From a penetration tester perspective Make the system/network as it was when you entered it Remove executables, scripts, and added files Remove malware, rootkits, and added user accounts Set settings back to original configurations