Product Navigation

Study On Windows Live Mail Header Analysis


Windows Live mail is one of the most common desktop based email client application with multiple active accounts. It helps to manage one or more email suites, calendars, and contacts. Its usage become increases and also popularity makes it more vulnerable to cyber criminals performing their illegitimate activities to commit several illegal acts. It allows to support POP3 and IMAP as incoming server and SMTP as Outgoing server.

During Windows Live Mail Header Analysis Forensics, first step is to analyze and to restore EML file has to open it within text editor. To illustrate the header detail of email message including To, From, Subject, Received and many more parameters. Also, an investigator can examine the common email message along with HTML tags which comes in second segment.

Need of Windows Live Mail Email header


When a user tries to send a message through an email client, the server begins to add a special filed that is defined as email header. The email header detail contains the basic send/ receive information about the email message. It holds a complete information about the route of email and including other hidden contact information. Thus, when an email is received in Windows Live Mail one can easily read Windows Live Mail Header to extract relevant information from the message.

How to View Windows Live Mail Email Header


To view and open all email message header in Windows Live mail then, follow these below steps such as:

  • On Webpage, a user has to Login on Windows Live Mail account
  • Open the Message Tab whose header needs to be viewed
  • Now, choose "View Message Source" option from the context menu

Analyze of Windows Live Mail Email Header

Instantly, the process helps to open the email message header for the particular email. The user can read entire contents details and extract the related information.

Forensics Analyze of Windows Live Mail Email Header


Despite of an instant messengers and Social networking sites; emails are still having a major carrier of information, used through corporate environments for professional as well as business communication purposes.

The capability of a user to examine and analyze the header of email messages. These header helps to identify any type of manipulation in the database.

When to open the header information for an email, then, the WLM displays the information as:

Examine Windows Live Mail Email Header

Received: The email header receives the message from sender, who has to deliver the particular message.

As per forensic point of view, in WLM the received message has been represented as multiple times. Investigators might study about these parameters are viewed in WLM. It will show the transaction path from email message that has been traversed.

Investigate Windows Live Mail Email Header

From: The field of email header represents the name and email address of sender, who has been delivered the message.

Forensically, the email address of the sender will be helpful for future reference. However, multiple cyber crooks attempt to manipulate the filed using email formation approach. Hence, this field is less reliable for critical analysis of an email.

Message-ID: Globally, the identification of message is created uniquely when it is sent/delivered through an individual.

Windows Live Mail header is designed in unique manner. However, doesn't matter first part can be anything but in second the name of machine assigned the particular ID.

Content type: It will help to understand the style of email message which is shown in the application. Multiple types of content denotes the structure of email messages.

As per Forensic investigator, Windows Live Mail is a free Web-based email application to display the type of content. Thus, it can consider a content Type through email header finding the way in which message should be viewed.

Return-Path: The field of WLM return path header shows the email address where the message notifications should be sent while to deliver the message.

The main purpose of this header to configure the detail through a user itself with the email client and even it may or may not be fully reliable. Forensically, it is necessary to investigate all possible information as it might be helpful to identify the hidden evidence in a simple way.

X-Message-Status: This field helps to see or view the current status or update of the email message.

Forensically, to verify and analyze the status of the email messages. At the end of this field, the accurate status is also up-to-date with time.

X-Message-Delivery: This field assists in receiving the delivery detail of the email message.

Major reason of this header to analyze the delivery information of the email message. It will helpful for users to carry the knowledge of messages.

Content-Transfer-Encoding: During an email message is sent over the network, an encryption is enabled for maintaining the authentication of email. So, content transfer encoding header field specifies the type of encryption which is performed on particular content.

Generally, Windows Live Mail header messages come with 8-bit encryption which is applied on them.

Date: This field holds the date and time when the email message is available for delivery.

As per forensic point of view, this header deals to specify a date during the message was composed and sent. In case, if this header is eliminated through sender's Desktop, it can be added through a mail server or even by some other machine.

X Original Arrival Time: This field helps to inform the original arrival time when a receiver has to receive a specifies message.

In WLM, this message header might reveal the information over Provider ISP forensically.

Authentication Result: This field, tells the authenticated result or output to the receiver at the time of delivered message.

Forensically, in WLM the responsibility of SPF (Server Policy Framework) to check and confirm if the particular Mail Server is authorized for sending email messages to that particular domain. The possible result will show such as 'PASS', 'FAIL' or 'NONE'. However, in WLM the result will become in 'NONE'

X-SID-PRA & X-AUTH-Result: When this type of field comes in Windows Live mail, in that case, entire mail are switched to a spam folder. Might be the result will become in Fail while receiving this two headers.

X-Message-Info: This field helps to investigate the associated value of all the factors and to receive the information of email message.

DKIM-Signature(Domain Keys Identified Mail): In this field, the signature of an email is saved into DKIM signature header. In Windows Live mail, it is a technique to identify the accuracy of any email message to detect email spoofing and spamming.

Forensically, in WLM DKIM signature uses a simple “tag=NONE”, includes the messages and records of domain signature. If an email is sent through an organization along with DKIM signature that is assigned on the mail, it signifies that the message is not saved in SPAM and the signing authority that is directly responsible for it.

windows live mail header analysis

MIME-Version: This MIME version helps to show that the MIME format of email supported by Windows Live Mail.

It signifies, in Windows Live Mail message always contain MIME 1.0 as MIME Version. MIME allows displaying a registration policy which uses Internet Assigned Numbers Authority as a registry for all associated standard and values.

Conclusion


Analyze of Windows Live Mail Email Header has been a crucial parameter during investigate should be studied forensically. It can prove to be a major turning point while providing the evidences. It is also permit to Search any details in Hotmail mail by Email Search Software. In this section, we have covered Windows Live Mail Header analysis and its parameters to make the users understand the significance of email header.