{"id":59311,"date":"2020-06-23T08:25:44","date_gmt":"2020-06-23T08:25:44","guid":{"rendered":"https:\/\/www.stellarinfo.com\/blog\/?p=59311"},"modified":"2024-08-20T05:49:48","modified_gmt":"2024-08-20T05:49:48","slug":"forensic-recovery-of-evidence","status":"publish","type":"post","link":"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/","title":{"rendered":"Forensic Analysis of Emails using Stellar Email Forensic Software"},"content":{"rendered":"<?xml encoding=\"utf-8\" ?><?xml encoding=\"utf-8\" ?><blockquote class=\"note_alert\">\n<p><strong>Summary<\/strong>: In this blog, we have started by discussing Email Evidence and how the variety of email evidence can be extracted from Stellar Email Forensic software. We have also mentioned some of the advanced features of <strong>Stellar Email Forensic<\/strong>, like Keyword search, log management, email header, regular expression search, etc.<\/p>\n<\/blockquote><p>Emails are a primary target of cybercriminals to launch phishing attacks and cause data breaches. So, in the event of cybercrime in your organization, it becomes crucial to scan and examine the mailboxes of appropriate employees to collect and analyze the evidence.<\/p><p>If you do not have experience conducting email investigations and don&rsquo;t know how to collect email evidence properly, there is no need to worry. This blog will teach you how to recover and analyze evidence forensically with an easy-to-use eDiscovery tool &ndash;&nbsp;<a href=\"https:\/\/www.stellarinfo.com\/email-forensics-software.php\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Stellar Email Forensic<\/strong><\/a><strong>.<\/strong><\/p><h2 class=\"wp-block-heading\" id=\"what-is-email-evidence?\"><strong><strong>What is Email Evidence?<\/strong><\/strong><\/h2><p>To extract important data from email files for evidence collection, you need to know a few things about email evidence first. These are:<\/p><ul class=\"wp-block-list\">\n<li><strong>Broad Scope:<\/strong>&nbsp;Most details required to investigate a case and achieve a conclusive outcome can be found in the body and subject field of emails. However, evidence can also be found in attachments and message headers. So, ensure that you cover all possible sources of evidence during the investigation.<\/li>\n<\/ul><ul class=\"wp-block-list\">\n<li><strong>Deleted Emails:<\/strong>&nbsp;People involved in misconduct in your organization may delete email messages that can be held against them. If you suspect an employee has deleted the emails from their mailbox, you need to recover them. You can use Stellar Email Forensic to&nbsp;<a href=\"https:\/\/www.stellarinfo.com\/email-forensics-software.php\" target=\"_blank\" rel=\"noreferrer noopener\">recover deleted emails<\/a>&nbsp;and store them safely as evidence.<\/li>\n<\/ul><ul class=\"wp-block-list\">\n<li><strong>Evidence Preservation:&nbsp;<\/strong>An email can be considered as evidence only if it is collected forensically, using proper techniques. Suppose you are not careful while extracting evidence. In that case, you may accidentally spoil potential evidence by modifying important email metadata, such as time, status, etc., or&nbsp;<a href=\"https:\/\/www.stellarinfo.com\/blog\/hash-values-in-digital-forensics\/\" target=\"_blank\" rel=\"noreferrer noopener\">hash values<\/a>&nbsp;required to authenticate those messages.<\/li>\n<\/ul><p>Stellar Email Forensic is used to find email evidence in a wide range of email data files:<\/p><ul class=\"wp-block-list\">\n<li><strong>Mail files:<\/strong>&nbsp;These include popular files stored on local machines in file formats, such as<strong>&nbsp;<\/strong><a href=\"https:\/\/www.stellarinfo.com\/blog\/forensic-analysis-of-exchange-edb-files\/\" target=\"_blank\" rel=\"noreferrer noopener\">EDB<\/a><strong>,&nbsp;<\/strong><a href=\"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/\" target=\"_blank\" rel=\"noreferrer noopener\">PST<\/a><strong>, OST, DBX, NSF, MBOX, OLM, TBB, EML,&nbsp;<\/strong>and many more.<\/li>\n<\/ul><ul class=\"wp-block-list\">\n<li><strong>Backup files:<\/strong>&nbsp;These include Windows backup files in formats, such as .<strong>BKF<\/strong>,&nbsp;<strong>.VHDX<\/strong>, and&nbsp;<strong>.FD<\/strong>.<\/li>\n<\/ul><ul class=\"wp-block-list\">\n<li><strong>Web mailboxes:&nbsp;<\/strong>These include web-based mailboxes on&nbsp;<a href=\"https:\/\/www.stellarinfo.com\/blog\/automated-investigation-response-for-emails-in-office-365\/\" target=\"_blank\" rel=\"noreferrer noopener\">Office 365<\/a>,&nbsp;<a href=\"https:\/\/www.stellarinfo.com\/blog\/google-takeout-for-forensic-email-collection\/\" target=\"_blank\" rel=\"noreferrer noopener\">Gmail<\/a>, Yahoo Mail, and other popular email platforms.<\/li>\n<\/ul><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"672\" height=\"461\" src=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Different-File-Types-Supported-by-Stellar-Email-Forensic.png\" alt=\"Different File Types Supported by Stellar Email Forensic software\" class=\"wp-image-59318 apply-gradient-on-post-images\" srcset=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Different-File-Types-Supported-by-Stellar-Email-Forensic.png 672w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Different-File-Types-Supported-by-Stellar-Email-Forensic-300x206.png 300w\" sizes=\"auto, (max-width: 672px) 100vw, 672px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Figure 1: <\/em><\/strong><em>Different File Types Supported by Stellar Email Forensic software<\/em><\/figcaption><\/figure>\n<\/div><p>To import an email file in Stellar Email Forensic, you need to&nbsp;create a case&nbsp;first. Once a case is created, you can add the desired files to the case by clicking the&nbsp;<strong>Add<\/strong>&nbsp;button, under&nbsp;<strong>File Ribbon<\/strong>&nbsp;<strong>[See Figure 2]<\/strong>. &nbsp;<\/p><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"478\" src=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/User-Interface-of-Stellar-Email-Forensic-1.png\" alt=\"User Interface of Stellar Email Forensic Software\" class=\"wp-image-59338 apply-gradient-on-post-images\" srcset=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/User-Interface-of-Stellar-Email-Forensic-1.png 900w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/User-Interface-of-Stellar-Email-Forensic-1-300x159.png 300w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/User-Interface-of-Stellar-Email-Forensic-1-768x408.png 768w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Figure 2:<\/em><\/strong><em> User Interface of Stellar Email Forensic Software<\/em><\/figcaption><\/figure>\n<\/div><p class=\"has-text-align-left\">After you add an email file or web-based mailbox to the program, you can find all the email folders in the left pane, the list of emails in the middle pane, and different views (HTML, Internet Header, Hex, RTF, Attachment, etc.) in the right pane. These panes make it easy to find the information you need for email investigation.<\/p><h2 class=\"wp-block-heading\" id=\"the-advanced-functionality-of-stellar-email-forensic-software\"><strong>The advanced functionality of Stellar Email Forensic Software<\/strong><\/h2><h3 class=\"wp-block-heading\" id=\"h-1-keywords-tab\">1. <strong><strong>Keywords tab<\/strong><\/strong><\/h3><p>After email files are added, you can search for evidence in the database by using keywords. You can select the&nbsp;<strong>Keywords<\/strong>&nbsp;tab from the&nbsp;<strong>Navigation Pane<\/strong>&nbsp;and add the desired keywords to find evidence&nbsp;<strong>[See Figure 3]<\/strong>. If you already have a list of keywords, you can add the list in CSV file format.<\/p><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"485\" src=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Keywords-Tab-in-Stellar-Email-Forensic.png\" alt=\"Keywords Tab in Stellar Email Forensic Software\" class=\"wp-image-59341 apply-gradient-on-post-images\" srcset=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Keywords-Tab-in-Stellar-Email-Forensic.png 900w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Keywords-Tab-in-Stellar-Email-Forensic-300x162.png 300w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Keywords-Tab-in-Stellar-Email-Forensic-768x414.png 768w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Figure 3:<\/em><\/strong><em> Keywords Tab in Stellar Email Forensic Software<\/em> <\/figcaption><\/figure>\n<\/div><h3 class=\"wp-block-heading\" id=\"h-2-advanced-search-functions\">2. <strong>Advanced Search Functions<\/strong><\/h3><p>You can also scan email files by using advanced search functions. The software provides three options:<\/p><ul class=\"wp-block-list\">\n<li><strong>Boolean Search:<\/strong>&nbsp;This search function allows you to combine multiple keywords with operators AND, OR, and NOT.<\/li>\n\n\n\n<li><strong>Regular Expression Search:<\/strong>&nbsp;This search function allows you to use a template for addresses, URLs, date &amp; time, etc., to find a particular pattern in emails.<\/li>\n\n\n\n<li><strong>Simple Search:<\/strong>&nbsp;You can use the Simple Search option if you don&rsquo;t want your search query to be interpreted as a Boolean Search or a Regular Expression Search.<\/li>\n<\/ul><h3 class=\"wp-block-heading\" id=\"h-3-log-management\">3. <strong>Log Management<\/strong><\/h3><p>Once you have narrowed search results by using the above functions, you can manually go through the emails to identify the ones that can be used as evidence. Then, you can categorize these emails with descriptive tags and export them in file formats like PDF, plain text, etc., to store the files as evidence.<\/p><p>Apart from tagged emails, you can also export logs to record the events during the investigation. You can click the&nbsp;<strong>View Logs<\/strong>&nbsp;button under&nbsp;<strong>File Ribbon<\/strong>&nbsp;and export the details of appropriate events in plain text or CSV files&nbsp;<strong>[See Figure 4]<\/strong>.<\/p><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"534\" src=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Logs-View-in-Stellar-Email-Forensic-1-1024x534.png\" alt=\"Logs View in Stellar Email Forensic Software\" class=\"wp-image-59343 apply-gradient-on-post-images\" srcset=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Logs-View-in-Stellar-Email-Forensic-1-1024x534.png 1024w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Logs-View-in-Stellar-Email-Forensic-1-300x156.png 300w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Logs-View-in-Stellar-Email-Forensic-1-768x401.png 768w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Logs-View-in-Stellar-Email-Forensic-1.png 1365w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Figure 4: <\/em><\/strong><em>Logs View in Stellar Email Forensic Software<\/em><\/figcaption><\/figure>\n<\/div><p class=\"has-text-align-left\">Keywords and search functions can help you find smoking guns fast. However, for an in-depth investigation, you need to look beyond the main message.<\/p><h3 class=\"wp-block-heading\" id=\"h-4-email-header\">4. <strong><strong>Email Header<\/strong><\/strong><\/h3><p>The <a href=\"https:\/\/www.stellarinfo.com\/article\/email-header-structure-forensic-analysis.php\" target=\"_blank\" rel=\"noreferrer noopener\">email header<\/a>&nbsp;is an important component, and its significance in email forensics cannot be overlooked. It can help you uncover additional details about the message sender and receiver, their IP addresses, details of email clients used, etc. In addition, it contains the details of the email&rsquo;s path, Internet service provider, time stamps, <a href=\"https:\/\/www.stellarinfo.com\/blog\/importance-of-email-message-id-in-email-forensics\/\" target=\"_blank\" rel=\"noreferrer noopener\">message ID<\/a>, x-headers, <a href=\"https:\/\/www.stellarinfo.com\/blog\/role-of-mx-records-in-email-forensics-investigation\/\" target=\"_blank\" rel=\"noreferrer noopener\">MX Records<\/a>, and even location.<\/p><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"528\" src=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Email-Header-View-in-Stellar-Email-Forensic-1024x528.png\" alt=\"Email Header view in Stellar Email Forensic Software\" class=\"wp-image-59344 apply-gradient-on-post-images\" srcset=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Email-Header-View-in-Stellar-Email-Forensic-1024x528.png 1024w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Email-Header-View-in-Stellar-Email-Forensic-300x155.png 300w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Email-Header-View-in-Stellar-Email-Forensic-768x396.png 768w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Email-Header-View-in-Stellar-Email-Forensic.png 1366w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Figure 5: <\/em><\/strong><em>Email Header view in Stellar Email Forensic Software<\/em><\/figcaption><\/figure>\n<\/div><h3 class=\"wp-block-heading\" id=\"h-5-media-tab\">5. <strong>Media Tab<\/strong><\/h3><p>Critical evidence can also be found in email attachments. So, they must be examined during the investigation without a fail.&nbsp;Stellar Email Forensic&nbsp;software allows you to easily identify attachments like audio files, documents, images, etc. in sent\/received emails. It also groups attachments based on their file type and displays additional details of the attachments such as file name, source file path, file size, etc.<\/p><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"486\" src=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Email-Attachments-Navigation-Tree-in-Stellar-Email-Forensic-1.png\" alt=\"Email Attachments Navigation Tree in Stellar Email Forensic Software\" class=\"wp-image-59346 apply-gradient-on-post-images\" srcset=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Email-Attachments-Navigation-Tree-in-Stellar-Email-Forensic-1.png 900w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Email-Attachments-Navigation-Tree-in-Stellar-Email-Forensic-1-300x162.png 300w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Email-Attachments-Navigation-Tree-in-Stellar-Email-Forensic-1-768x415.png 768w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Figure 6:<\/em><\/strong><em> Email Attachments Navigation Tree in Stellar Email Forensic Software<\/em><\/figcaption><\/figure>\n<\/div><p>Email investigation is a time-intensive and laborious task with no room for error. You need to take the proper steps to collect every essential piece of evidence. So, use Stellar Email Forensic<strong>,&nbsp;<\/strong>an advanced eDiscovery and&nbsp;<a href=\"https:\/\/www.stellarinfo.com\/email-forensics-software.php\" target=\"_blank\" rel=\"noreferrer noopener\">email investigation tool<\/a>&nbsp;that is reliable, fast, and accurate. It can help you forensically collect email evidence at a&nbsp;<a href=\"https:\/\/www.stellarinfo.com\/blog\/bulk-email-forensics-for-legal-professionals\/\" target=\"_blank\" rel=\"noreferrer noopener\">large scale<\/a>&nbsp;that is accurate and court-admissible.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary: In this blog, we have started by discussing Email Evidence and&hellip; <a class=\"more-link\" href=\"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/\">Continue reading <span class=\"screen-reader-text\">Forensic Analysis of Emails using Stellar Email Forensic Software<\/span><\/a><\/p>\n","protected":false},"author":39,"featured_media":59351,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1245],"tags":[3383,1240,1242,1411,3395,3396,3397],"class_list":["post-59311","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-email-forensics","tag-ediscovery-software","tag-email-forensics","tag-email-investigation","tag-email-spoofing","tag-forensic-analysis-of-emails","tag-recover-deleted-emails","tag-recovery-deleted-email","entry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Forensic Recovery of Evidence Using Stellar Email Forensic<\/title>\n<meta name=\"description\" content=\"Learn how you can forensically recover evidence using advanced email investigation tool Stellar Email Forensic software.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Forensic Recovery of Evidence Using Stellar Email Forensic\" \/>\n<meta property=\"og:description\" content=\"Learn how you can forensically recover evidence using advanced email investigation tool Stellar Email Forensic software.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/\" \/>\n<meta property=\"og:site_name\" content=\"Stellar Data Recovery Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-23T08:25:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-20T05:49:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Forensic-Recovery-of-Evidence-Using-Stellar-Email-Forensic-Software.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Abhinav Sethi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Abhinav Sethi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/\"},\"author\":{\"name\":\"Abhinav Sethi\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/59813a3d157f4d3a68949bce854241f4\"},\"headline\":\"Forensic Analysis of Emails using Stellar Email Forensic Software\",\"datePublished\":\"2020-06-23T08:25:44+00:00\",\"dateModified\":\"2024-08-20T05:49:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/\"},\"wordCount\":1070,\"image\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Forensic-Recovery-of-Evidence-Using-Stellar-Email-Forensic-Software.jpg\",\"keywords\":[\"eDiscovery software\",\"email forensics\",\"email investigation\",\"email spoofing\",\"forensic analysis of emails\",\"recover deleted emails\",\"recovery deleted email\"],\"articleSection\":[\"Email Forensics\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/\",\"name\":\"Forensic Recovery of Evidence Using Stellar Email Forensic\",\"isPartOf\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Forensic-Recovery-of-Evidence-Using-Stellar-Email-Forensic-Software.jpg\",\"datePublished\":\"2020-06-23T08:25:44+00:00\",\"dateModified\":\"2024-08-20T05:49:48+00:00\",\"author\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/59813a3d157f4d3a68949bce854241f4\"},\"description\":\"Learn how you can forensically recover evidence using advanced email investigation tool Stellar Email Forensic software.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/#primaryimage\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Forensic-Recovery-of-Evidence-Using-Stellar-Email-Forensic-Software.jpg\",\"contentUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Forensic-Recovery-of-Evidence-Using-Stellar-Email-Forensic-Software.jpg\",\"width\":1000,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stellarinfo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Forensic Analysis of Emails using Stellar Email Forensic Software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#website\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/\",\"name\":\"Stellar Data Recovery Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stellarinfo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/59813a3d157f4d3a68949bce854241f4\",\"name\":\"Abhinav Sethi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5f7b5067a858b11bbdea64a56366ad4f686cef22d39ccc50363bc5346e80a6de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5f7b5067a858b11bbdea64a56366ad4f686cef22d39ccc50363bc5346e80a6de?s=96&d=mm&r=g\",\"caption\":\"Abhinav Sethi\"},\"description\":\"Abhinav Sethi is a Senior Writer at Stellar. He writes articles, blog posts, knowledge-bases, case studies, etc. for different technologies. He also has a keen interest in digital forensics and helps forward-thinking companies fight different threats with apt solutions.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/abhinav-sethi-126b123a\/\"],\"url\":\"https:\/\/www.stellarinfo.com\/blog\/author\/abhinav\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Forensic Recovery of Evidence Using Stellar Email Forensic","description":"Learn how you can forensically recover evidence using advanced email investigation tool Stellar Email Forensic software.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/","og_locale":"en_US","og_type":"article","og_title":"Forensic Recovery of Evidence Using Stellar Email Forensic","og_description":"Learn how you can forensically recover evidence using advanced email investigation tool Stellar Email Forensic software.","og_url":"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/","og_site_name":"Stellar Data Recovery Blog","article_published_time":"2020-06-23T08:25:44+00:00","article_modified_time":"2024-08-20T05:49:48+00:00","og_image":[{"width":1000,"height":600,"url":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Forensic-Recovery-of-Evidence-Using-Stellar-Email-Forensic-Software.jpg","type":"image\/jpeg"}],"author":"Abhinav Sethi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Abhinav Sethi","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/#article","isPartOf":{"@id":"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/"},"author":{"name":"Abhinav Sethi","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/59813a3d157f4d3a68949bce854241f4"},"headline":"Forensic Analysis of Emails using Stellar Email Forensic Software","datePublished":"2020-06-23T08:25:44+00:00","dateModified":"2024-08-20T05:49:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/"},"wordCount":1070,"image":{"@id":"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Forensic-Recovery-of-Evidence-Using-Stellar-Email-Forensic-Software.jpg","keywords":["eDiscovery software","email forensics","email investigation","email spoofing","forensic analysis of emails","recover deleted emails","recovery deleted email"],"articleSection":["Email Forensics"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/","url":"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/","name":"Forensic Recovery of Evidence Using Stellar Email Forensic","isPartOf":{"@id":"https:\/\/www.stellarinfo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/#primaryimage"},"image":{"@id":"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Forensic-Recovery-of-Evidence-Using-Stellar-Email-Forensic-Software.jpg","datePublished":"2020-06-23T08:25:44+00:00","dateModified":"2024-08-20T05:49:48+00:00","author":{"@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/59813a3d157f4d3a68949bce854241f4"},"description":"Learn how you can forensically recover evidence using advanced email investigation tool Stellar Email Forensic software.","breadcrumb":{"@id":"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/#primaryimage","url":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Forensic-Recovery-of-Evidence-Using-Stellar-Email-Forensic-Software.jpg","contentUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/06\/Forensic-Recovery-of-Evidence-Using-Stellar-Email-Forensic-Software.jpg","width":1000,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.stellarinfo.com\/blog\/forensic-recovery-of-evidence-using-stellar-email-forensic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stellarinfo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Forensic Analysis of Emails using Stellar Email Forensic Software"}]},{"@type":"WebSite","@id":"https:\/\/www.stellarinfo.com\/blog\/#website","url":"https:\/\/www.stellarinfo.com\/blog\/","name":"Stellar Data Recovery Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stellarinfo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/59813a3d157f4d3a68949bce854241f4","name":"Abhinav Sethi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5f7b5067a858b11bbdea64a56366ad4f686cef22d39ccc50363bc5346e80a6de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5f7b5067a858b11bbdea64a56366ad4f686cef22d39ccc50363bc5346e80a6de?s=96&d=mm&r=g","caption":"Abhinav Sethi"},"description":"Abhinav Sethi is a Senior Writer at Stellar. He writes articles, blog posts, knowledge-bases, case studies, etc. for different technologies. He also has a keen interest in digital forensics and helps forward-thinking companies fight different threats with apt solutions.","sameAs":["https:\/\/www.linkedin.com\/in\/abhinav-sethi-126b123a\/"],"url":"https:\/\/www.stellarinfo.com\/blog\/author\/abhinav\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/59311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/comments?post=59311"}],"version-history":[{"count":23,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/59311\/revisions"}],"predecessor-version":[{"id":172582,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/59311\/revisions\/172582"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/media\/59351"}],"wp:attachment":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/media?parent=59311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/categories?post=59311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/tags?post=59311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}