# Investigate Phishing

- [Why fighting phishing is important?](/lexicanum/forensics/investigate-phishing/why-fighting-phishing-is-important.md)
- [Why is blocking the sender not enough?](/lexicanum/forensics/investigate-phishing/why-is-blocking-the-sender-not-enough.md)
- [Process Overview](/lexicanum/forensics/investigate-phishing/process-overview.md)
- [Prerequisites](/lexicanum/forensics/investigate-phishing/prerequisites.md)
- [Analysis of the email code](/lexicanum/forensics/investigate-phishing/prerequisites/analysis-of-the-email-code.md)
- [What to do now that we know the email is malicious?](/lexicanum/forensics/investigate-phishing/what-to-do-now-that-we-know-the-email-is-malicious.md)
- [Feedback](/lexicanum/forensics/investigate-phishing/feedback.md)
- [Tools](/lexicanum/forensics/investigate-phishing/tools.md)
- [Report the email to the authorities](/lexicanum/forensics/investigate-phishing/report-the-email-to-the-authorities.md)
- [Go further](/lexicanum/forensics/investigate-phishing/go-further.md)
