{"id":743,"date":"2016-05-03T09:07:31","date_gmt":"2016-05-03T09:07:31","guid":{"rendered":"https:\/\/www.digitalforensicscorp.com\/blog\/?p=743"},"modified":"2024-12-11T19:21:13","modified_gmt":"2024-12-11T19:21:13","slug":"how-to-use-the-encase-processor","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/software\/how-to-use-the-encase-processor\/","title":{"rendered":"EnCase Forensic Processor: Automating Evidence Recovery"},"content":{"rendered":"<ol>\n<li style=\"list-style-type: none;\">\n<ol>Sometimes people ask me: why do I like EnCase Forensic, and I always answer &#8211; for me EnCase Forensic is like the Answerer from Robert Sheckley\u2019s \u201cAsk a Foolish Question\u201d.<\/ol>\n<\/li>\n<\/ol>\n<p><!--more--><\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>It is able to solve the forensic problems, we don\u2019t even think about, until we face them. This can easily be proven if we turn away from Windows<\/ol>\n<\/li>\n<\/ol>\n<p><a title=\"Computer Forensics Services\" href=\"\/digital-forensics\/computer-forensics\">computer forensics<\/a><\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>. The best thing other tools can offer you is hex viewer. But not EnCase Forensic. It will help you. All you need is to ask the right question.<\/ol>\n<\/li>\n<\/ol>\n<p>To save a forensic analyst from wasting time performing routine tasks, like text indexing, keyword searches and parsing OS artifacts, EnCase Forensic offers the EnCase Processor. All you need is to configure searching tasks you need for the particular case, select processing options (for example, to create thumbnails for all image files) and start the Processor. After that you can go about your business while EnCase doing the job. Due to the fact, that this process is resource-intensive, the EnCase Processor can be run on a stand-alone computer (server). To process data on a stand-alone computer (server), you\u2019ll need an additional dongle, which you should request from Guidance Software. Unlike the main dongle, this has plastic casing.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-744 size-medium\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/05\/EP1-206x300.png\" alt=\"EP1\" width=\"206\" height=\"300\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP1-206x300.png 206w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP1.png 488w\" sizes=\"auto, (max-width: 206px) 100vw, 206px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 1. EnCase Processor (left) and EnCase Forensic (right) dongles<\/em><\/p>\n<p>In this article we\u2019ll speak about using the EnCase Processor on a local computer.<\/p>\n<p>After adding images or devices to the case, you should click Process (also, you can start the EnCase Processor via EnScript: EnScript \u2013 EnCase Processor).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-745\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/05\/EP2.png\" alt=\"EP2\" width=\"975\" height=\"193\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP2.png 975w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP2-300x59.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP2-768x152.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP2-512x101.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP2-920x182.png 920w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 2. Process button<\/em><\/p>\n<p>You\u2019ll see EnCase Processor Options dialog, where you should choose options you need.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-746\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/05\/EP3.png\" alt=\"EP3\" width=\"974\" height=\"882\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP3.png 974w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP3-300x272.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP3-768x695.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP3-512x464.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP3-920x833.png 920w\" sizes=\"auto, (max-width: 974px) 100vw, 974px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 3. EnCase Processor Options dialog<\/em><\/p>\n<p>Be very careful choosing options. If you choose too many options, or very resource-intensive options, processing could take too much time.<\/p>\n<p>If you choose an option, you see its description in the right pane:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-747\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/05\/EP4.png\" alt=\"EP4\" width=\"974\" height=\"661\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP4.png 974w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP4-300x204.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP4-768x521.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP4-512x347.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP4-920x624.png 920w\" sizes=\"auto, (max-width: 974px) 100vw, 974px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 4. System Info Parser module description<\/em><\/p>\n<p>If you double click on module\u2019s name, you see additional options.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-748\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/05\/EP5.png\" alt=\"EP5\" width=\"911\" height=\"769\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP5.png 911w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP5-300x253.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP5-768x648.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP5-512x432.png 512w\" sizes=\"auto, (max-width: 911px) 100vw, 911px\" \/><\/p>\n<p style=\"text-align: center;\">Figure 5.\u00a0<em>System Info Parser module additional options<\/em><\/p>\n<p>Click OK and processing will be started; its progress bar is located in the bottom right corner. Also, you can view processing details in Processor Manager (View \u2013 Processor Manager).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-749\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/05\/EP6.png\" alt=\"EP6\" width=\"802\" height=\"222\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP6.png 802w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP6-300x83.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP6-768x213.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP6-512x142.png 512w\" sizes=\"auto, (max-width: 802px) 100vw, 802px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 6. Processor Manager tab<\/em><\/p>\n<p>When the process is finished, you should run Case Analyzer EnScript. In opened dialog box double click Case \u2013 it\u2019ll start adding processed data to the report.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-750\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/05\/EP7.png\" alt=\"EP7\" width=\"872\" height=\"691\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP7.png 872w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP7-300x238.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP7-768x609.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP7-512x406.png 512w\" sizes=\"auto, (max-width: 872px) 100vw, 872px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 7. Adding data to the report<\/em><\/p>\n<p>In the next dialog, opened after the task is finished, choose data you need and click Save Report.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-751\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/05\/EP8.png\" alt=\"EP8\" width=\"596\" height=\"541\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP8.png 596w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP8-300x272.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP8-512x465.png 512w\" sizes=\"auto, (max-width: 596px) 100vw, 596px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 8. Case Analyzer tab<\/em><\/p>\n<p>Now you can customize you report according to your needs, clicking Manage Saved Reports.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-752\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/05\/EP9.png\" alt=\"EP9\" width=\"974\" height=\"786\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP9.png 974w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP9-300x242.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP9-768x620.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP9-512x413.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP9-920x742.png 920w\" sizes=\"auto, (max-width: 974px) 100vw, 974px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 9. Manage Saved Reports window<\/em><\/p>\n<p>If you click View Report, you can view its final version.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-753\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/05\/EP10.png\" alt=\"EP10\" width=\"974\" height=\"560\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP10.png 974w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP10-300x172.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP10-768x442.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP10-512x294.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/EP10-920x529.png 920w\" sizes=\"auto, (max-width: 974px) 100vw, 974px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 10. The report fragment<\/em><\/p>\n<p>If you need to save the report to a file, right-click on Analysis Report Preview window.<\/p>\n<p>More info about EnCase Processor you can find in the official EnCase Forensic User Guide.<\/p>\n<h2>About the authors:<\/h2>\n<p><a href=\"http:\/\/linkedin.com\/in\/igormikhaylovcf\" target=\"_blank\" rel=\"nofollow noopener\">Igor Mikhaylov<\/a><\/p>\n<p>Interests: Computer, Cell Phone &amp; Chip-Off Forensics<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/oleg-skulkin-96652a87\" target=\"_blank\" rel=\"nofollow noopener\">Oleg Skulkin<\/a><\/p>\n<p>Interests: iOS forensics, Android forensics, Mac OS X forensics, Windows forensics, Linux forensics<\/p>\n","protected":false},"excerpt":{"rendered":"Sometimes people ask me: why do I like EnCase Forensic, and I always answer &#8211; for me EnCase&hellip;","protected":false},"author":126,"featured_media":255,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[6],"tags":[],"class_list":{"0":"post-743","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-software","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>EnCase Forensic Processor Guide: Automate Your Investigations<\/title>\n<meta name=\"description\" content=\"top wasting time on routine tasks. Learn how to configure the EnCase Processor for automated indexing, parsing, and keyword searches in digital investigations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/software\/how-to-use-the-encase-processor\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EnCase Forensic Processor: Automating Evidence Recovery\" \/>\n<meta property=\"og:description\" content=\"top wasting time on routine tasks. Learn how to configure the EnCase Processor for automated indexing, parsing, and keyword searches in digital investigations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/software\/how-to-use-the-encase-processor\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-03T09:07:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-11T19:21:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Viktor Sobiecki\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Viktor Sobiecki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/how-to-use-the-encase-processor\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/how-to-use-the-encase-processor\\\/\"},\"author\":{\"name\":\"Viktor Sobiecki\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\"},\"headline\":\"EnCase Forensic Processor: Automating Evidence Recovery\",\"datePublished\":\"2016-05-03T09:07:31+00:00\",\"dateModified\":\"2024-12-11T19:21:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/how-to-use-the-encase-processor\\\/\"},\"wordCount\":523,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/how-to-use-the-encase-processor\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/02\\\/weare4n6_articles.png\",\"articleSection\":[\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/how-to-use-the-encase-processor\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/how-to-use-the-encase-processor\\\/\",\"name\":\"EnCase Forensic Processor Guide: Automate Your Investigations\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/how-to-use-the-encase-processor\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/how-to-use-the-encase-processor\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/02\\\/weare4n6_articles.png\",\"datePublished\":\"2016-05-03T09:07:31+00:00\",\"dateModified\":\"2024-12-11T19:21:13+00:00\",\"description\":\"top wasting time on routine tasks. Learn how to configure the EnCase Processor for automated indexing, parsing, and keyword searches in digital investigations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/how-to-use-the-encase-processor\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/how-to-use-the-encase-processor\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/how-to-use-the-encase-processor\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/02\\\/weare4n6_articles.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/02\\\/weare4n6_articles.png\",\"width\":600,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/how-to-use-the-encase-processor\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"EnCase Forensic Processor: Automating Evidence Recovery\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\",\"name\":\"Viktor Sobiecki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"caption\":\"Viktor Sobiecki\"},\"description\":\"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.\",\"sameAs\":[\"https:\\\/\\\/www.digitalforensics.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/viktor-sobiecki\\\/\"],\"honorificPrefix\":\"Dr\",\"jobTitle\":\"Chief Technology Officer (CTO)\",\"worksFor\":\"Digital Forensics Corporation\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/visor\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"EnCase Forensic Processor Guide: Automate Your Investigations","description":"top wasting time on routine tasks. Learn how to configure the EnCase Processor for automated indexing, parsing, and keyword searches in digital investigations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/software\/how-to-use-the-encase-processor\/","og_locale":"en_US","og_type":"article","og_title":"EnCase Forensic Processor: Automating Evidence Recovery","og_description":"top wasting time on routine tasks. Learn how to configure the EnCase Processor for automated indexing, parsing, and keyword searches in digital investigations.","og_url":"https:\/\/www.digitalforensics.com\/blog\/software\/how-to-use-the-encase-processor\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2016-05-03T09:07:31+00:00","article_modified_time":"2024-12-11T19:21:13+00:00","og_image":[{"width":600,"height":400,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png","type":"image\/png"}],"author":"Viktor Sobiecki","twitter_card":"summary_large_image","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Viktor Sobiecki","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/how-to-use-the-encase-processor\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/how-to-use-the-encase-processor\/"},"author":{"name":"Viktor Sobiecki","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce"},"headline":"EnCase Forensic Processor: Automating Evidence Recovery","datePublished":"2016-05-03T09:07:31+00:00","dateModified":"2024-12-11T19:21:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/how-to-use-the-encase-processor\/"},"wordCount":523,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/how-to-use-the-encase-processor\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png","articleSection":["Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/how-to-use-the-encase-processor\/","url":"https:\/\/www.digitalforensics.com\/blog\/software\/how-to-use-the-encase-processor\/","name":"EnCase Forensic Processor Guide: Automate Your Investigations","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/how-to-use-the-encase-processor\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/how-to-use-the-encase-processor\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png","datePublished":"2016-05-03T09:07:31+00:00","dateModified":"2024-12-11T19:21:13+00:00","description":"top wasting time on routine tasks. Learn how to configure the EnCase Processor for automated indexing, parsing, and keyword searches in digital investigations.","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/how-to-use-the-encase-processor\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/software\/how-to-use-the-encase-processor\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/how-to-use-the-encase-processor\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png","width":600,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/how-to-use-the-encase-processor\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims","item":"https:\/\/www.digitalforensics.com\/blog\/software\/"},{"@type":"ListItem","position":3,"name":"EnCase Forensic Processor: Automating Evidence Recovery"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce","name":"Viktor Sobiecki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","caption":"Viktor Sobiecki"},"description":"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.","sameAs":["https:\/\/www.digitalforensics.com\/","https:\/\/www.linkedin.com\/in\/viktor-sobiecki\/"],"honorificPrefix":"Dr","jobTitle":"Chief Technology Officer (CTO)","worksFor":"Digital Forensics Corporation","url":"https:\/\/www.digitalforensics.com\/blog\/author\/visor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/743","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/126"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=743"}],"version-history":[{"count":2,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/743\/revisions"}],"predecessor-version":[{"id":15996,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/743\/revisions\/15996"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/255"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=743"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=743"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=743"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}