Get-ForensicTypedUrl
SYNOPSIS
Gets the Universal Resource Locators (URL) that have been typed in the Internet Explorer browser.
SYNTAX
ByVolume
Get-ForensicTypedUrl [[-VolumeName] <String>]
ByPath
Get-ForensicTypedUrl -HivePath <String>
DESCRIPTION
The Get-ForensicTypedUrl cmdlet parses a user's NTUSER.DAT file to derive the Universal Resource Locators (URL) that have been typed into the Internet Explorer browser.
Except as noted, the cmdlets in the PowerForensics module require the permissions of a member of the Administrators group on the computer. To run them, start Windows PowerShell with the 'Run as administrator' option.}
EXAMPLES
Example 1
[ADMIN]: PS C:\> Get-ForensicTypedUrl -VolumeName \\.\C:
This command gets the URLs typed into Internet Explorer from all user's NTUSER.DAT hives on the C: logical volume.
Example 2
[ADMIN]: PS C:\> Get-ForensicTypedUrl -HivePath C:\Users\Public\NTUSER.DAT
This command gets the URLs typed into Internet Explorer from the C:\Users\Public\NTUSER.DAT hive.
PARAMETERS
-HivePath
Registry hive to parse.
Type: String
Parameter Sets: ByPath
Aliases: Path
Required: True
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
-VolumeName
Specifies the name of the volume or logical partition.
Enter the volume name in one of the following formats: \.\C:, C:, or C.
Type: String
Parameter Sets: ByVolume
Aliases:
Required: False
Position: 0
Default value: None
Accept pipeline input: False
Accept wildcard characters: False