United States

Proactive Forensics: Enabling the Last Access Timestamp

Dec 03, 2013
From the Advisory Institute

Defining Issues: Forensic Technology

>>View the series

The success of an investigation can depend on the steps taken before an incident occurs. Proactively setting computer functions, such as timestamps, to capture critical user activities is an important component of incident readiness.

This article introduces last access timestamps and explore the implications of disabling them.

 

Read Proactive Forensics: Enabling the Last Access Timestamp

 

Contact KPMG

Kelli Brooks

Kelli Brooks, Principal
kjbrooks@kpmg.com

Ed Goings

Ed Goings, Principal
egoings@kpmg.com