Which of the following should Bill, a security administrator, perform before a hard drive is analyzed with forensics tools?