Contact Sales
Contact Sales

Windows Forensic Analysis Playbook

Windows Forensic Analysis Playbook (PDF, 4.50MB)Published: 31 Mar, 2026
Created by:

A Microlearning Guide for Modern Investigations

The Windows Forensic Analysis Playbook is a field-ready reference built to help DFIR practitioners understand six critical Windows artifacts, where they are stored, and their role in forensic investigations.

  1. Jump Lists: Reconstruct application usage and file access patterns tied to user accounts.
  2. LNK Files: Identify evidence of file and folder access, including activity tied to removable media and network shares.
  3. RecentDocs & OpenSave MRU: Review recent user interactions and file access order stored in the Windows Registry.
  4. Prefetch: Understand how Windows records program execution, run counts, and execution timestamps.
  5. SRUM: Examine application usage and network activity history stored in the SRUM database.
  6. Windows Event Logs: Analyze authentication, service creation, and system activity recorded in EVTX logs

Meet Your Author

SANS Institute
SANS Institute

SANS Institute

Launched in 1989 as a cooperative for information security thought leadership, it is SANS’ ongoing mission to empower cybersecurity professionals with the practical skills and knowledge they need to make our world a safer place.

Read more about SANS Institute