While most e-mail investigations make use of 3rd-party tools to analyses Outlook data, this article series will explore a few basic methods on how a forensics investigator can gather and analyze data related to an e-mail investigation in an Exchange 2010, 2013 and/or Online environments using information provided by Exchange features or using MFCMapi.
How to size the different Exchange Server 2013 roles and validate the final design.
In this new article series, the author goes over the process of creating corporate profiles, which will be then used to manage a larger number of mailboxes from a central location.
In this part of our article series we will focus on the Mailbox role side of things.
In the last related blog post we gave some introduction about Exchange Online Protection (EOP), what needs to be done when EOP is not working as desired and spam email troubleshooting process and classification. In this blog we will be moving further and discussing some more advanced option to stop spam emails.