Skip to main content
Cyberstage :: Case and Evidence Management > > Case Summary
Contact Page | Privacy Policy
Case Status
(loading)

Workflow

  1. Upload Evidence Data
  2. Begin by uploading your evidence data such as EVTX files or MFT data. Our platform supports a seamless upload process to ensure that your files are securely received and ready for analysis.

  3. Wait for Processing Completion
  4. Once your files are uploaded, our system will begin processing the data. This step involves thorough analysis to identify potential threats. Please wait until processing is complete; you'll receive a notification when it's ready for review.

  5. Review Threat Detections
  6. After processing, you can access a detailed report of the threat detections identified within your data. Our user-friendly interface allows you to review and analyze the findings comprehensively, providing insights and actionable recommendations.

  7. Analyse Artifacts: Windows Event Logs | Windows MFT
  8. You can also review processed artifacts individually, allowing for deeper analysis of specific data types, such as Windows Event Logs and MFT data.

  9. Review the Timeline
  10. Next, delve into the prepared timeline for a chronological view of events and detections, helping you to contextualize the identified threats more effectively.

  11. Export Data
  12. Finally, you have the option to export the processed data and reports. This feature enables you to save the findings in a format that suits your needs, whether for documentation, further analysis, or reporting purposes.