DownloadWindows

Microsoft Outlook Forensic Analysis Tool

Outlook Forensic Toolbox

Outlook Forensic Toolbox helps restore e-mails, appointments, attachments, contacts, tasks, notes, calendars, journals and other from damaged PST or OST files from Microsoft Outlook

4.8 (5)
Rating
(4)
(1)
(0)
(0)
(0)
Updated: 2024-10-15

Outlook Forensic Toolbox is designed to reveal hidden and deleted information from Microsoft Outlook data files (files with PST and OST extensions). The tool performs forensic analysis of Microsoft Outlook data stores, in which all objects are saved: letters, contacts, reminders, files, attachments, and more.

Outlook Forensic Toolbox retrieves deleted and hidden data that is not exposed under normal viewing of PST / OST files in Microsoft Outlook.

An array of hidden information:

  • whole letters
  • contacts
  • attached files
  • meetings
  • reminders
  • tasks
  • notes
  • calendar
  • magazines

Or partly restored objects or service information from objects as well:

  • service headers of letters
  • text fragments
  • parts of files
  • parts, fragments, or blocks of letters
  • nested objects

The principle of the program is to search for blocks with data that are not provided in Microsoft Outlook. Such hidden blocks with user data can appear when running Microsoft Outlook when optimizing data storage or after user data.

For example, the user received an unwanted email or the content of the message is confidential and must be removed. In this scenario, the Microsoft Outlook user presses the Delete button, and the email stops in the mail program. When the Delete button is destroyed, Outlook deletes the letter / contact / journal or other objects from the object list. But blocks with deleted message data remain in Microsoft Outlook storage (in PST / OST files). Outlook Forensic Toolbox finds such data blocks, analyzes their content, and, using complex forensic analysis algorithms, recreates the object in whole or in part.

Requirements:

  • Windows 98/Me/2000/XP/Vista/7/8/10/11 or Windows Server 2003/2008/2012/2016 and above
Notes:

In some cases, it is not possible to completely recreate the object, since all 100% of the blocks with information about the object are not always enough for any reason (overwritten in the file with other data, the link to the nested object is lost, etc.). In case of incomplete recovery of a deleted object, separate files are saved with what was identified and reconstructed.

Screenshots:

forensic analysis of ms outlook data stores

Selecting *.pst file for recovery

forensic analysis tool

Preview of recovered data

restore e-mails from damaged pst file

Selecting a path to save the recovered data

restore contacts from damaged ost file

Selecting the type of saving the recovered data

revealing hidden and deleted info from pst

Recovery results

How it Works:

1

Download software from website. Download

2

Start Install software:

  • Press on downloaded installation file in browser
  • Select a downloaded installation file in Windows Explorer and press Enter or double click on it.
3

Run installation wizard:

4

Run program:

  • Double click on icon on desktop:
  • or
  • Select from main menu: Start | Programs | Outlook Forensic Toolbox | Outlook Forensic Toolbox
5

Select the corrupted *.pst file:

Select the corrupted file from your Microsoft Mail profile or from disk:

6

Click Next:

7

Confirm the start of recovery:

8

Review and select the recovered objects to save:

9

Click Next:

10

Select a folder for saving:

11

Click Next:

12

Select the type of saving:

13

Recovery results:

Online help:

To identify deleted or hidden data from files with PST or OST extensions, which store Microsoft Outlook data, you need to use the Outlook Forensic Toolbox tool (Download). Outlook Forensic Toolbox is designed as a simple step-by-step guide.

Detailed description of each step:

Step 1. Selecting a source file for forensic analysis

The source file for forensic analysis can be selected in one of 2 ways:

  1. Press the button and select the PST / OST file on disk in Explorer / Windows Explorer. By default, the program offers to analyze the main PST file of the main profile.
  2. Press the button to search for all available data files on the local or network drive.

Step 2. Forensic analysis of the file

After selecting a file for analysis, you just need to click the Next button and the process of forensic analysis of the file will start automatically. This process can take a long time, depending on the size of the source file and the performance of your computer. Upon completion of the file analysis, all hidden and deleted objects will be displayed on the preview page as a tree of objects and a list of objects from each folder:

Forensic analysis of the file
Selecting a folder to save data

Step 3. Selecting a folder to save data

To save the recovered hidden data, the user needs to choose the folder to save on the local device:

Step 4. Saving data

The data will be saved to a PST file so that it will be convenient to open the file in Microsoft Outlook later.

Step 5. Opening the recovered data in Microsoft Outlook

To open a PST file in Microsoft Outlook, you need:

  1. Select File from the menu
  2. Select Open and Export
  3. Select Open Outlook Data File
  4. In Windows Explorer open the saved .PST file with recovered hidden objects
Opening the recovered data in Microsoft Outlook

Buying Outlook Forensic Toolbox:

PayPro Global

Business License

for legal use in enterprise, commercial and governmental environments

Site License

for using on several computers of the customer (up to 100 electronic devices) in one building or distributed between several buildings

  • An email with a registration code and instructions for activating this code will be sent to the user immediately after the payment confirmation.
  • An email with a registration code will be sent from several different mail servers to prevent messages from appearing in SPAM filters. Accordingly, a possible duplication of registration letters received in the user's mailbox.
  • To activate the registration code, you need to run the application in Windows under a user with Administrator rights.
  • The number of Personal, Business or Site licenses activated simultaneously must not exceed the number of purchased licenses.
  • We sell software via registration services PayPro Global and Allsoft. That is why not Recovery Toolbox, but the corresponding company will be specified in the payment documents.

The purchased registration key is valid for all 5.x versions of Outlook Forensic Toolbox.

Buying the License Renewal

PayPro Global

Business License - 1 Year prolongation

for legal use in enterprise, commercial and governmental environments

Site License - 1 Year prolongation

for using on several computers of the customer (up to 100 electronic devices) in one building or distributed between several buildings

Payment Services:

PayPro Global

PayPro Global (PayPro Global, Inc., 250 The East Mall street, Etobicoke, ON Canada, M9B 0A9) is the fastest growing eCommerce company that develops customized solutions to help software producers to easily and effectively sell software online. PayPro Global supports more than one hundred currencies, all major credit cards, and a wide variety of payment options. PayPro Global offers efficient customer support 24/7 and provides personal attention to customers having special requirements.

Allsoft

Thed Allsoft online store for licensed software opened in 2004. Allsoft offers customers over 15,000 programs from 3,000 developers, provides fast delivery (electronic and physical), accepts 20 payment methods, and includes a cumulative discount system. Allsoft specialists provide customers with all the necessary advice for purchasing licensed software. Selling software is our profession!

Customer's reviews and ratings:

mohammad shabana 10-03-2024

good software i like it

V Raja 08-19-2024

Nice neat and Hand recovery tool

Mohad 05-26-2024

It is verry good

Kohinoor 05-08-2024

Good App

AlGood 03-15-2024

This program found a lot of hidden in PST file. Many pieces of data and requires additional analysis.