{"id":949,"date":"2015-12-09T11:01:51","date_gmt":"2015-12-09T05:31:51","guid":{"rendered":"https:\/\/www.mailxaminer.com\/blog\/?p=949"},"modified":"2025-05-23T14:50:13","modified_gmt":"2025-05-23T09:20:13","slug":"zimbra-server-forensic-analysis","status":"publish","type":"post","link":"https:\/\/www.mailxaminer.com\/blog\/zimbra-server-forensic-analysis\/","title":{"rendered":"Zimbra Server Forensics"},"content":{"rendered":"<p>To examine the stored messages in <strong>MSG File format<\/strong> of Zimbra Server, first, we have to understand the Zimbra Server throughly. Zimbra Server manages complete data like mailbox contents, messages, contacts, calendars, etc. It is supported on Linux operating system only. The MTA Server receives the messages and passes them through a set of created filters. The messages are then finally deposited to the correct mailbox. It is available in both open-source and commercial versions. In the commercial versions, closed-source components like MAPI connector are made available. The MAPI connector enables the user to synchronize Outlook contact and calendar with Zimbra Server.<\/p>\n<p>Zimbra Server can be installed in both single-Server as well as multi-Server environments. When installed in single-user environment, all the services associated with the Server are stored on different disk partitions. However, in multi-Server installation, the LDAP and MTA services are installed on separate Servers.<\/p>\n<h2>Mailbox Server Volumes<\/h2>\n<p>There are multiple volumes for mailbox Server:<\/p>\n<ul>\n<li><strong>Message Store<\/strong><\/li>\n<\/ul>\n<p>The mailbox messages are stored at the location <strong>opt\/zimbra\/store.<\/strong><\/p>\n<ul>\n<li><strong>Data Store<\/strong><\/li>\n<\/ul>\n<p>The data store is in the form of SQL database and gets stored in MySQL database files. The storage location of the data store is <strong>opt\/zimbra\/db<\/strong>.<\/p>\n<ul>\n<li><strong>Index Store<\/strong><\/li>\n<\/ul>\n<p>The index files belonging to it\u00a0are stored at the location <strong>opt\/zimbra\/index<\/strong>.<\/p>\n<ul>\n<li><strong>Backup Store<\/strong><\/li>\n<\/ul>\n<p>The Zimbra Server stores its full and incremental backup at the location <strong>opt\/zimbra\/log<\/strong>.<\/p>\n<ul>\n<li><strong>Log Files<\/strong><\/li>\n<\/ul>\n<p>All the components of Zimbra Server have a log file associated with it. They are stored at the location <strong>opt\/zimbra\/log.<\/strong><\/p>\n<p>It is advised to store the log files and the backup files on different locations of the disk in order to minimize the possibility of data loss due to disk failure.<\/p>\n<h2>Default Database Format of Zimbra Server<\/h2>\n<p>The database of Zimbra Server mailbox is stored in <strong>MSG<\/strong> file. As shown in the above section, the default location of the files is <strong>opt\/zimbra\/store.<\/strong> For each mailbox message, a MSG file is created in Zimbra Server. This is similar to Outlook, where for every single message an EML file is created.<\/p>\n<h3>Zimbra Server Email Forensic Analysis via MailXaminer<\/h3>\n<p>Mailxaminer is a professional forensics utility and enables to perform a complete analysis of <strong>Zimbra Server\u00a0MSG files<\/strong> . In order to perform a complete and effectual Zimbra Server forensics, deploying professional application is more beneficial as compared to the manual analysis. One such efficacious tool for performing the analysis on Zimbra Server is MailXaminer.<\/p>\n<p>The users can perform the Zimbra Server database analysis with the help of below mentioned procedure:<\/p>\n<ul>\n<li>Install and run MailXaminer.<\/li>\n<li>Click on <strong>File <\/strong>option and create a <strong>New Case<\/strong><\/li>\n<li>Click on <strong>Scan File <\/strong>option to scan Zimbra database.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-951\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/12\/scan.png\" alt=\"Zimbra Server Forensics\" width=\"1360\" height=\"722\" \/><\/p>\n<ul>\n<li>From the list of files, select <strong>Zimbra Server (*.msg)<\/strong><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-953\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/12\/file.png\" alt=\"file\" width=\"600\" height=\"400\" \/><\/p>\n<ul>\n<li>Select <strong>Browse <\/strong>option for selecting file.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-954\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/12\/browse.png\" alt=\"Zimbra Server Database Analysis\" width=\"600\" height=\"399\" \/><\/p>\n<ul>\n<li>During Zimbra Server forensics, select the Custodian name by selecting <strong>Add New <\/strong>option<strong>.<\/strong><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-956\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/12\/add-file.png\" alt=\"add-file\" width=\"600\" height=\"399\" \/><\/p>\n<ul>\n<li>Enter the name and select <strong>Add<\/strong>\u00a0option.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/12\/click-add.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-957\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/12\/click-add.png\" alt=\"click-add\" width=\"600\" height=\"399\" \/><\/a><\/p>\n<ul>\n<li>Once the custodian name is changed, select <strong>Add\u00a0<\/strong>option.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-958\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/12\/select-custodian.png\" alt=\"select-custodian\" width=\"600\" height=\"400\" \/><\/p>\n<ul>\n<li>The software will show the scanning status of Zimbra Server database analysis.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-959\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/12\/scan-file.png\" alt=\"Zimbra Server Forensics\" width=\"1363\" height=\"723\" \/><\/p>\n<ul>\n<li>Click on <strong>View <\/strong>option to view the complete MSG file forensics.<\/li>\n<li>The complete root structure of the case will be shown in the left pane.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-964\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/12\/mail1.png\" alt=\"mail\" width=\"899\" height=\"516\" \/><\/p>\n<ul>\n<li>All the emails residing in the file will be visible on the left pane.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-967\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/12\/view.png\" alt=\"view\" width=\"900\" height=\"499\" \/><\/p>\n<p><strong>Note:<\/strong> While conducting Zimbra Server forensics the software offers multiple options for scrutinizing Zimbra Server database in an elaborate manner. The user can make use of Bookmark option to mark the last analyzed mail. in addition to this the user can also tag the mails with different names and can also mark the messages as privilege.<\/p>\n<ul>\n<li>Click on <strong>Export <\/strong>option to export the data.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-968\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/12\/export.png\" alt=\"export\" width=\"900\" height=\"499\" \/><\/p>\n<ul>\n<li>Select <strong>PDF <\/strong>option for exporting the emails in PDF format.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-969\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/12\/pdf.png\" alt=\"Zimbra Server Database Analysis\" width=\"782\" height=\"374\" \/><\/p>\n<ul>\n<li>The software offers many features while exporting like <strong>Naming Conventions<\/strong> for naming the output PDF files. Other options are also available for customizing the output PDF files. Select the <strong>Folder <\/strong>that you want to export.<\/li>\n<\/ul>\n<p>Click on <strong>OK <\/strong>to proceed.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-970\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/12\/naming-convention.png\" alt=\"naming-convention\" width=\"780\" height=\"373\" \/><\/p>\n<ul>\n<li>The export process status will be visible.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-971\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/12\/exporting.png\" alt=\"Zimbra Server Forensics\" width=\"800\" height=\"500\" \/><\/p>\n<ul>\n<li>Once the export process is finished, a complete report will be generated.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-972\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/12\/report.png\" alt=\"report\" width=\"670\" height=\"521\" \/><\/p>\n<p>Once the above process is finished, the Zimbra Server files will be exported successfully.<\/p>\n<blockquote><p>\u00a0Forensics Analysisof <strong>Zimbra Server MSG files<\/strong> can be done efficiently with the assistance of MailXaminer. The different features embedded in the software facilitate perfect analysis of the Zimbra Server file.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>To examine the stored messages in MSG File format of Zimbra Server, first, we have to understand the Zimbra Server <a href=\"https:\/\/www.mailxaminer.com\/blog\/zimbra-server-forensic-analysis\/\" >Read More&#8230;<\/a><\/p>\n","protected":false},"author":8,"featured_media":973,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"class_list":["post-949","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-forensics"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zimbra Server Database Forensics \u2013 Analyze MSG File<\/title>\n<meta name=\"description\" content=\"Zimbra Server forensics has been explained by experts. Analyze MSG file to extract evidence from suspect database. Learn in-depth Zimbra Server forensics.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mailxaminer.com\/blog\/zimbra-server-forensic-analysis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zimbra Server Database Forensics \u2013 Analyze MSG File\" \/>\n<meta property=\"og:description\" content=\"Zimbra Server forensics has been explained by experts. Analyze MSG file to extract evidence from suspect database. Learn in-depth Zimbra Server forensics.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mailxaminer.com\/blog\/zimbra-server-forensic-analysis\/\" \/>\n<meta property=\"og:site_name\" content=\"MailXaminer Official Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-09T05:31:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-23T09:20:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/12\/zimbra.png\" \/>\n\t<meta property=\"og:image:width\" content=\"180\" \/>\n\t<meta property=\"og:image:height\" content=\"120\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mansi Joshi\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mansi Joshi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/zimbra-server-forensic-analysis\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/zimbra-server-forensic-analysis\\\/\"},\"author\":{\"name\":\"Mansi Joshi\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#\\\/schema\\\/person\\\/c9207395234d7178f353e02c45490a95\"},\"headline\":\"Zimbra Server Forensics\",\"datePublished\":\"2015-12-09T05:31:51+00:00\",\"dateModified\":\"2025-05-23T09:20:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/zimbra-server-forensic-analysis\\\/\"},\"wordCount\":722,\"image\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/zimbra-server-forensic-analysis\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/zimbra.png\",\"articleSection\":[\"Forensics\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/zimbra-server-forensic-analysis\\\/\",\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/zimbra-server-forensic-analysis\\\/\",\"name\":\"Zimbra Server Database Forensics \u2013 Analyze MSG File\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/zimbra-server-forensic-analysis\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/zimbra-server-forensic-analysis\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/zimbra.png\",\"datePublished\":\"2015-12-09T05:31:51+00:00\",\"dateModified\":\"2025-05-23T09:20:13+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#\\\/schema\\\/person\\\/c9207395234d7178f353e02c45490a95\"},\"description\":\"Zimbra Server forensics has been explained by experts. Analyze MSG file to extract evidence from suspect database. Learn in-depth Zimbra Server forensics.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/zimbra-server-forensic-analysis\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/zimbra-server-forensic-analysis\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/zimbra-server-forensic-analysis\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/zimbra.png\",\"contentUrl\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/zimbra.png\",\"width\":180,\"height\":120},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/zimbra-server-forensic-analysis\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog Home\",\"item\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Forensics\",\"item\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/category\\\/forensics\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Zimbra Server Forensics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/\",\"name\":\"MailXaminer Official Blog\",\"description\":\"Tech Talks by Forensics Experts\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#\\\/schema\\\/person\\\/c9207395234d7178f353e02c45490a95\",\"name\":\"Mansi Joshi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g\",\"caption\":\"Mansi Joshi\"},\"description\":\"Tech enthusiast &amp; cyber expert for the past 5 years. Love to solve complicated scenarios to counter cyber crimes with in-depth technical knowledge.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/mansi-joshi-54414524a\\\/\",\"https:\\\/\\\/www.mailxaminer.com\\\/assets\\\/author\\\/mansi-joshi.png\"],\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/author\\\/mansi-joshi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zimbra Server Database Forensics \u2013 Analyze MSG File","description":"Zimbra Server forensics has been explained by experts. Analyze MSG file to extract evidence from suspect database. Learn in-depth Zimbra Server forensics.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mailxaminer.com\/blog\/zimbra-server-forensic-analysis\/","og_locale":"en_US","og_type":"article","og_title":"Zimbra Server Database Forensics \u2013 Analyze MSG File","og_description":"Zimbra Server forensics has been explained by experts. Analyze MSG file to extract evidence from suspect database. Learn in-depth Zimbra Server forensics.","og_url":"https:\/\/www.mailxaminer.com\/blog\/zimbra-server-forensic-analysis\/","og_site_name":"MailXaminer Official Blog","article_published_time":"2015-12-09T05:31:51+00:00","article_modified_time":"2025-05-23T09:20:13+00:00","og_image":[{"width":180,"height":120,"url":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/12\/zimbra.png","type":"image\/png"}],"author":"Mansi Joshi","twitter_misc":{"Written by":"Mansi Joshi","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mailxaminer.com\/blog\/zimbra-server-forensic-analysis\/#article","isPartOf":{"@id":"https:\/\/www.mailxaminer.com\/blog\/zimbra-server-forensic-analysis\/"},"author":{"name":"Mansi Joshi","@id":"https:\/\/www.mailxaminer.com\/blog\/#\/schema\/person\/c9207395234d7178f353e02c45490a95"},"headline":"Zimbra Server Forensics","datePublished":"2015-12-09T05:31:51+00:00","dateModified":"2025-05-23T09:20:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mailxaminer.com\/blog\/zimbra-server-forensic-analysis\/"},"wordCount":722,"image":{"@id":"https:\/\/www.mailxaminer.com\/blog\/zimbra-server-forensic-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/12\/zimbra.png","articleSection":["Forensics"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mailxaminer.com\/blog\/zimbra-server-forensic-analysis\/","url":"https:\/\/www.mailxaminer.com\/blog\/zimbra-server-forensic-analysis\/","name":"Zimbra Server Database Forensics \u2013 Analyze MSG File","isPartOf":{"@id":"https:\/\/www.mailxaminer.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mailxaminer.com\/blog\/zimbra-server-forensic-analysis\/#primaryimage"},"image":{"@id":"https:\/\/www.mailxaminer.com\/blog\/zimbra-server-forensic-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/12\/zimbra.png","datePublished":"2015-12-09T05:31:51+00:00","dateModified":"2025-05-23T09:20:13+00:00","author":{"@id":"https:\/\/www.mailxaminer.com\/blog\/#\/schema\/person\/c9207395234d7178f353e02c45490a95"},"description":"Zimbra Server forensics has been explained by experts. Analyze MSG file to extract evidence from suspect database. Learn in-depth Zimbra Server forensics.","breadcrumb":{"@id":"https:\/\/www.mailxaminer.com\/blog\/zimbra-server-forensic-analysis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mailxaminer.com\/blog\/zimbra-server-forensic-analysis\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mailxaminer.com\/blog\/zimbra-server-forensic-analysis\/#primaryimage","url":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/12\/zimbra.png","contentUrl":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/12\/zimbra.png","width":180,"height":120},{"@type":"BreadcrumbList","@id":"https:\/\/www.mailxaminer.com\/blog\/zimbra-server-forensic-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog Home","item":"https:\/\/www.mailxaminer.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Forensics","item":"https:\/\/www.mailxaminer.com\/blog\/category\/forensics\/"},{"@type":"ListItem","position":3,"name":"Zimbra Server Forensics"}]},{"@type":"WebSite","@id":"https:\/\/www.mailxaminer.com\/blog\/#website","url":"https:\/\/www.mailxaminer.com\/blog\/","name":"MailXaminer Official Blog","description":"Tech Talks by Forensics Experts","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mailxaminer.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.mailxaminer.com\/blog\/#\/schema\/person\/c9207395234d7178f353e02c45490a95","name":"Mansi Joshi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g","caption":"Mansi Joshi"},"description":"Tech enthusiast &amp; cyber expert for the past 5 years. Love to solve complicated scenarios to counter cyber crimes with in-depth technical knowledge.","sameAs":["https:\/\/www.linkedin.com\/in\/mansi-joshi-54414524a\/","https:\/\/www.mailxaminer.com\/assets\/author\/mansi-joshi.png"],"url":"https:\/\/www.mailxaminer.com\/blog\/author\/mansi-joshi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts\/949","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/comments?post=949"}],"version-history":[{"count":2,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts\/949\/revisions"}],"predecessor-version":[{"id":6422,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts\/949\/revisions\/6422"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/media\/973"}],"wp:attachment":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/media?parent=949"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/categories?post=949"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}