space.
  4. Notarizes the backed-up disks.
  5. Reboots into the live operating system and continues plan execution (for example, replication, retention, validation and other).

To configure forensic data collection

  1. In the service console, go to Devices > All devices. Alternatively, the protection plan can be created from the Plans tab.
  2. Select the device and click Protect.
  3. In the protection plan, enable the Backup module.
  4. In What to back up, select Entire machine.
  5. In Backup options, click Change.
  6. Find the Forensic data option.
  7. Enable Collect forensic data. The system will automatically collect a memory dump and create a snapshot of running processes.

    Note Full memory dump may contain sensitive data such as passwords.

  8. Specify the location.
  9. Click Run Now to perform a backup with forensic data right away or wait until the backup is created according to the schedule.
  10. Go to Dashboard > Activities, verify that the backup with forensic data was successfully created.

As a result, backups will include forensic data and you will be able to get them and analyze. Backups with forensic data are marked and can be filtered among other backups in Backup storage > Locations by using the Only with forensic data option.

How to get forensic data from a backup?

  1. In the service console, go to Backup storage, select the location with backups that include forensic data.
  2. Select the backup with forensic data and click Show backups.
  3. Click Recover for the backup with forensic data.

You can use the provided memory dump with several of third-party forensic software, for example, use Volatility Framework at https://www.volatilityfoundation.org/ for further memory analysis.