If it is an image of the drive, it is the whole drive. If you image partitions, unless you use physical start and stop points on the drive, you are imaging the data on the partition and will lose everything except the things that the partition table sees.
Easiest way to put it, imaging a drive will give you a bit level copy. Imaging a partition will give you a data level partition which is the equivalent of a backup.
Awesome reply. So FTK makes the image, runs a hash check, and finds file names of interest, why would IEF find more? Nothing gets buy FTK. IF what I am reading your reply right, everything gets hashed. All partitions. If anything is residing on that drive, FTK will find it, right?
FTK or FTK Imager? There is a big difference in capabilities.
-FTK or FTK Imager can be used to create a bit for bit image of the original media (if that is the option you selected). -FTK creates a hash of the forensic image and compares it to the hash of the original media. The imaging information including hash values are stored in the log file named image_name.txt
- Finds is a very broad term. In your processing options in FTK did you select a carving option where FTK would "find" files? Or do you mean it read the MFT to "find" files? And what processing option did you select for FTK to "find file names of interest?" Did you give it a list of file names of interest?