Information Services > Security > Security Guidance > How do I
In order to properly investigate cases with spam, phishing, and fraudulent emails, the DePaul University Infomation Security Team requires that email headers be provided when reporting any of the aforementioned issues. These email headers contain critical information in determining the legitimacy of emails and can be extracted from by the user and sent to the security team for further analysis.
At DePaul, we use both IP addresses and MAC address when performing incident response to computer security violations on the university network.
The purpose of this article is to increase the awareness of the university community by promoting a self-service methodology which will aid in your education for future problems.
Learn more about email encryption types. Find out ways to make emails encrypted and more secure. Instructions for using public and private keys.