Investigation should include configuration management techniques, such as