Exchange Solutions

6 Key Concepts Related to Exchange Forensics Analysis

In this article we look at key concepts related to Ms Exchange Forensics Analysis and look how the same is performed on in-house mail servers and related infrastructure. With the increasing importance of emails as the primary medium of official communication, the threats to email security have also increased. While all companies take steps to ensure the safety of all email accounts and mailboxes, but somehow some of them still fall short on safety. This is probably because the techniques...

Read more »

How to Use Message Tracking Logs in Exchange for Forensics Analysis

In this article we look at the key advantages of using message tracking logs while performing forensics analysis on Ms Exchange mailboxes Forensic Analysis in MS Exchange is used for investigating mailboxes; this investigation makes use of certain features which keep the record of all conversations and their logs. Message Tracking Log is one such feature, this keeps a record of the log files of all emails that are exchanged between mailboxes belonging to a single organization. During...

Read more »

5 Key Points to Keep in Mind when Auditing Mailbox Access

In this article we look at important pointers that one should keep track of while a mailbox audit process is initiated. An organization contains multiple mailboxes; these mailboxes belong to people of different departments, and might also have differences in their privacy settings, depending on the type of user they belong to. A few mailboxes are such, which are only being maintained for the purpose of Discovery, to show compliance towards legal requirements. There might be instances where...

Read more »