{"id":26609,"date":"2022-03-29T11:32:11","date_gmt":"2022-03-29T11:32:11","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=26609"},"modified":"2025-05-07T21:42:20","modified_gmt":"2025-05-07T21:42:20","slug":"how-to-conduct-an-email-investigation","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/how-to-conduct-an-email-investigation\/","title":{"rendered":"How to Conduct an Email Investigation?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">There\u2019s no doubt that emails have become one of the most common communication media. Although used for personal chats, they\u2019re primarily deployed for business-related communications. From arranging internal meetings and pitching potential clients to maintaining relations with investors, everything is done through email.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But do you know about the downside? Well, cybercriminals use sensitive information for malicious activities. According to the FBI\u2019s Internet Crime Complaint Center (IC3) 2020 annual report, <\/span><a href=\"https:\/\/www.fbi.gov\/news\/pressrel\/press-releases\/fbi-releases-the-internet-crime-complaint-center-2020-internet-crime-report-including-covid-19-scam-statistics\"><span style=\"font-weight: 400;\">791,790 complaints<\/span><\/a><span style=\"font-weight: 400;\"> of suspected internet crime were recorded. Phishing scams, nonpayment\/nondelivery scams, and extortion were the top three cybercrimes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When a cyber incident occurs, companies must conduct <\/span><b>an email investigation<\/b><span style=\"font-weight: 400;\"> to identify the cause and take the required actions. It\u2019s just as crucial to monitor the website activity of your employees. EasyDMARC\u2019s<\/span><a href=\"https:\/\/easydmarc.com\/tools\/phishing-url\"> <span style=\"font-weight: 400;\">phishing URL checker <\/span><\/a><span style=\"font-weight: 400;\">\u00a0is a quick and easy way to detect phishing and malicious websites.<\/span><\/p>\n<h2><b>Goals of Email Investigation<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Before understanding <\/span><b>how to investigate a phishing mail<\/b><span style=\"font-weight: 400;\">, you should know that email investigation is a branch of digital forensic science. It combines techniques used to gather email-based criminal evidence.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The <\/span><b>email investigation process<\/b><span style=\"font-weight: 400;\"> locates the origin of a cybercrime by carefully discovering the history of the mail sent. This is consequently used for finding all the entities involved in the criminal activity.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s worth noting that the latter doesn&#8217;t need to be of online origin. Sure, cybercrime like phishing and spoofing might need email investigation more, but let\u2019s say, murders that have an email component might also need investigating.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Email investigators typically analyze the <\/span><i><span style=\"font-weight: 400;\">actual<\/span><\/i><span style=\"font-weight: 400;\"> sender (not the one whose email address has been exploited by the phisher or scammer), the recipient, and dates and times.<\/span><\/p>\n<h2><b>How Do You Do an Email Investigation?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">To conduct a successful email investigation you need to follow several steps and examine various components. We discuss all of them in this section.<\/span><\/p>\n<h3><b>Header Analysis<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The header of an email contains important information that can help in an<\/span><b> email investigation<\/b><span style=\"font-weight: 400;\">. A chunk of data is kept hidden from the user, and only the subject, date, and sender&#8217;s email address are made visible. Cybercriminals often forge this bit of information to appear genuine.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, you can extract additional or hidden details with certain methods for different email applications. Once done, you\u2019ll often find extensive information about the route an email took to reach your inbox. So,<\/span><b> how do you do an email investigation<\/b><span style=\"font-weight: 400;\"> on a personal level? You can start by observing hidden details like:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Whether the &#8216;from&#8217; email ID and &#8216;return path&#8217; email ID match.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Check if the &#8216;reply-to&#8217; email ID is the same as the &#8216;from&#8217; email ID.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">If &#8216;X-distribution&#8217; is bulky, it&#8217;s an indication of spam.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">X-spam Score and X-Spam Flag help determine if it&#8217;s a <a href=\"https:\/\/easydmarc.com\/blog\/what-is-spam-email-and-how-to-prevent-it\/\">spam email<\/a>.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Cyber forensic experts use this information in their <\/span><b>email investigations<\/b><span style=\"font-weight: 400;\"> to track down culprits.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As per Google\u2019s Threat Analysis Group (TAG), around<\/span><a href=\"https:\/\/www.techradar.com\/news\/google-says-chinese-hackers-are-targeting-us-government-gmail-accounts\" target=\"_blank\" rel=\"noopener\"> <span style=\"font-weight: 400;\">50,000 alerts were sent in 2021<\/span><\/a><span style=\"font-weight: 400;\"> to affected customers whenever it detected any sorts of cyberattacks, including email attacks.<\/span><\/p>\n<h3><b>Email Server Investigation<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Forensic specialists deploy email server investigation techniques to trace the origins of an email. If the sender or receiver has deleted the email, then investigators look at the Internet Service Provider (ISP) or proxy servers to find a saved copy. A proxy server is an intermediate gateway between the end-user and the website domain.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Moreover, ISP and proxy servers can reveal information about the address of the sender&#8217;s device, which speeds up the <\/span><b>email investigation process<\/b><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">During an email investigation, start inspecting the logs as early as possible. TheHypertext Transfer Protocol (HTTP) and Simple Mail Transfer Protocol (SMTP) are frequently archived by ISPs.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">SMTP is the common messaging initiation protocol. So, the later you start, the more time and effort it takes to fetch the information required for your <\/span><b>email investigation<\/b><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<h3><b>Network Device Investigation<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">At times, the above-mentioned logs aren\u2019t available. This could be due to non-configuration or denial to share log files. In this situation, forensic cyber experts check the data maintained by network devices like switches and routers.<\/span><\/p>\n<h3><b>Sender Mailer Fingerprints<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In addition to the &#8216;subject,&#8217;, &#8216;from:&#8217;, and &#8216;to:&#8217; headers, emails contain X-headers. Specialists track this piece of information to locate the IP address of the sender&#8217;s device.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">During the <\/span><b>investigation of an email<\/b><span style=\"font-weight: 400;\">, the sender mailer fingerprints approach identifies the sender\u2019s software and its version. For example, Gmail, Outlook, Hotmail and more.<\/span><\/p>\n<h3><b>Software Embedded Identifiers<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The sender\u2019s software holds some additional information regarding the message and attachments\u2014 crucial for the <\/span><b>email investigation process<\/b><span style=\"font-weight: 400;\">. Software programs used for creating a message or file capture such information. For example, Microsoft Word or Adobe Photoshop.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you\u2019re keen to learn <\/span><b>how to investigate a phishing mail<\/b><span style=\"font-weight: 400;\">, you can find these details in the form of custom headers or Multipurpose Internet Mail Extensions (MIME) content as a Transport Neutral Encapsulation Format (TNEF).\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">MIME is an internet standard deployed to assist the transfer of single text, multiple texts, or non-text attachments. TNEF is an exclusive and unshared format for email attachments used by Microsoft Outlook and Microsoft Exchange Server.<\/span><\/p>\n<h2><b>Final Thoughts<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">With perpetually increasing cases of spamming, phishing, identity theft, and other cybercrimes, companies of all sizes should invest in cybersecurity. <\/span><b>Email investigation<\/b><span style=\"font-weight: 400;\"> is one such series of processes involved in identifying culprits of any email-related cybercrimes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The geopolitical situation in the world has also <\/span><a href=\"https:\/\/easydmarc.com\/blog\/cybersecurity-during-armed-conflicts-cyberwar-hits-harder-than-bombs\/\"><span style=\"font-weight: 400;\">impacted the digital side of things<\/span><\/a><span style=\"font-weight: 400;\">. According to Forbes, Russian-sourced cyberattacks rose by<\/span><a href=\"https:\/\/www.forbes.com\/sites\/emilsayegh\/2022\/02\/28\/the-cybersecurity-implications-of-the-russia-ukraine-conflict\/?sh=779bf4941242\"> <span style=\"font-weight: 400;\">800% within 48 hours<\/span><\/a><span style=\"font-weight: 400;\"> of the first attack.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The techniques shared above could scare a beginner. Still, email nerds at <\/span><a href=\"https:\/\/easydmarc.com\/contact-us\"><span style=\"font-weight: 400;\">EasyDMARC<\/span><\/a><span style=\"font-weight: 400;\"> are always ready to answer all your questions.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There\u2019s no doubt that emails have become one &#8230;<\/p>\n","protected":false},"author":1,"featured_media":26836,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[204,203],"tags":[],"class_list":["post-26609","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-email-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Conduct an Email Investigation? | EasyDMARC<\/title>\n<meta name=\"description\" content=\"When a cyber incident occurs, companies must conduct an email investigation. Read on to learn how to take the required actions for this cases.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/how-to-conduct-an-email-investigation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Conduct an Email Investigation?\" \/>\n<meta property=\"og:description\" content=\"When a cyber incident occurs, companies must conduct an email investigation. Read on to learn how to take the required actions for this cases.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/how-to-conduct-an-email-investigation\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-29T11:32:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-07T21:42:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/03\/How-to-Conduct-an-Email-Investigation_.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EasyDMARC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EasyDMARC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-conduct-an-email-investigation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-conduct-an-email-investigation\\\/\"},\"author\":{\"name\":\"EasyDMARC\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\"},\"headline\":\"How to Conduct an Email Investigation?\",\"datePublished\":\"2022-03-29T11:32:11+00:00\",\"dateModified\":\"2025-05-07T21:42:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-conduct-an-email-investigation\\\/\"},\"wordCount\":935,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-conduct-an-email-investigation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/How-to-Conduct-an-Email-Investigation_.png\",\"articleSection\":[\"Blog\",\"Email Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-conduct-an-email-investigation\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-conduct-an-email-investigation\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-conduct-an-email-investigation\\\/\",\"name\":\"How to Conduct an Email Investigation? | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-conduct-an-email-investigation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-conduct-an-email-investigation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/How-to-Conduct-an-Email-Investigation_.png\",\"datePublished\":\"2022-03-29T11:32:11+00:00\",\"dateModified\":\"2025-05-07T21:42:20+00:00\",\"description\":\"When a cyber incident occurs, companies must conduct an email investigation. Read on to learn how to take the required actions for this cases.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-conduct-an-email-investigation\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-conduct-an-email-investigation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-conduct-an-email-investigation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/How-to-Conduct-an-Email-Investigation_.png\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/How-to-Conduct-an-Email-Investigation_.png\",\"width\":1440,\"height\":910,\"caption\":\"How to Conduct an Email Investigation\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-conduct-an-email-investigation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Email Security\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/email-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"How to Conduct an Email Investigation?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\",\"name\":\"EasyDMARC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"caption\":\"EasyDMARC\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/easydmarc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Conduct an Email Investigation? | EasyDMARC","description":"When a cyber incident occurs, companies must conduct an email investigation. Read on to learn how to take the required actions for this cases.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/how-to-conduct-an-email-investigation\/","og_locale":"en_US","og_type":"article","og_title":"How to Conduct an Email Investigation?","og_description":"When a cyber incident occurs, companies must conduct an email investigation. Read on to learn how to take the required actions for this cases.","og_url":"https:\/\/easydmarc.com\/blog\/how-to-conduct-an-email-investigation\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2022-03-29T11:32:11+00:00","article_modified_time":"2025-05-07T21:42:20+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/03\/How-to-Conduct-an-Email-Investigation_.png","type":"image\/png"}],"author":"EasyDMARC","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"EasyDMARC","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/how-to-conduct-an-email-investigation\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/how-to-conduct-an-email-investigation\/"},"author":{"name":"EasyDMARC","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97"},"headline":"How to Conduct an Email Investigation?","datePublished":"2022-03-29T11:32:11+00:00","dateModified":"2025-05-07T21:42:20+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/how-to-conduct-an-email-investigation\/"},"wordCount":935,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/how-to-conduct-an-email-investigation\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/03\/How-to-Conduct-an-Email-Investigation_.png","articleSection":["Blog","Email Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/how-to-conduct-an-email-investigation\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/how-to-conduct-an-email-investigation\/","url":"https:\/\/easydmarc.com\/blog\/how-to-conduct-an-email-investigation\/","name":"How to Conduct an Email Investigation? | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/how-to-conduct-an-email-investigation\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/how-to-conduct-an-email-investigation\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/03\/How-to-Conduct-an-Email-Investigation_.png","datePublished":"2022-03-29T11:32:11+00:00","dateModified":"2025-05-07T21:42:20+00:00","description":"When a cyber incident occurs, companies must conduct an email investigation. Read on to learn how to take the required actions for this cases.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/how-to-conduct-an-email-investigation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/how-to-conduct-an-email-investigation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/how-to-conduct-an-email-investigation\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/03\/How-to-Conduct-an-Email-Investigation_.png","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/03\/How-to-Conduct-an-Email-Investigation_.png","width":1440,"height":910,"caption":"How to Conduct an Email Investigation"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/how-to-conduct-an-email-investigation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Email Security","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/email-security\/"},{"@type":"ListItem","position":4,"name":"How to Conduct an Email Investigation?"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97","name":"EasyDMARC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","caption":"EasyDMARC"},"url":"https:\/\/easydmarc.com\/blog\/author\/easydmarc\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/03\/How-to-Conduct-an-Email-Investigation_.png","_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/26609","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=26609"}],"version-history":[{"count":0,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/26609\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/26836"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=26609"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=26609"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=26609"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}