Browse Definitions :
File Extension

EML File Format

Microsoft Outlook Express mail message (MIME RFC 822)

EML file format icon

EML is a file extension for an e-mail message saved to a file in the MIME RFC 822 standard format by Microsoft Outlook Express as well as some other email programs.  

EML files can contain plain ASCII text for the headers and the main message body as well as hyperlinks and attachments. 

EML files may be exported for the purposes of archiving and storage or scanning for malware.  The Nimda virus is known to create EML files.  When EML files are found as an included attachment it is good practice to scan with anti virus before opening.

MIME type: message/rfc822

 

Learn more about EML files:

See the F-secure Nimda virus description page

Ed Yakabovicz Talks about cleaning the Nimda virus and Identifying EML files at Search Security.

Search for answers to email storage related questions at IT Knowledge Exchange.

This was last updated in July 2010
Browse File Extensions Alphabetically:

Ask a Question. Find an Answer.

Ask your peers a question about this file extension.

Ask a Question

Join the conversation

4 comments

Send me notifications when other members comment.

Please create a username to comment.

University staff keep posting eml files on the staff portal notice board, and they do not open quickly or easily even when saved.
Cancel
Unable to fax out, fax error shows "eML".
Cancel
I keep getting a eml file from window user. He send me photos all the time, but can not get him to understand this is not a file Linux can open.
Cancel
I received an e-mail that contains a letter sent to another person. I want to open on my iPad is this safe ,and how can I open it?
Cancel

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • brute force attack

    Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted ...

  • spyware

    Spyware is software that is installed on a computing device without the user's knowledge. Spyware can be difficult to detect; ...

  • ATM black box attack

    An ATM black box attack, also referred to as jackpotting, is a type of banking-system crime in which the perpetrators bore holes ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

  • disaster recovery (DR) test

    A disaster recovery test (DR test) is the examination of each step in a disaster recovery plan as outlined in an organization's ...

SearchStorage

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close