The present invention extends to methods, systems, and computer program
products for securely inspecting electronic messages. A computer system
receives a control message that is passed through one or more receiving
path components, positioned in a message receiving path, to a security
component. The security component authenticates the received control
message and passes the received control message to an inspection control
component. The inspection control component activates message inspection
in accordance with instructions contained in the received control
message. When message inspection is activated, the computer system passes
accessed messages to corresponding inspection components positioned in
message paths (either receiving or sending) of the accessed message. The
inspection component generates an inspection report (e.g., including a
portion of contents of the accessed message) in accordance with
instructions contained in a previously authenticated control message.