{"id":63324,"date":"2020-08-25T18:23:53","date_gmt":"2020-08-25T18:23:53","guid":{"rendered":"https:\/\/www.stellarinfo.com\/blog\/?p=63324"},"modified":"2024-08-20T05:44:03","modified_gmt":"2024-08-20T05:44:03","slug":"right-approach-to-filter-emails-forensically-collecting-email-mailboxes","status":"publish","type":"post","link":"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/","title":{"rendered":"Approaches to Filter Emails for eDiscovery and  Forensic Investigation"},"content":{"rendered":"<?xml encoding=\"utf-8\" ?><?xml encoding=\"utf-8\" ?><blockquote class=\"note_alert\">\n<p><strong>Summary<\/strong>: In this blog, we have discussed two methods to filter emails during email forensics investigation. We have also talked about the advantages and disadvantages of these two approaches. Apart from this, we have also highlighted the utility of using an efficient Email forensics software, like <strong>Stellar Email Forensics<\/strong>.<\/p>\n<\/blockquote><p>When you collect mailboxes for <strong>eDiscovery<\/strong> and <strong>digital forensics investigation<\/strong>, you need to search and filter the emails and other details. Email filtering helps you save considerable time and costs. In addition, it helps overcome privacy issues that stop collecting certain emails for forensic investigation.&nbsp;<\/p><p>There are two methods to filter emails during email forensics investigation &ndash;&nbsp;<em><strong>Collecting First, Filtering Later<\/strong>,<\/em>&nbsp;and&nbsp;<em><strong>Filtering First, Collecting Later<\/strong><\/em>.<\/p><figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"600\" src=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/08\/Filtering-Emails-When-Collecting-Mailboxes-for-Investigation.jpg\" alt=\"Stellar\" class=\"wp-image-63327 apply-gradient-on-post-images\" srcset=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/08\/Filtering-Emails-When-Collecting-Mailboxes-for-Investigation.jpg 1000w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/08\/Filtering-Emails-When-Collecting-Mailboxes-for-Investigation-300x180.jpg 300w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/08\/Filtering-Emails-When-Collecting-Mailboxes-for-Investigation-768x461.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure><p>Let us take a closer look at both methods and their advantages and disadvantages.<\/p><h2 class=\"wp-block-heading\" id=\"method-1:-collecting-first,-filtering-later\"><strong><strong>Method 1: Collecting First, Filtering Later<\/strong><\/strong><\/h2><p>In this approach, forensic investigators start with collecting all the mailboxes. After collecting these mailboxes, they import them into an advanced eDiscovery and email forensics software, such as&nbsp;<a href=\"https:\/\/www.stellarinfo.com\/email-forensics-software.php\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Stellar Email Forensic<\/strong><\/a>. With an easy-to-use manual available on the website, you can search and filter the relevant emails in a short time and perform subsequent steps, such as processing, reviewing, and generating reports.<\/p><p><strong><strong>Advantages:<\/strong><\/strong><\/p><p>The following are some&nbsp;<strong>advantages<\/strong>&nbsp;of this method:<\/p><ul class=\"wp-block-list\">\n<li>Sometimes, the requirements and scope of a case change after you start an investigation. You may need to collect additional emails from the mailboxes when this happens. If you already have access to entire mailboxes, you can efficiently perform new or revised searches and collect additional emails.<\/li>\n\n\n\n<li>When you filter emails with comprehensive email forensics tools, such as&nbsp;<a href=\"https:\/\/www.stellarinfo.com\/email-forensics-software.php\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Stellar Email Forensic<\/strong><\/a>, you can efficiently perform&nbsp;<strong>advanced searches<\/strong>&nbsp;with functions like&nbsp;<em>Boolean Search<\/em>&nbsp;or&nbsp;<em>Regular Expression Search<\/em>.<strong>&nbsp;Stellar Email Forensic<\/strong>&nbsp;is an advanced&nbsp;<strong>eDiscovery<\/strong>&nbsp;and&nbsp;<strong>email investigation software<\/strong>&nbsp;that analyzes and investigates mailbox data of various email clients, email services (such as&nbsp;<strong>Exchange<\/strong>,&nbsp;<strong>Office 365<\/strong>,&nbsp;<strong>GroupWise Server<\/strong>, Google Mail, Notes, etc.), and email backup files with 100% accuracy. In other words, it is an advanced software for email search, which supports investigation at the granular level and helps in digital evidence collection. Apart from this, you can also filter attachments based on file types. This way, you can quickly find the relevant data with great accuracy.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.stellarinfo.com\/email-forensics-software.php\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Stellar Email Forensics<\/strong><\/a>&nbsp;generates customized&nbsp;<strong>litigation reports<\/strong>; hence it preserves the evidence in a legally acceptable format. The evidence is preserved with&nbsp;<a href=\"https:\/\/www.stellarinfo.com\/blog\/hash-values-in-digital-forensics\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>MD5 and SHA1 hash values<\/strong>&nbsp;<\/a>while extracting and analyzing the data.<\/li>\n<\/ul><p><strong><strong>Disadvantages:<\/strong><\/strong><\/p><p>The following are some <strong>disadvantages<\/strong>&nbsp;of this method:<\/p><ul class=\"wp-block-list\">\n<li>Collecting entire mailboxes can be&nbsp;<strong>cumbersome and time-consuming<\/strong>. If there are several mailboxes, you may end up spending hours collecting all of them.<\/li>\n\n\n\n<li>Specific mailboxes may contain&nbsp;<strong>sensitive or confidential information<\/strong>&nbsp;you are not authorized to access. Collecting mailboxes entirely, i.e., without filtering confidential emails, may violate certain conditions.<\/li>\n<\/ul><h2 class=\"wp-block-heading\" id=\"method-2:-filtering-first,-collecting-later&nbsp;\"><strong><strong>Method 2: Filtering First, Collecting Later&nbsp;<\/strong><\/strong><\/h2><p>In this method, you first perform mailbox searches directly using the built-in search functions of email services and products. Email clients, such as Office 365, Gmail, Outlook, etc., provide various search options. Afterward, you can collect emails that are relevant to the forensic investigation.<\/p><p><strong><strong>Advantages:<\/strong><\/strong><\/p><p>The following are some&nbsp;<strong>advantages<\/strong>&nbsp;of this method:<\/p><ul class=\"wp-block-list\">\n<li>Filtering emails first can&nbsp;<strong>save you a lot of time<\/strong>&nbsp;as you can perform searches directly on the mailbox and collect the limited emails you need.<\/li>\n\n\n\n<li>Due to privacy concerns, you may have been directed not to collect an entire mailbox. In that case, collecting particular messages sent between specific date ranges and only by certain individuals should be your priority.<\/li>\n<\/ul><p><strong><strong>Disadvantages:<\/strong><\/strong><\/p><p>The following are some disadvantages of this method:<\/p><ul class=\"wp-block-list\">\n<li>If the&nbsp;<strong>scope of your investigation expands<\/strong>&nbsp;later, you may again need the mailboxes involved and perform a new or revised search. This is time-consuming and a waste of resources.<\/li>\n\n\n\n<li><strong>Search capabilities are limited<\/strong>&nbsp;even in top email services like Gmail and Office 365. You have to use keyword searches, and it isn&rsquo;t easy to perform advanced searches that are more targeted toward your desired information. So, there is a good chance that you may miss important emails in your search.<\/li>\n\n\n\n<li>Search syntax varies from one email service to another. For instance, Gmail&rsquo;s search syntax differs from the&nbsp;Advanced Query Syntax (AQS)&nbsp;used in Microsoft Exchange Web Services. You need to&nbsp;<strong>learn all these different syntaxes and commands<\/strong>&nbsp;to search and filter emails for forensic investigation.&nbsp;<a href=\"https:\/\/www.stellarinfo.com\/email-forensics-software.php\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Stellar Email Forensic<\/strong><\/a>&nbsp;is one tool that helps filter, even from webmail service providers, such as Gmail, Yahoo Mail, Office 365, etc.<\/li>\n<\/ul><figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Method<\/strong>           <\/td><td><strong>Pros<\/strong><\/td><td><strong>Cons<\/strong><\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Method 1: Collecting first, filtering later<\/strong><\/td><td>Performing a new search is easy, as you have access to the entire mailboxes. In addition, an Enterprise-grade eDiscovery email forensic tool, such as&nbsp;<a href=\"https:\/\/www.stellarinfo.com\/email-forensics-software.php\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Stellar Email Forensic<\/strong><\/a>, offers advanced search functions that make the searching task very easy.<\/td><td>Collecting entire mailboxes is time-consuming. This can create problems when there are privacy concerns or time constraints.<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Method 2: Filtering first, collecting later<\/strong><\/td><td>Saves time during email collection. At the same time, privacy concerns and time constraints can be addressed.<\/td><td>Collecting additional emails that exist in source mailboxes requires re-acquisition of the mailboxes, which can further create unnecessary delays in the investigation process. Performing searches in email platforms gives you limited search functions and tools. There is a learning curve with different email platforms, which follow different search syntax and commands.<\/td><\/tr><\/tbody><\/table><\/figure><h2 class=\"wp-block-heading\" id=\"conclusion\">Conclusion<\/h2><p>Filtering and searching emails before or after forensic collection have specific pros and cons. For example, suppose there are privacy concerns or other restrictions while preserving the entire mailboxes. In that case, you may have to perform searches on the original mailboxes first, following the organization&rsquo;s security protocol. However, if you can collect the entire mailboxes and access the complete database, it is better to collect them first and then perform filtering and searching on those mailboxes.<\/p><p class=\"has-background\" style=\"background-color:#e9e9e9\">Need a powerful email forensics software that can easily search and filter emails for forensic investigation? Check out&nbsp;<a href=\"https:\/\/www.stellarinfo.com\/email-forensics-software.php\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Stellar Email Forensic<\/strong><\/a>! It supports more than 25 standard email file formats, such as&nbsp;<strong><a href=\"https:\/\/www.stellarinfo.com\/blog\/forensic-analysis-of-exchange-edb-files\/\" target=\"_blank\" rel=\"noreferrer noopener\">EDB<\/a><\/strong>,&nbsp;<strong><a href=\"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/\" target=\"_blank\" rel=\"noreferrer noopener\">PST<\/a><\/strong>, OST, DBX, NSF, MBOX, OLM, etc. In addition, it offers&nbsp;<strong>deleted email recovery<\/strong>&nbsp;and has a facility for <strong>case management during criminal investigations<\/strong> with the support of tagging, bookmarking, and log management.&nbsp;<a href=\"https:\/\/www.stellarinfo.com\/email-forensics-software\/buy-now.php\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Download<\/strong><\/a>&nbsp;it now!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary: In this blog, we have discussed two methods to filter emails&hellip; <a class=\"more-link\" href=\"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/\">Continue reading <span class=\"screen-reader-text\">Approaches to Filter Emails for eDiscovery and  Forensic Investigation<\/span><\/a><\/p>\n","protected":false},"author":39,"featured_media":63327,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1245],"tags":[1240,3382,3381,1242,3401],"class_list":["post-63324","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-email-forensics","tag-email-forensics","tag-email-forensics-investigation","tag-email-forensics-software","tag-email-investigation","tag-filter-emails-for-forensic-investigation","entry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Approaches to Filter Emails for eDiscovery and Forensic Investigation | Stellar<\/title>\n<meta name=\"description\" content=\"There are two ways to filter emails for forensic investigation- Filtering First, Collecting Later, and Collecting First, Filtering Later.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Approaches to Filter Emails for eDiscovery and Forensic Investigation | Stellar\" \/>\n<meta property=\"og:description\" content=\"There are two ways to filter emails for forensic investigation- Filtering First, Collecting Later, and Collecting First, Filtering Later.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/\" \/>\n<meta property=\"og:site_name\" content=\"Stellar Data Recovery Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-25T18:23:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-20T05:44:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/08\/Filtering-Emails-When-Collecting-Mailboxes-for-Investigation.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Abhinav Sethi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Abhinav Sethi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/\"},\"author\":{\"name\":\"Abhinav Sethi\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/59813a3d157f4d3a68949bce854241f4\"},\"headline\":\"Approaches to Filter Emails for eDiscovery and Forensic Investigation\",\"datePublished\":\"2020-08-25T18:23:53+00:00\",\"dateModified\":\"2024-08-20T05:44:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/\"},\"wordCount\":1077,\"image\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/08\/Filtering-Emails-When-Collecting-Mailboxes-for-Investigation.jpg\",\"keywords\":[\"email forensics\",\"email forensics investigation\",\"email forensics software\",\"email investigation\",\"filter emails for forensic investigation\"],\"articleSection\":[\"Email Forensics\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/\",\"name\":\"Approaches to Filter Emails for eDiscovery and Forensic Investigation | Stellar\",\"isPartOf\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/08\/Filtering-Emails-When-Collecting-Mailboxes-for-Investigation.jpg\",\"datePublished\":\"2020-08-25T18:23:53+00:00\",\"dateModified\":\"2024-08-20T05:44:03+00:00\",\"author\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/59813a3d157f4d3a68949bce854241f4\"},\"description\":\"There are two ways to filter emails for forensic investigation- Filtering First, Collecting Later, and Collecting First, Filtering Later.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/#primaryimage\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/08\/Filtering-Emails-When-Collecting-Mailboxes-for-Investigation.jpg\",\"contentUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/08\/Filtering-Emails-When-Collecting-Mailboxes-for-Investigation.jpg\",\"width\":1000,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stellarinfo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Approaches to Filter Emails for eDiscovery and Forensic Investigation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#website\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/\",\"name\":\"Stellar Data Recovery Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stellarinfo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/59813a3d157f4d3a68949bce854241f4\",\"name\":\"Abhinav Sethi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5f7b5067a858b11bbdea64a56366ad4f686cef22d39ccc50363bc5346e80a6de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5f7b5067a858b11bbdea64a56366ad4f686cef22d39ccc50363bc5346e80a6de?s=96&d=mm&r=g\",\"caption\":\"Abhinav Sethi\"},\"description\":\"Abhinav Sethi is a Senior Writer at Stellar. He writes articles, blog posts, knowledge-bases, case studies, etc. for different technologies. He also has a keen interest in digital forensics and helps forward-thinking companies fight different threats with apt solutions.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/abhinav-sethi-126b123a\/\"],\"url\":\"https:\/\/www.stellarinfo.com\/blog\/author\/abhinav\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Approaches to Filter Emails for eDiscovery and Forensic Investigation | Stellar","description":"There are two ways to filter emails for forensic investigation- Filtering First, Collecting Later, and Collecting First, Filtering Later.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/","og_locale":"en_US","og_type":"article","og_title":"Approaches to Filter Emails for eDiscovery and Forensic Investigation | Stellar","og_description":"There are two ways to filter emails for forensic investigation- Filtering First, Collecting Later, and Collecting First, Filtering Later.","og_url":"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/","og_site_name":"Stellar Data Recovery Blog","article_published_time":"2020-08-25T18:23:53+00:00","article_modified_time":"2024-08-20T05:44:03+00:00","og_image":[{"width":1000,"height":600,"url":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/08\/Filtering-Emails-When-Collecting-Mailboxes-for-Investigation.jpg","type":"image\/jpeg"}],"author":"Abhinav Sethi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Abhinav Sethi","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/#article","isPartOf":{"@id":"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/"},"author":{"name":"Abhinav Sethi","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/59813a3d157f4d3a68949bce854241f4"},"headline":"Approaches to Filter Emails for eDiscovery and Forensic Investigation","datePublished":"2020-08-25T18:23:53+00:00","dateModified":"2024-08-20T05:44:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/"},"wordCount":1077,"image":{"@id":"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/08\/Filtering-Emails-When-Collecting-Mailboxes-for-Investigation.jpg","keywords":["email forensics","email forensics investigation","email forensics software","email investigation","filter emails for forensic investigation"],"articleSection":["Email Forensics"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/","url":"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/","name":"Approaches to Filter Emails for eDiscovery and Forensic Investigation | Stellar","isPartOf":{"@id":"https:\/\/www.stellarinfo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/#primaryimage"},"image":{"@id":"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/08\/Filtering-Emails-When-Collecting-Mailboxes-for-Investigation.jpg","datePublished":"2020-08-25T18:23:53+00:00","dateModified":"2024-08-20T05:44:03+00:00","author":{"@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/59813a3d157f4d3a68949bce854241f4"},"description":"There are two ways to filter emails for forensic investigation- Filtering First, Collecting Later, and Collecting First, Filtering Later.","breadcrumb":{"@id":"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/#primaryimage","url":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/08\/Filtering-Emails-When-Collecting-Mailboxes-for-Investigation.jpg","contentUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/08\/Filtering-Emails-When-Collecting-Mailboxes-for-Investigation.jpg","width":1000,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.stellarinfo.com\/blog\/right-approach-to-filter-emails-forensically-collecting-email-mailboxes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stellarinfo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Approaches to Filter Emails for eDiscovery and Forensic Investigation"}]},{"@type":"WebSite","@id":"https:\/\/www.stellarinfo.com\/blog\/#website","url":"https:\/\/www.stellarinfo.com\/blog\/","name":"Stellar Data Recovery Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stellarinfo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/59813a3d157f4d3a68949bce854241f4","name":"Abhinav Sethi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5f7b5067a858b11bbdea64a56366ad4f686cef22d39ccc50363bc5346e80a6de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5f7b5067a858b11bbdea64a56366ad4f686cef22d39ccc50363bc5346e80a6de?s=96&d=mm&r=g","caption":"Abhinav Sethi"},"description":"Abhinav Sethi is a Senior Writer at Stellar. He writes articles, blog posts, knowledge-bases, case studies, etc. for different technologies. He also has a keen interest in digital forensics and helps forward-thinking companies fight different threats with apt solutions.","sameAs":["https:\/\/www.linkedin.com\/in\/abhinav-sethi-126b123a\/"],"url":"https:\/\/www.stellarinfo.com\/blog\/author\/abhinav\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/63324","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/comments?post=63324"}],"version-history":[{"count":20,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/63324\/revisions"}],"predecessor-version":[{"id":172578,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/63324\/revisions\/172578"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/media\/63327"}],"wp:attachment":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/media?parent=63324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/categories?post=63324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/tags?post=63324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}