Guide to Computer Forensics and Investigations43 Examining Microsoft E-mail Server Logs (continued)