Tags and Privileged Files ‐ MailXaminer

MailXaminer | March 25th, 2020 | Forensics

In digital forensics investigation, investigators must keep all security measures intact. The advancement and innovations in digital forensics science made it simpler to track cyber criminals with tagging and privilege. During the investigation process, when investigators needs to handle a bulk set of data, then it become very hard to remember little findings with particular files. To remember the things, “tagging” is a special feature which can help investigators to attach the finding note with particular file.

In some cases, investigation process is needs to be handle by teams. Sometimes, all the information is not about to disclosed by everyone. Then, the responsible can use “privilege” feature to disclose some confidential data that make it not available to open by everyone. In this write-up, we will describe two important features i.e., tagging and privilege files which is incorporated in MailXaminer tool. Both features play a major role in the email investigation process.


Tagging is a technique used in email forensics while an investigator needs to handle huge data. By tag documents, users can classify the data by marking important information within multiple emails.


In the investigation process, Privilege is the technique used to disclose private and confidential data. Investigators can mark the data which are privileged files, so that the data can only be accessed by the respective person.

Tag and Privilege your Evidential Data Using Software

In cyber technology, investigators mostly use robust and dynamic software solutions such as digital forensic analysis tools. One of the widely and trustworthy email forensic tool is MailXaminer. The software induces an option wherein it provides the solution to tag and privilege important and confidential data in a seamless way. Using this powerful tagging and privilege feature of the tool, the forensic investigators can unveil the actual truth through efficient crime detection techniques and brought it to the surface with the help of technology.

How to Tag Documents or Files with File Tagging System

Tagging is a pretty common feature of most e-discovery forensic analysis tools, which is believed to be particularly helpful for cyber investigators. These active tags can play a significant role as these can be used to filter a large number of emails that are being examined Also, it becomes easy to create separate sets of emails based on priority for investigation using this digital forensic investigation tool.

For organizing the files based on priority, this best file tagging software enables creating tags for file items in an open case and can create an empty parent tag in which subtext can be nested for marking groups. The tool gives an option to experts to save and or remove these tags, based on the requirement of the case they are investigating upon.

  • To add or remove tags from the files, simply just select the files and right-click on the files. It will show both the options to “Add” or “Remove” tags from the files.

add or remove  tag

  • To “Add Tag” with the data files, the user can create tags and nested tags with specifying any tag names. Users can add a description note to remember the things in detail.

Name the tag

  • After adding on the tags to tag documents, the preview files of the data will display with the tag names as showing in the image below.

view tags

How to Privilege Data Files with the Tool

The powerful feature of privileged files, which contain factual clues about any of the suspicious activities that relate to a particular crime being investigated. These privilege features of the software help the investigator in marking such files as privileged, which can be used later for evidence production.

  • To protect the confidential information, select the files from the mailbox that needs to be protected. Then, click on the “Mark as Privilege” button.


  • There is another option i.e., by clicking the data file, one an easily select the option as to mark it as privilege.

lock files

  • After marking the email as a privilege, a lock icon will display with the selected email data files. Now the files become disclosed that cannot be easily accessed by unauthorized person.


By using this feature, the confidential evidential information will not be available to export and convert. This will generate an error during an attempt made to export and convert the data file.

This unique video of MailXaminer tool talks about a very powerful tagging feature of privileged files, which contain factual clues about any of the suspicious activities that relate to a particular crime being investigated. These tags thus help the investigator in tagging, managing such files, and marking such files as privileged to be used later for evidence production.


In the cyber forensics investigation process, tagging and privilege  is the most essential feature while handling the data in bulk. Here in this write-up, we have described the various needs and techniques to tag documents and data privilege in the email data file using the software. MailXaminer is designed in a way that enables the users to add tags and privileges to the email data files in a hassle-free way.