In the previous part of our article series we started to look at extracting data directly from Outlook or from a PST. In this final part, we will continue with […]
In the previous part of our article series, we finished with extracting data using Exchange features, namely Mailbox and Administrator Auditing. In these next and final two parts, we will […]
In the previous part of our article, we started to look at extracting data using Exchange features, namely using Message Tracking Logs and eDiscovery. Now we will use Mailbox and […]
In the first part of this article series, we looked at the importance of e-mail and forensics investigation, and how data is often collected and preserved from an Exchange environment. […]
While most e-mail investigations make use of 3rd-party tools to analyses Outlook data, this article series will explore a few basic methods on how a forensics investigator can gather and […]
In the previous part of this article series, we had a look at how to place mailboxes on In-Place Hold and how this feature makes use of the Recoverable Items […]
In the first part of this article series, we introduced In-Place Hold and its main differences when compared to Litigation Hold in Exchange 2010. In this second part, we will […]
In this article series, we will discuss the changes and improvements introduced to the renamed In-Place Hold and In-Place eDiscovery features in Exchange 2013.
Join Our Newsletter
Learn about the latest security threats, system optimization tricks, and the hottest new technologies in the industry.
Over 1,000,000 fellow IT Pros are already on-board, don't be left out!