: Briefly state the purpose of the analysis (e.g., investigating a simulated data breach).

: Checking for login/logout times and service failures.

: Tools like Autopsy , FTK Imager , or EnCase used to browse the image. Artifact Recovery : List specific artifacts examined: