Link to home
Start Free TrialLog in
Avatar of jana
janaFlag for United States of America

asked on

Identify the BCC list in an email in MS Office 2010

We received emails where then the sender and the receiver are the same; we assume the sender placed the emails as BCC.  We would like to know the emails in the BCC of emails received.  We have Microsoft Outlook 2010
SOLUTION
Avatar of Lee W, MVP
Lee W, MVP
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
You can also look at the source of the message and see that that information is not there.
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of jana

ASKER

How is it that it can't be identified?  Does the sender's server omits this emails in BCC prior processing the SENT or is it that the BCC list is encrypted?
ASKER CERTIFIED SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
if you dont believe it, do a trace. email is plain text. you can view it all including all headers.
Avatar of jana

ASKER

Dave, makes sense; you mean that it simply not included BCC list to each email the server sends.

Lee, we beleove in u guys but we like your recommendation.  How can we do a trace to see the actual movement of the process?
Use a network monitoring tool like wireshark (but if you're asking this question it's probably going to take you HOURS of learning how to use it and process the data.  You have to use a hub or a smart switch with port mirroring and examine the network traffice between your server and the clients.

You could just view the message source but exactly how depends on what mail clients (and if outlook, what versions) you are using.  Google view message source outlook 20xx (fill the in the xx).

But given your unwillingness to accept that it cannot be done, I doubt anything short of a a network packet inspection using wireshark or similar tool will satiate you.
Avatar of jana

ASKER

We accept it from the beginning, it's just that it was interesting you suggestion on monitoring and wanted to try it.  Anyways, thanx guys, great info!