Approaches to Filter Emails for eDiscovery and Forensic Investigation

Summary: In this blog, we have discussed two methods to filter emails during email forensics investigation. We have also talked about the advantages and disadvantages of these two approaches. Apart from this, we have also highlighted the utility of using an efficient Email forensics software, like Stellar Email Forensics.

TRY 60 DAYS FREE

When you collect mailboxes for eDiscovery and digital forensics investigation, you need to search and filter the emails and other details. Email filtering helps you save considerable time and costs. In addition, it helps overcome privacy issues that stop collecting certain emails for forensic investigation. 

There are two methods to filter emails during email forensics investigation – Collecting First, Filtering Later, and Filtering First, Collecting Later.

Let us take a closer look at both methods and their advantages and disadvantages.

Method 1: Collecting First, Filtering Later

In this approach, forensic investigators start with collecting all the mailboxes. After collecting these mailboxes, they import them into an advanced eDiscovery and email forensics software, such as Stellar Email Forensic. This software comes with a 60-day trial period. The entire software’s features are available in the trial version itself. With an easy-to-use manual available on the website, you can search and filter the relevant emails in a short time and perform subsequent steps, such as processing, reviewing, and generating reports.

Advantages:

The following are some advantages of this method:

Disadvantages:

The following are some disadvantages of this method:

Method 2: Filtering First, Collecting Later 

In this method, you first perform mailbox searches directly using the built-in search functions of email services and products. Email clients, such as Office 365, Gmail, Outlook, etc., provide various search options. Afterward, you can collect emails that are relevant to the forensic investigation.

Advantages:

The following are some advantages of this method:

Disadvantages:

The following are some disadvantages of this method:

Method Pros Cons
Method 1: Collecting first, filtering later Performing a new search is easy, as you have access to the entire mailboxes. In addition, an Enterprise-grade eDiscovery email forensic tool, such as Stellar Email Forensic, offers advanced search functions that make the searching task very easy. Collecting entire mailboxes is time-consuming. This can create problems when there are privacy concerns or time constraints.
Method 2: Filtering first, collecting later Saves time during email collection. At the same time, privacy concerns and time constraints can be addressed. Collecting additional emails that exist in source mailboxes requires re-acquisition of the mailboxes, which can further create unnecessary delays in the investigation process. Performing searches in email platforms gives you limited search functions and tools. There is a learning curve with different email platforms, which follow different search syntax and commands.

Conclusion

Filtering and searching emails before or after forensic collection have specific pros and cons. For example, suppose there are privacy concerns or other restrictions while preserving the entire mailboxes. In that case, you may have to perform searches on the original mailboxes first, following the organization’s security protocol. However, if you can collect the entire mailboxes and access the complete database, it is better to collect them first and then perform filtering and searching on those mailboxes.

Need a powerful email forensics software that can easily search and filter emails for forensic investigation? Check out Stellar Email Forensic! It supports more than 25 standard email file formats, such as EDBPST, OST, DBX, NSF, MBOX, OLM, etc. In addition, it offers deleted email recovery and has a facility for case management during criminal investigations with the support of tagging, bookmarking, and log management. Download it now!

Related Post

Exit mobile version