Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 366

E01 (EnCase Evidence) Image Format

What is E01 (EnCase Evidence) Image Format?

E01 (EnCase Evidence) Image FormatA forensic disk image format originally introduced by Guidance Software for EnCase, storing acquired data in compressed, segmented files with embedded metadata and checksums.


E01, also called the Expert Witness Compression Format (EWF), is the de facto standard container for forensic disk images on Windows-centric DFIR workflows. Created by Guidance Software (now OpenText) for EnCase, it stores the bit-for-bit copy of a source drive in one or more numbered segments (E01, E02, ...) together with case metadata, examiner name, hash values (MD5/SHA-1) and per-block CRCs that detect tampering. The format supports compression and is read by virtually every commercial and open-source forensic suite, including FTK, X-Ways, Autopsy and libewf-based tools. Investigators favour E01 when chain-of-custody, integrity verification and tool interoperability are required.

Examples

  1. 01

    Acquiring a suspect laptop with FTK Imager and saving evidence as case01.E01, case01.E02, ...

  2. 02

    Mounting an E01 read-only with Arsenal Image Mounter to run triage tools against the image.

Frequently asked questions

What is E01 (EnCase Evidence) Image Format?

A forensic disk image format originally introduced by Guidance Software for EnCase, storing acquired data in compressed, segmented files with embedded metadata and checksums. It belongs to the Forensics & IR category of cybersecurity.

What does E01 (EnCase Evidence) Image Format mean?

A forensic disk image format originally introduced by Guidance Software for EnCase, storing acquired data in compressed, segmented files with embedded metadata and checksums.

How does E01 (EnCase Evidence) Image Format work?

E01, also called the Expert Witness Compression Format (EWF), is the de facto standard container for forensic disk images on Windows-centric DFIR workflows. Created by Guidance Software (now OpenText) for EnCase, it stores the bit-for-bit copy of a source drive in one or more numbered segments (E01, E02, ...) together with case metadata, examiner name, hash values (MD5/SHA-1) and per-block CRCs that detect tampering. The format supports compression and is read by virtually every commercial and open-source forensic suite, including FTK, X-Ways, Autopsy and libewf-based tools. Investigators favour E01 when chain-of-custody, integrity verification and tool interoperability are required.

How do you defend against E01 (EnCase Evidence) Image Format?

Defences for E01 (EnCase Evidence) Image Format typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for E01 (EnCase Evidence) Image Format?

Common alternative names include: EWF, Expert Witness Format, EnCase image.

Related terms

See also