Forensic Email Collector
Forensic Email Collector is a powerful email preservation tool
that can forensically collect emails from Gmail / G Suite, Exchange /
Office 365, and IMAP mailboxes such as Yahoo, iCloud, and AOL. It was
designed to address the pain points associated with email acquisitions
from online services.
Forensic Email Collector’s key features are as follows:
1. Automatic Retries and Resume Capability
Forensic Email Collector takes a snapshot of each mail folder before
acquisition and keeps track of each item in the target mailbox. In the
event of a network or server error, messages are retried automatically.
It is also possible to resume an incomplete project at a later time.
2. Server-side Searching
Using Forensic Email Collector, examiners can search mailboxes
directly on the email server before preservation. These in-place
searches are run very quickly, and without downloading the messages.
3. OAuth Support and Remote Authentication
Forensic Email Collector can authenticate with Gmail / G Suite via
OAuth. Moreover, a small, self-contained application called FEC Remote
Authenticator can be sent to custodians so that they can authenticate
Forensic Email Collector into their email accounts on their own
computer. This allows the forensic acquisition to be performed without
having to learn the custodian’s password.
4. Detailed Acquisition and Exception Logs
Forensic Email Collector keeps detailed logs of the acquisition as
well as any issues encountered to help make case documentation a breeze.
A full log of IMAP communications is kept including requests to and
responses from the server. Collected emails are hashed using MD5, SHA-1
or SHA-256 algorithms.
5. Flexible Output Formats
Acquired emails can be output to
EML, MSG, and PST formats—simultaneously. Forensic Email Collector’s
output is ready to be ingested into digital forensics and eDiscovery
tools for investigative work or for electronic document productions.
New features to FEC to make sure it is a joy to use.
Exchange Autodiscover
When preserving email evidence from an Exchange server, you may not
immediately know the Exchange Web Services (EWS) endpoint URL. FEC
utilizes the Exchange Autodiscover service to automatically configure
itself using the target email address and password.
Built-in Connection Profiles
FEC includes built-in connection profiles—including host name,
protocol, port and SSL settings—for hundreds of popular domain names
used by email service providers such as Gmail, Yahoo, Outlook.com and
iCloud. If the target email address matches one of the profiles, server
settings are populated automatically for you.
MX Lookup
As soon as you type the target email address, FEC checks the domain
name to see if it fits one of the pre-configured profiles such as Gmail,
Outlook.com, Yahoo, etc. If it does not, it looks up the mail exchanger
records (MX records) to determine the mail servers handling email
messaging for the target user’s domain.
Released on 10/23/2018
This is an update to the FEC Remote Authenticator application only.
Reduced system requirements to .NET Framework 4 from 4.6.1.
This allows FEC Remote Authenticator to run on earlier versions of
Windows 7 without SP1, Windows Vista, and even Windows XP.
Updated the save token dialog to make it more intuitive for end users.
v3.4.6
Released on 10/15/2018
Direct PST writer—Forensic Email Collector can now write output
PSTs all on its own. Outlook is no longer required. In addition to the
removal of the Outlook dependency, the direct PST writer brings
performance improvements.
Foldered output option for Gmail API—FEC now provides an option to
create an output folder structure based on Gmail labels when acquiring
Gmail / G Suite mailboxes via Gmail API.
Long file path support—Long file paths inside target mailboxes exceeding 260 characters are now supported.
Improvements to Exchange Autodiscover functionality.
You can now display the password inside the password box when entering credentials.
Introduced option to expand and collapse all child tree nodes when working with the folder tree of a target mailbox.
Verizon.net email addresses are now associated with the AOL built-in profile.
FEC now logs the username used during the acquisition. This can be
helpful in instances where the username differs from the target email
account (e.g., when delegation is used).
Hardened the folder tree creation process for IMAP mailboxes.
Improvements to the management and hashing of multiple output PSTs when the split output PST option is selected.
The display names of output PSTs are now set to reflect the target email address for easier identification.
Numerous other minor improvements.
Homepage_:– https://www.metaspike.com/forensic-email-collector/#intuitive
OS: Windows XP / Vista / 7 / 8 / 8.1 / 10 (x86-x64)
Language: ML / ENG / RUS
Medicine: Crack
OR