Harvesting ESI has never been easier. Using Advantage Plus and the Network Collection Agent is simply easier, totally defensible and less costly than other methods. Use predefined search templates for Exchange servers, file servers, databases, SharePoint and many more. If you can access it on the network, chances are Advantage Plus can harvest data from it. If there is no template or collection agent, we can work with you on designing a custom agent.
Just navigate to the asset in Advantage Plus, apply a template, set your parameters and search terms, and the Network Collection Agent does the rest. Data is searched, analyzed, de-duped and uploaded right into the Advantage Plus review tool, what could be easier? Call Global Digital forensics and get a free demo today.
Network Search Agent (NSA)
The NSA can be used to identify potential sources of ESI, search the source, and harvest the data for review. Simply provide administrative privileges to the NSA controller, define custodians and click “Identify”. The NSA will search the network for systems that the defined custodians logged into and file shares they have access to, and by using the predefined search terms and date ranges, build a report. If so configured, the NSA will also collect the ESI and send it directly to the GDF ORT. The dashboard lets you see collection progress and identify any potential issues. Customized reports build a defensible process while providing insight into the collection size and Early Case Assessment features.
Email Collection Agent (ECA)
Email has long been the holy grail of eDiscovery. The ECA is used to search Exchange and Notes servers for email messages that are stored on the server. Simply identify the user mailboxes to search, the search terms and date ranges, and the ECA will search and preserve, or collect the ESI that meets the pre-defined parameters. Personal folders, public folders and archives can all be searched. Offline PST, OST, NFS or EDB files can be added and searched by the ECA as well. The identified ESI can be sent directly to the GDF Online Review Tool, stored in encrypted tamper-proof containers, or exported in native format. The dashboard is populated with the ECA data as well, for a defensible and complete collection.