Resource Center

Webinars Webinars

Tips & Tricks // Analyzing Linux Artifacts

You never know where your investigation may take you; and you need to be prepared to investigate evidence wherever it may be, including Linux.

Whether you’re working a malware or ransomware incident response case in an enterprise setting or you show up to a crime scene and your suspect’s computer is a Linux system, having a base-level understanding of Linux artifacts and how to analyze them will keep your investigation moving.

In this Tips & Tricks session we’ll highlight some important Linux artifacts including User Accounts, SSH Activity, System Logs—and more—and how they can be analyzed using AXIOM Cyber or AXIOM.

View the Webinar

Start modernizing your digital investigations today.

Ready to explore on your own? Start a Free Trial

Top