Solved

Network Hard Drive Image

Posted on 2013-01-31
2
462 Views
Last Modified: 2013-02-01
I am looking for a software or solution to image a single computer hard drive over the network.  this computer is located at a different facility but is connected to our networks WAN.  We need to do a security audit on it but don't want the employee to know we are taking or imaging the computer.  Any suggestions or solutions would be appreciated.
0
Comment
Question by:CVNetworks
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 9

Accepted Solution

by:
SirtenKen earned 500 total points
ID: 38843353
EnCase Enterprise (www.guidancesoftware.com/encase-enterprise.htm) will fill the bill. You remotely push a small 'servlet' program to his computer. Beyond that, it will be similar to acquiring a local drive except that you enter in his computer name or IP address before selecting the drive.
F-response (www.f-response.com) is another well-known choice for this kind of work.

Regards,
Ken
0
 

Author Closing Comment

by:CVNetworks
ID: 38844537
Thank you for the help and will try one of the two to see how it works and performs on a disk imaging.
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
Ransomware is a malware that is again in the list of security  concerns. Not only for companies, but also for Government security and  even at personal use. IT departments should be aware and have the right  knowledge to how to fight it.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question