Every MSG file opened in Sherlock Forensics PST Viewer receives automatic forensic analysis including SMTP transport chain parsing, email authentication verification, MAPI timestamp comparison, encoding detection and anomaly flagging. No manual configuration required.
SMTP Transport Chain
The viewer parses every Received: header embedded in the MSG file's transport headers into a visual hop-by-hop trail. Each hop displays the sending host, receiving MTA, IP address and protocol used. The chain is presented in chronological order from origin to final delivery. A single-line summary answers the fundamental forensic question: where did this message actually come from.
Authentication Results
SPF, DKIM and DMARC verdicts are extracted from the Authentication-Results header and displayed with plain-English explanations. Examiners see immediately whether the sender domain's authentication passed or failed at each stage. Failed authentication is a primary indicator of spoofing and phishing attempts.
MAPI Timestamps
MSG files contain multiple MAPI timestamp properties: PR_CREATION_TIME (when the message object was created), PR_LAST_MODIFICATION_TIME (last modification), PR_CLIENT_SUBMIT_TIME (when the sender clicked Send) and PR_MESSAGE_DELIVERY_TIME (when the message arrived). Sherlock Forensics PST Viewer displays all four side-by-side so divergences are immediately visible. Timestamp discrepancies can indicate message tampering, timezone manipulation or delayed delivery attacks.
MSG Encoding Detection
MSG files exist in two encoding variants: Unicode (newer Outlook versions) and ANSI (legacy Outlook). The encoding type determines how text properties are stored internally. Sherlock Forensics PST Viewer detects and reports the encoding type automatically. This is critical for evidence involving non-Latin characters where ANSI encoding may produce data loss or character corruption.
Anomaly Flags
The viewer automatically flags conditions that warrant examiner attention:
- Missing sender -- no From address present in the message headers
- Authentication failures -- SPF fail, DKIM fail or DMARC fail results
- X.500 DN senders -- internal Exchange Distinguished Name addresses indicating messages that never left the Exchange organization
- Unverifiable signatures -- S/MIME signed messages where the certificate chain cannot be validated
- Message-ID mismatches -- the domain in the Message-ID header does not match the sender's domain, a common artifact of spoofed or relayed messages
Message Class Translation
MSG files carry a PR_MESSAGE_CLASS property that identifies the message type. Sherlock Forensics PST Viewer translates these MAPI class identifiers into plain language:
- IPM.Note
- Standard email message
- IPM.Schedule.Meeting.Request
- Meeting invitation
- REPORT.IPM.Note.NDR
- Non-delivery report (bounce)
- REPORT.IPM.Note.DR
- Delivery receipt confirmation
- IPM.Note.SMIME.MultipartSigned
- S/MIME digitally signed message
- IPM.Note.Rules.OofTemplate.Microsoft
- Out-of-office auto-reply
This translation is essential for examiners who encounter MSG files from Exchange environments where automated messages, meeting requests and delivery reports are intermixed with standard correspondence.