Introduction to using FTK Enterprise

Introduction to using FTK Enterprise

Summary

This course covers the various features and processes involved with using AccessData's FTK Enterprise. This includes deployment of remote agents, remote capture and analysis, memory analysis, user and roll management, and more.

Duration

1 minute

Content

This module will discuss agent configuration at the case level
This module will discuss how to configure an agent in the database view.
This module discusses how to populate the agent list and how to assign roles to the computer in the agent list
This module discuss how to export an audit log
This module discusses the use of and how to create roles in Enterprise
This module discusses how to push an agent to a computer
This module discusses and demonstrates how to manually install an agent on a remote computer and how to use the command line to install the agent.
This module will discuss and demonstrate how to setup LDAP authentication and use Active Directory to populate the computer lst
This module will demonstrate how to kill a process in the volatile data tab.
This module will demonstrate how to wipe a file in the volatile data tab.
This module will demonstrate how to use batch remediation to kill a process and wipe a file across a range of addresses.
This module will demonstrate how to use batch remediation to put a file on a remote computer and execute a command on a remote computer
This modules demonstrates how to collect Volatile Registry Information
This modules discusses how to capture volatile data and what information is contained in the results.
This module demonstrates how you can search the memory of a remote computer using Enterprise.