Triage Investigator has been designed for field triage requirements. It is primarily used by investigators with limited digital forensic training in running the tool (basic mode only). This basic user mode allows for ease-of-use and limits user risk. Triage-Investigator also offers separate authentication and collection keys which allows users to scan multiple computers simultaneously, which can be particularly useful for on-scene investigations. Triage-Investigator does not offer stealth mode during live scans, advanced search configurations, or the ability to switch to advanced mode.
Rapid Evidence collections, analysis & reporting
Triage-Investigator is ADF's award-winning intelligent forensic triage tool designed for field deployment with Digital Evidence Investigator. The software has a proven track record of providing easy and quick access to court defendable evidence to process cases and leveraging investigators to assist forensic labs with rapid collection, analysis, reporting, and managing digital backlogs.
Triage-Investigator® is easy-to-use, easily configurable, supports a wide array of computer hardware, has powerful boot capabilities, is forensically sound, and comes with technical support and regular upgrades.
Automated / easy-to-learn and deploy with rapid artifact & file collection using out-of-the-box forensic scans
Deploy with to import custom Search Profiles
Standalone Report Viewer (share with prosecutors!)
Digital Forensic Platform
Triage-Investigator is designed to work with Digital Evidence Investigator® (DEI) and provide a digital forensic platform where forensic labs can leverage investigators to collect and process data and analyse computers and digital devices in the field. The ADF digital forensic platform enables an organisation to control search criteria used in the field. DEI with Triage-Investigator enables organisations to roll out digital forensic software to the field quickly with minimal training and confidence that forensic integrity will be maintained during collection, analysis and reporting.
Triage-Investigator® Key Features
Triage-Investigator can also be licensed to a computer instead of a physical Authentication Key (dongle) as an option.
Empower front line field investigators with pre-set scans for automated on-scene collection and analysis and maintain control with the combined power of Digital Evidence Investigator and Triage-Investigator.
Easy-to-use and deploy with minimal training
Highly configurable artifact and file collection including web browser cached files, social media, P2P, Cryptocurrency, cloud storage, user login events, anti-forensic traces, saved credentials, files shared via Skype, USB history, user connection log, etc.
Recover deleted records from apps using the SQLite database
Supports collection of forensic artifacts from Windows and macOS
Search and collect emails including MS Outlook, Windows Mail, Windows Live Mail 10, Apple Mail
Investigate attached devices, live powered on computers, boot scans from powered off computers, forensic images, the contents of folders and network shares (including shares made available by NAS devices)
Enter keywords just before a live/boot scan
Rapidly search suspect media using large hash sets (>100 million), including Project VIC (VICS 2.0) and CAID
Find relevant files and artifacts with powerful keyword and regular expression search capability
Image drives Out-of-the-box with image verification and imaging log file
Use password and recovery key to decrypt and scan or image BitLocker volumes including those using the AES-XTS encryption algorithm introduced in Windows 10
Process APFS partitions, NTFS, FAT, HFS+, EXT, ExFAT, and YAFFS2 file systems, compute MD5 and SHA1 on collected files for integrity validation
Capture RAM / acquire volatile memory
Collect password protected and corrupted files for later review
Collect iOS backups on target computers
Detect and warn of BitLocker and FileVault2 protected drives
Leverage powerful boot capability (including UEFI secure boot and Macs) to access internal storage that cannot easily be removed from computers
Use the single timeline view that combines files and artifact records with a user’s actions.
View results while a scan is running
View chat conversations with bubbles to easily identify the senders and receivers with “Message Thread” hyperlink to select individual conversations - New
Filter search results with sorting and search capabilities (dates, hash values, tags, text filters, more)
View pictures and videos organised by visual classes such as people, faces, currency, weapons, vehicles, indecent pictures of children
View links between files of interest and user’s activities such as recently access files, downloaded files, attachments, and more
Inspect video using DEI’s comprehensive video preview and frame extraction
Automatically tag hash and keyword matches
Define new file types and select individual ones to be processed
Display provenance, including comprehensive metadata, of all relevant files and artifacts
Reorder or disable post-scan tasks (classification of pictures, videos, or entity extraction) to run in the Viewer - New
ADD-ON: Rosoka Entity Extraction and Language Translation Gisting (230 languages) available
Triage-InvestigatorⓇ lets investigators create a standalone portable viewer for further analysis and reporting for prosecutors and other investigators.
Powerful reporting capabilities (HTML, PDF, CSV)
Export in VICS format (to or other JSON compatible tool)