Product Guide

Guide

Master Your Investigation Journey

Navigate with Confidence through MailXaminer's Comprehensive Guide

MailXaminer Ind

MailXaminer

A Solution to Investigate a Case Individually

Ideal for individual email forensic experts, this MailXaminer Individual Edition is specifically tailored for independent use.

MailXaminer Team

A Solution to Investigate a Case Collaboratively

Empower your team’s success and achieve your goals easily with MailXaminer Team edition. A perfect tool for collaborative work environments.

TABLE OF CONTENT FOR FORENSIC EVIDENCE COLLECTION TOOL

case management

Case Management

Manage Case Repository using the provided options such as Create new case, Open Case, Import Case, and Close case to efficiently handle cases. Multiple case repositories can be created to store evidence and information.

Guide

scan & add custodian file

Scan & Add Custodian File

Scan to add files with multiple file formats of web-based or desktop-based email client to recover evidences from any damaged email file. Add files in bulk or add single file with ease.

Guide

view analysis of email and attachments

View Analysis of Email and Attachment

Analyze deleted, read, unread or password protected emails in forensic views to acquire complete detail of an email. Examine emails in different possible views to capture the forged or evidence documents.

Guide

enhanced document support

Enhanced Document (Loose File ) Support

Using Enhanced Loose File Support option, you can scrutinize evidence present in document of any disk image file. Experts are required to check the Document or Loose file option to view files without any obstacle.

Guide

advance link analysis

Advance Link Analysis Intelligence

Visualize, analyze, and investigate the nefarious communication between any number of suspects with the advance link analysis mechanism integrated in the tool. Easily interpret the link between the suspects as well as investigate the emails and information exchanged. Find relationship between multiple users with Advanced Search Operators. Examine and visualize the exchanged email communication between them using the suspected keywords.

Guide

search with suspected keywords

Search With Suspected Keywords

Get the list of emails/attachments containing some specific keywords which are suspected for the case. Any number of keywords can be added manually or a CSV file can be imported with the list of suspected words.

Guide

hi-tech search with operators

Hi-Tech Search With Operators

After Forensics Recovery & Analyzing process, you can search for evidence in email & contacts body (To, Cc, Bcc, Subject, First name, Last Name, Sender Name etc.) using different operators. Also search evidence from attachments & remove duplicate searched email evidence.

Guide

Video

OCR guide

Analyze Evidence Using OCR

Using the built-in OCR functionalities of the tool, investigator can extract crucial information from media files imported as evidence.

Guide

create evidence list

Bookmark & Create an Evidence List

If you get any forensics evidence from Mails, Attachments, or Search Results, then you can add it into evidence list by using "Bookmark" button. It collects all the selected evidences in a Bookmark section where different actions can be taken.

Guide

export case report

Export Case Report

Utilize the reporting feature embedded in the tool. Preview and export the report of operations performed in terms of cases, keywords, tags, bookmarks, etc. The export formats supported includes HTML, PDF, and CSV file formats.

Guide

logs management

Logs Management

Now Manage log files details created during forensics analysis. File holds different detail such as Scan, Bookmark, Privilege, Export, Search, Tag, Report, and General.

Guide

export and save emails and attachments

Export & Save Emails and Attachments

After recovering forensic mail evidence and analyzing them, selected or collected mails/attachments can be exported in different formats. Suitable format can be selected, duplicate items can be removed, folder structure can be maintained.

Guide

enhanced document support

Presetting Options

Option to change software language & settings to operate tool can be managed for case activity, and a common directory can be made for all cases. Mail settings are helpful in sharing bookmarked items for review via shared location or email.

Guide

forensic hash analysis

Forensics Hash Analysis

Forensics hash algorithm option of the software allows you to analyze & examine the artifacts within heap of database. Under Scan Settings tab, check the option to view and filter out the emails using SHA1, MD5, SHA256 hash values.

Guide

explore artifacts from calendar

Explore Artifacts from Calendar

After performing investigation on email messages, experts can also examine calendar data of suspect with the integrated calendar analysis mechanism of the software. Under Scan Settings tab, the options of Calendar should be marked.

Guide

view skype chat data records

View Skype Chat Data Records

Using MailXaminer, Investigators can even view the Chat Details between different users of Skype application. Since Chat Details are stored in the Database file of Messenger application, this option allows to View, Export and Save them into the documented format.

Guide

examine call details

Examine Calls Details

Call Analysis features helps forensics investigators to find evidence during the investigation of Skype Messenger application. This is because such applications are providing an alternative to traditional communication.

Guide

tag your important emails

Tag Your Important Emails

Tag Emails to categorize Multiple Suspected Emails as per the information present in it. Mark the email with any name, word, or phrase to recognize its importance.

Guide

mark as prvilege

Mark As Privilege

Restrict Email transfer at opponent's end while showcasing your evidence list. The emails that needs to be protected can be selected and locked using "Mark as Privilege" option.

Guide