Forensic Email Collector

Forensic Email Collector

Expertly preserve email evidence without breaking a sweat. Get plug & play output for digital forensic investigations and eDiscovery.

Learn MorePurchase Now for $399

Powerful & Intuitive

Forensic Email Collector is a powerful tool—it can forensically acquire emails from Exchange Servers, Office 365, Gmail, G Suite and virtually any IMAP server with many output options and detailed logs. It is also remarkably intuitive. You can get started in just a few minutes and preserve emails and document your efforts with a few clicks.

This small Gmail collection takes place in under a minute—complete with logs, hashing, and simultaneous output in EML, MSG and PST formats. That’s faster than the time it takes to launch some software!

Forensic collection of Gmail mailbox via Forensic Email Collector

Flexible Connectivity

Forensic Email Collector can connect to most popular email servers and cloud email providers. You are not stuck with IMAP or POP for forensic email preservation.

office 365 exchange

Office 365 & Exchange via EWS

FEC can connect to Exchange servers—including Office 365—via Exchange Web Services. You can preserve emails faster and more accurately, and without having to configure the target Exchange server for IMAP access.

Gmail & G Suite via REST API

FEC authenticates with Gmail and G Suite using OAuth and forensically acquires mailboxes at eye-watering speeds via Gmail API. Say goodbye to downloading the same message multiple times because of overlapping labels.

imap forensic collection


FEC connects to IMAP servers in a read-only manner and preserves email evidence without modifying the target mailbox., Hotmail, Yahoo Mail, Zoho, iCloud and AOL Mail are just a few supported providers.

Exchange, Office 365, Exchange Web Services, EWS, Gmail and G Suite are trademarks or registered trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

Mailbox Snapshots

Mailbox Snapshots

As soon as you start an acquisition, Forensic Email Collector captures snapshots of each mail folder. The snapshots are used to keep track of which mail folders and messages have been downloaded.

If you run into a network error or if the server throws a fit—free email providers are notorious for throttling large scale downloads—FEC automatically retries remaining messages as many times as you want, calculating an optimal delay amount between each retry session.

Mailbox snapshots are persisted in a database. So, you can even stop the acquisition and resume it later by loading a past project.

Search Console

We all run into cases where collecting a mailbox as a whole is not an option—often due to privacy or timeframe concerns. On the other hand, eDiscovery and digital forensics workflows often involve a full collection, followed by post-acquisition searches.

Forensic Email Collector solves this problem in a creative way by allowing examiners to search mailboxes on the server side prior to the acquisition and download only the search results. No need to create labels, tag documents, or make any changes to the target mailbox.

See Search Console in Action

FEC Search Console
Remote authentication

Remote Authentication

Custodians are often apprehensive about giving their email passwords to a third-party for forensic preservation. Wouldn’t you be? Your Gmail password would let somebody access other Google services associated with your account such as Google Drive, Google Photos, and Google Hangouts.

When a custodian has two-factor authentication enabled, you would need access to information sent to a secondary device in addition to the password. Conference calls among examiners, custodians and their attorneys often ensue to coordinate the login.

Using FEC Remote Authenticator, custodians can authenticate FEC with their Gmail accounts from their own computer. They can clearly see what data FEC has access to, and can revoke that access once the acquisition is complete. No need to share any passwords.

Features at a Glance

Gmail API & EWS Support

Works with Gmail via REST API and Exchange servers via EWS for efficient and high-fidelity data acquisition.

Resume Past Projects

Did an acquisition get interrupted? No problem; we can resume a past project when you are ready.

Detailed Reports

Detailed acquisition and exception reports so that you can record and document exactly what happened, when and why.

Automatic Retries

FEC can automatically retry acquisition as many times as you want. You don’t have to go back to square one because of a pesky server or due to network issues.

OAuth Support for Gmail

You can connect to Gmail using OAuth 2.0 instead of using credentials. No need to enable “access for less secure apps”.

Flexible Output Options

FEC can output to EML, MSG or PST format. You can export to all three simultaneously—complete with MD5, SHA1 or SHA256 hashing of the output.

You Are in Good Company

Many great organizations from law enforcement agencies to corporations, legal service providers, and top law firms trust Forensic Email Collector to forensically preserve emails.

It’s in The Details

We have added a few features to FEC to make sure it is a joy to use.

Exchange Autodiscover

When preserving email evidence from an Exchange server, you may not immediately know the Exchange Web Services (EWS) endpoint URL. FEC utilizes the Exchange Autodiscover service to automatically configure itself using the target email address and password.

Built-in Connection Profiles

FEC includes built-in connection profiles—including host name, protocol, port and SSL settings—for hundreds of popular domain names used by email service providers such as Gmail, Yahoo, and iCloud. If the target email address matches one of the profiles, server settings are populated automatically for you.

MX Lookup

As soon as you type the target email address, FEC checks the domain name to see if it fits one of the pre-configured profiles such as Gmail,, Yahoo, etc. If it does not, it looks up the mail exchanger records (MX records) to determine the mail servers handling email messaging for the target user’s domain.

Full IMAP Audit Trail

When you use the IMAP protocol, FEC keeps a detailed log of IMAP communications with the server in addition to its standard acquisition and exception logs. You can do a play-by-play of what FEC asked the server and how the server responded if that’s your thing.

Buy now and change the way
you preserve email evidence.

As soon as we receive your order, we will email you an electronic download link and your license key.