{"id":311,"date":"2022-10-26T02:35:00","date_gmt":"2022-10-25T21:05:00","guid":{"rendered":"https:\/\/www.mailxaminer.com\/blog\/?p=311"},"modified":"2022-10-27T16:40:52","modified_gmt":"2022-10-27T11:10:52","slug":"live-exchange-mailbox-forensics","status":"publish","type":"post","link":"https:\/\/www.mailxaminer.com\/blog\/live-exchange-mailbox-forensics\/","title":{"rendered":"Live Exchange Forensics &#8211; Evidence Examination"},"content":{"rendered":"<p style=\"text-align: justify;\">Before diving into live Exchange forensics, we should know about MS Exchange itself. MS Exchange is an emailing server and calendaring server, with Microsoft as its origin. Moreover, it exclusively operates on the Windows server operating system. Primarily, Exchange Server uses a proprietary protocol i.e., MAPI. Later on, it added support for IMAP, POP3, and EAS. Additionally, the standard SMTP protocol is in use to connect with the other internet mail servers.<\/p>\n<p style=\"text-align: justify;\">Even though emails are one of the most utilized services for the exchange of information by individuals and businesses. Evidently, a lot of attempts are happening to prevent an email from falling into the wrong hands for malicious activities. However, they are not enough to prevent email breaching. There are two inherent limitations of an email that makes it possible for a spammer to use it for illegitimate activities:<\/p>\n<ul>\n<li>By default, there is no involvement of the encryption mode while the message communicates from the sender to the receiver. Also, there is no integrity test at the receiver\u2019s end.<\/li>\n<li>For sending emails, the SMTP protocol is in use that does not operate any authentication mechanism. in addition, the worst part is that it&#8217;s easy to forge an email header thereby manipulating the source of the email.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">If you are on the verge to perform live exchange forensics analysis, then check out this blog and get the examination of the Exchange Server database file instantly.<\/p>\n<h2 class=\"h4\"><strong>How Exchange Server Stores User Database?<\/strong><\/h2>\n<p style=\"text-align: justify;\">Exchange Server has two main components i.e., storage group and databases. We call a storage group a &#8221; container&#8221;, which is useful to store mailboxes and public folder stores. Whenever an Exchange Server is being installed, Initially, the system creates mailboxes and public folders at the time of Exchange server installation. Moreover, the default mailbox store consists of two database files i.e., Priv1.edb and Priv1.stm.<\/p>\n<p style=\"text-align: justify;\">The Priv1.edb is a rich text file, which includes message headers, attachments and message text. Whereas, Priv1.stm file consists of streaming internet content i.e., multimedia files such as audio, video, etc.<\/p>\n<h2 class=\"h4\"><strong>Collecting Emails from Live Exchange Server<\/strong><\/h2>\n<p style=\"text-align: justify;\">During the collection and preservation phase of email data i.e., the email forensics investigation of live Exchange Server. There exist certain approaches, which are helpful in considering the matter of facts. For example:<\/p>\n<ul>\n<li>Exporting mailbox of the custodian using MS Outlook. For this, copying the local copy of the mailbox, i.e. OST into PST file format is crucial.<\/li>\n<li>In Exchange server editions such as 2019, 2016, 2013, etc. Exchange Management Shell (PowerShell cmdlets) is useful. It is in use for multiple mailbox export at once.<\/li>\n<li>There are specialized third-party tools that allow extracting and saving Exchange mailboxes in Outlook PST file, despite the mailbox size.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">One of the shortcomings of using any of these approaches is that they do not export the deleted items from the mailbox. The items that are deleted from the mailbox get saved at a special retention area which is called a <strong>Dumpster<\/strong>. The deleted messages are preserved for a configured time period in unallocated space in the MS Exchange database. Using Outlook, it will not export recoverable deleted messages.<\/p>\n<h3 class=\"h4\"><strong>Here\u2019s How to Recover Deleted Items from Mailbox?<\/strong><\/h3>\n<p style=\"text-align: justify;\">The concept of <strong>\u201cDumpster\u201d<\/strong> in the earlier versions of Exchange is what we call <strong>\u201cRecoverable Items Folder\u201d<\/strong>. There is a possibility to get back soft deleted mailbox data from Dumpster or RIF (depending upon version of Exchange Server in use). Deletions, Versions, Purges, Discovery Hold, Audits, and calendar logging are the sub folder of Recoverable Items Folder that stores the deleted contents of the mailbox.<\/p>\n<p style=\"text-align: justify;\"><strong>In-Place Hold and Litigation Hold<\/strong><br \/>\nIn-Place hold helps to preserve the mailbox items, which matches the query parameters. Besides this, it helps to protect the items from data deleted by the users or through automated processes. In order to preserve the items under user mailboxes and to protect the items, which got deleted from the user\u2019s end, one can make use of Litigation Hold.<\/p>\n<p style=\"text-align: justify;\"><strong>Note:<\/strong> In case, you put the mailbox in both In-Place and Litigation Hold. Then, Litigation Hold takes the preference as it holds the complete mailbox.<\/p>\n<p style=\"text-align: justify;\"><strong>Single Item Recovery<\/strong><br \/>\nEven if the deleted items have surpassed the retention period, there is a possibility to get them back without restoring the backup. The purged items are goes to a Single Items Recovery folder when the Managed Folder Assistant completes processing for the Recoverable Items Folder.<\/p>\n<p style=\"text-align: justify;\"><strong>Mailbox Audit Logging<\/strong><br \/>\nIn an enterprise, there are some mailboxes that contain confidential data. This can be the mailbox of HR department, the company\u2019s CEO or normal mailboxes of employees that have to be under analyzation for regulatory compliance or legal proceedings. Although, administrators are less interested in the mailbox of a user, but there can be some dishonest one that tries to access a mailbox to obtain sensitive information for their own advantage. Therefore, it is important to track access to the mailboxes by users other than the mailbox owner.<\/p>\n<p style=\"text-align: justify;\">Using the Auditing Mailbox Access feature which records the operations on a mailbox such as copying or deletion. It saves the audit entries in the \u201cAudit\u201d sub-folder of the Recoverable Items Folder. However, this option can be useful only when auditing for a mailbox is in enable mode.<\/p>\n<h3 class=\"h4\"><strong>Hassle-free Solution to Perform Live Exchange Forensics<\/strong><\/h3>\n<p style=\"text-align: justify;\">Avail <strong>MailXaminer <a href=\"https:\/\/www.mailxaminer.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Email Examiner Software<\/a><\/strong>, which is a fully-equipped software to initiate live Exchange forensics. Moreover, it helps to analyze every detail from emails and other attributes from the Exchange database without facing any technical glitches. The best part of the software is that it does not require the installation of any external software applications. As a result, one can instantly analyze the data from the Exchange Server to thoroughly investigate the case.<\/p>\n<h3 class=\"h4\"><strong>Winding Things Up!<\/strong><\/h3>\n<p style=\"text-align: justify;\">For the purpose of forensics investigation of live Exchange emails, most of the investigators prefer third-party tools. In the above section, some basic methods to analyze data from a live Exchange Server are present. This can be further accompanied by a full-fledged tool like <strong>MailXaminer<\/strong>. The software helps to perform an in-depth examination of emails without any hassle.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Before diving into live Exchange forensics, we should know about MS Exchange itself. MS Exchange is an emailing server and <a href=\"https:\/\/www.mailxaminer.com\/blog\/live-exchange-mailbox-forensics\/\" >Read More&#8230;<\/a><\/p>\n","protected":false},"author":8,"featured_media":5119,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"class_list":["post-311","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-forensics"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Live Exchange Forensics \u2013 Analyze MS Exchange Server Emails<\/title>\n<meta name=\"description\" content=\"How to execute Live Exchange forensics and search for email evidence within the mailboxes of live MS Exchange Server 2007, 2010, 2013, 2016, 2019.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mailxaminer.com\/blog\/live-exchange-mailbox-forensics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Live Exchange Forensics \u2013 Analyze MS Exchange Server Emails\" \/>\n<meta property=\"og:description\" content=\"How to execute Live Exchange forensics and search for email evidence within the mailboxes of live MS Exchange Server 2007, 2010, 2013, 2016, 2019.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mailxaminer.com\/blog\/live-exchange-mailbox-forensics\/\" \/>\n<meta property=\"og:site_name\" content=\"MailXaminer Official Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-25T21:05:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-27T11:10:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/11\/Chaos-Intellect-Forensics-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"696\" \/>\n\t<meta property=\"og:image:height\" content=\"390\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mansi Joshi\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mansi Joshi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/live-exchange-mailbox-forensics\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/live-exchange-mailbox-forensics\\\/\"},\"author\":{\"name\":\"Mansi Joshi\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#\\\/schema\\\/person\\\/c9207395234d7178f353e02c45490a95\"},\"headline\":\"Live Exchange Forensics &#8211; Evidence Examination\",\"datePublished\":\"2022-10-25T21:05:00+00:00\",\"dateModified\":\"2022-10-27T11:10:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/live-exchange-mailbox-forensics\\\/\"},\"wordCount\":1025,\"image\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/live-exchange-mailbox-forensics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Chaos-Intellect-Forensics-1.png\",\"keywords\":[\"Live Exchange Forensics\"],\"articleSection\":[\"Forensics\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/live-exchange-mailbox-forensics\\\/\",\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/live-exchange-mailbox-forensics\\\/\",\"name\":\"Live Exchange Forensics \u2013 Analyze MS Exchange Server Emails\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/live-exchange-mailbox-forensics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/live-exchange-mailbox-forensics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Chaos-Intellect-Forensics-1.png\",\"datePublished\":\"2022-10-25T21:05:00+00:00\",\"dateModified\":\"2022-10-27T11:10:52+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#\\\/schema\\\/person\\\/c9207395234d7178f353e02c45490a95\"},\"description\":\"How to execute Live Exchange forensics and search for email evidence within the mailboxes of live MS Exchange Server 2007, 2010, 2013, 2016, 2019.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/live-exchange-mailbox-forensics\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/live-exchange-mailbox-forensics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/live-exchange-mailbox-forensics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Chaos-Intellect-Forensics-1.png\",\"contentUrl\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Chaos-Intellect-Forensics-1.png\",\"width\":696,\"height\":390,\"caption\":\"LIVE EXCHANGE FORENSICS\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/live-exchange-mailbox-forensics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog Home\",\"item\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Forensics\",\"item\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/category\\\/forensics\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Live Exchange Forensics &#8211; Evidence Examination\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/\",\"name\":\"MailXaminer Official Blog\",\"description\":\"Tech Talks by Forensics Experts\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#\\\/schema\\\/person\\\/c9207395234d7178f353e02c45490a95\",\"name\":\"Mansi Joshi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g\",\"caption\":\"Mansi Joshi\"},\"description\":\"Tech enthusiast &amp; cyber expert for the past 5 years. Love to solve complicated scenarios to counter cyber crimes with in-depth technical knowledge.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/mansi-joshi-54414524a\\\/\",\"https:\\\/\\\/www.mailxaminer.com\\\/assets\\\/author\\\/mansi-joshi.png\"],\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/author\\\/mansi-joshi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Live Exchange Forensics \u2013 Analyze MS Exchange Server Emails","description":"How to execute Live Exchange forensics and search for email evidence within the mailboxes of live MS Exchange Server 2007, 2010, 2013, 2016, 2019.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mailxaminer.com\/blog\/live-exchange-mailbox-forensics\/","og_locale":"en_US","og_type":"article","og_title":"Live Exchange Forensics \u2013 Analyze MS Exchange Server Emails","og_description":"How to execute Live Exchange forensics and search for email evidence within the mailboxes of live MS Exchange Server 2007, 2010, 2013, 2016, 2019.","og_url":"https:\/\/www.mailxaminer.com\/blog\/live-exchange-mailbox-forensics\/","og_site_name":"MailXaminer Official Blog","article_published_time":"2022-10-25T21:05:00+00:00","article_modified_time":"2022-10-27T11:10:52+00:00","og_image":[{"width":696,"height":390,"url":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/11\/Chaos-Intellect-Forensics-1.png","type":"image\/png"}],"author":"Mansi Joshi","twitter_misc":{"Written by":"Mansi Joshi","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mailxaminer.com\/blog\/live-exchange-mailbox-forensics\/#article","isPartOf":{"@id":"https:\/\/www.mailxaminer.com\/blog\/live-exchange-mailbox-forensics\/"},"author":{"name":"Mansi Joshi","@id":"https:\/\/www.mailxaminer.com\/blog\/#\/schema\/person\/c9207395234d7178f353e02c45490a95"},"headline":"Live Exchange Forensics &#8211; Evidence Examination","datePublished":"2022-10-25T21:05:00+00:00","dateModified":"2022-10-27T11:10:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mailxaminer.com\/blog\/live-exchange-mailbox-forensics\/"},"wordCount":1025,"image":{"@id":"https:\/\/www.mailxaminer.com\/blog\/live-exchange-mailbox-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/11\/Chaos-Intellect-Forensics-1.png","keywords":["Live Exchange Forensics"],"articleSection":["Forensics"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mailxaminer.com\/blog\/live-exchange-mailbox-forensics\/","url":"https:\/\/www.mailxaminer.com\/blog\/live-exchange-mailbox-forensics\/","name":"Live Exchange Forensics \u2013 Analyze MS Exchange Server Emails","isPartOf":{"@id":"https:\/\/www.mailxaminer.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mailxaminer.com\/blog\/live-exchange-mailbox-forensics\/#primaryimage"},"image":{"@id":"https:\/\/www.mailxaminer.com\/blog\/live-exchange-mailbox-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/11\/Chaos-Intellect-Forensics-1.png","datePublished":"2022-10-25T21:05:00+00:00","dateModified":"2022-10-27T11:10:52+00:00","author":{"@id":"https:\/\/www.mailxaminer.com\/blog\/#\/schema\/person\/c9207395234d7178f353e02c45490a95"},"description":"How to execute Live Exchange forensics and search for email evidence within the mailboxes of live MS Exchange Server 2007, 2010, 2013, 2016, 2019.","breadcrumb":{"@id":"https:\/\/www.mailxaminer.com\/blog\/live-exchange-mailbox-forensics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mailxaminer.com\/blog\/live-exchange-mailbox-forensics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mailxaminer.com\/blog\/live-exchange-mailbox-forensics\/#primaryimage","url":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/11\/Chaos-Intellect-Forensics-1.png","contentUrl":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/11\/Chaos-Intellect-Forensics-1.png","width":696,"height":390,"caption":"LIVE EXCHANGE FORENSICS"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mailxaminer.com\/blog\/live-exchange-mailbox-forensics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog Home","item":"https:\/\/www.mailxaminer.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Forensics","item":"https:\/\/www.mailxaminer.com\/blog\/category\/forensics\/"},{"@type":"ListItem","position":3,"name":"Live Exchange Forensics &#8211; Evidence Examination"}]},{"@type":"WebSite","@id":"https:\/\/www.mailxaminer.com\/blog\/#website","url":"https:\/\/www.mailxaminer.com\/blog\/","name":"MailXaminer Official Blog","description":"Tech Talks by Forensics Experts","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mailxaminer.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.mailxaminer.com\/blog\/#\/schema\/person\/c9207395234d7178f353e02c45490a95","name":"Mansi Joshi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g","caption":"Mansi Joshi"},"description":"Tech enthusiast &amp; cyber expert for the past 5 years. Love to solve complicated scenarios to counter cyber crimes with in-depth technical knowledge.","sameAs":["https:\/\/www.linkedin.com\/in\/mansi-joshi-54414524a\/","https:\/\/www.mailxaminer.com\/assets\/author\/mansi-joshi.png"],"url":"https:\/\/www.mailxaminer.com\/blog\/author\/mansi-joshi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts\/311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/comments?post=311"}],"version-history":[{"count":0,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts\/311\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/media\/5119"}],"wp:attachment":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/media?parent=311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/categories?post=311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}