To handle complaints about email, it is often necessary to obtain detailed information about a particular message. Messages must be forwarded in a particular way for such information to be included. Here is how.
Student Dukes@jmu.edu email (Office 365)
Outlook Web Access (Employee Exchange email read in a browser)
Outlook 2010 or later (Employee Exchange email read in the Outlook Windows client)
Macintosh Mail in Mountain Lion
Outlook for Macintosh 2011
Other email clients
Background information on email headers
The lines preceded by "Received:" are supposed to show the systems through which the message traveled. The last "Received" line should show the IP address of the originating computer. This is useful to find the true sender. An example message is shown below.
The apparent (faked) address seen by the recipient is in green.
The true sending computer's address is in RED. This is the address you want to plug into one of the Internet registry sites to determine what ISP hosts this infected computer.
If the mail system authenticates sending users, there may be a field that contains the true sending email address. There is one in this message in blue.
Received: from heron.jmu.edu (heron2.jmu.edu [18.104.22.168])
by roc.jmu.edu (8.8.8/8.8.8) with ESMTP id IAA07219
for <email@example.com>; Thu, 8 Aug 2002 08:50:32 -0400 (EDT)
Received: from kiwi.jmu.edu (kiwi.jmu.edu [22.214.171.124])
by heron.jmu.edu (Switch-2.1.0/Switch-2.1.0) with ESMTP id g78CoJ508749
for <firstname.lastname@example.org>; Thu, 8 Aug 2002 08:50:19 -0400 (EDT)
Received: from jmu.edu (sslmail.jmu.edu [126.96.36.199])
by kiwi.jmu.edu (8.11.6/8.11.0) with ESMTP id g78Cnep07891
for <JMUeID@jmu.edu>; Thu, 8 Aug 2002 08:49:40 -0400
Date: Thu, 08 Aug 2002 08:52:06 -0400
From: Santa Claus@isp.com
X-Mailer: Mozilla 4.77 [en] (Windows NT 5.0; U)
Subject: Test Message
Content-Type: text/plain; charset=us-ascii
Blah. Blah. Blah. SPAM. SPAM. SPAM. Virus. Virus. Virus.
Note that almost all the information in the headers, and thus all the information normally displayed in the message, can be forged in one way or another.
To locate a computer with a particular IP address, type the IP address into one of the Internet Number registry web pages below. This will typically tell you the Internet Service Provider and often the originating organization. If the address is associated with viruses or spam, an email message drafted to the ISP (typically to abuse@isp) may prompt them to disable the account or to contact the owner of the sending computer and encourage them to R.U.N.S.A.F.E or cease inappropriate behavior. Start with the ARIN registry. It will tell you if the IP address is registered somewhere else and where you need to go.
Many organizations maintain a mailbox for complaints named "abuse". So, for example, if you find the IP address belongs to America Online (AOL), you can send the information to email@example.com. Make sure you include the full headers or they will not be able to determine the actual sender.