Investigation should include configuration management techniques such as