ABSTRACT

Not all the data required for an investigation will reside on a

user’s PC; therefore, you will need to gain access to the same

files and directories that the user has access to. The first thing

to do is to disable the user’s ID. Be sure that the administrator

verifies how the user’s profile and accountsmight be affected

if the user’s ID is disabled. Only after verifying that no data

will be lost, altered, or destroyed by disabling the ID should

the administrator proceed to disable the user’s ID. Security

personnel or someone with administrative authority should

disable the users’ ID. Operations personnel or a systems/data

security office can do this. The easiest way to disable the

user’s ID is to change the password, but this is not the best

approach, as the user could regain access if he or she is able

to guess the new password. Be sure that the administrator

disables the ID but does not delete it. In some security setups,

deleting a user ID will cause data and files to be deleted as

well. Because this is not what you want to happen, only

disable the ID. When the ID is disabled, the next and most

important step is to copy all the files to which the user had

access. This provides a backup for your investigation, as the

data cannot be quarantined. The confiscated data, however,

cannot be used by the business for as long as it takes to

conduct your investigation.