[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Tracing back deleted emails

Posted on 2009-04-30
1
Medium Priority
?
425 Views
Last Modified: 2012-05-06
Hi All,

             This is the scenario:A person has got the company A's  mail-id by some crooked ways.Now he has sent a mail to some other company and he deleted the mail.Now after two months the company/employees came to know what has happened.Now if they want to retrieve the specific mail that has been sent from one mai-ld to another mail id.We know the maild_id's also(sending mail-id and receiving mail-id).Now what is the process that has to followed ,if the company does not do the back up of mails

Regards
mahidhar
0
Comment
Question by:Mahidhar_Reddy
1 Comment
 
LVL 15

Accepted Solution

by:
fishadr earned 1500 total points
ID: 24268186
When tracking down e-mails these are kept wihtin the logs on the mail servers, but this will be the basic details only (from, to, subject mail id etc).

If you want to view the e-mail you will have to recover the e-mail from the server, alternatively check the source or destination computer to see if it is the deleted mail box.

If this is not available then there is little you can do, e-mail servers should be backed up for this reason!
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Phishing attempts can come in all forms, shapes and sizes. No matter how familiar you think you are with them, always remember to take extra precaution when opening an email with attachments or links.
Last month Marc Laliberte, WatchGuard’s Senior Threat Analyst, contributed reviewed the three major email authentication anti-phishing technology standards: SPF, DKIM, and DMARC. Learn more in part 2 of the series originally posted in Cyber Defense …
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses
Course of the Month18 days, 8 hours left to enroll

825 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question