SlideShare a Scribd company logo
1 of 37
Forensically Sound Incident Response
in Microsoft’s Office 365
DEVON ACKERMAN | SANS DFIR SUMMIT 2018
Limitations and Drawbacks
• Logouts
• Messages
• SearchTerms
• Attachments
• Length of Session
Audit log search isn’t turned on. To turn it on, click “Start
recording user and admin activities” at the top of the
page.
Start recording user and admin activities
1.
Establish a
Global
Admin
account
2. Identify
at risk
email
accounts
3. Export
the log
4.
Analysis
of the
UAL
•O365 Security & Compliance
•https://protection.office.com
•O365 Admin Center
•https://portal.office.com/adminportal
•Windows Azure
•https://manage.windowsazure.com
•Windows PowerShell
•Pshell for O365 by Nathan Mitchell
Responding
1.
Establish
a Global
Admin
account
2.
Identify
at risk
email
accounts
3. Export
the log
4.
Analysis
of the
UAL
Responding
1. Establish
a Global
Admin
account
2. Identify
at risk
email
accounts
3. Export
the log
4.
Analysis
of the
UAL
Microsoft Humor…
• Microsoft’s browsers work best –
Edge or IE11
• Certain fields will not populate or
drop-down correctly in Firefox and
Chrome
• The eDiscovery PST export tool
requires Internet Explorer
• Azure AD
Get-Mailbox -ResultSize Unlimited -Filter
{RecipientTypeDetails -eq "UserMailbox"} |
Set-Mailbox -AuditEnabled $true -AuditOwner
“Update,
Move,
MoveToDeletedItems,
SoftDelete,
HardDelete,
Create,
MailboxLogin”
Responding
1.
Establish a
Global
Admin
account
2. Identify
at risk
email
accounts
3. Export
the log
4.
Analysis
of the
UAL
Audit Data Example
• UserLoggedIn
• PasswordLogonInitialAuthUsingPassword
• ForeignRealmIndexLogonInitialAuthUsingADFSFederatedToken
• PasswordLogonInitialAuthUsingADFSFederatedToken
• ForeignRealmIndexLogonCookieCopyUsingDAToken
• PasswordLogonCookieCopyUsingDAToken
{"CreationTime":"2018-01-19T16:11:25","Id":"f8fast70-2bbe-456f-8sea-
7513rfasf2541","Operation":"UserLoggedIn","OrganizationId":"b3bas52-8487-484f-8a41-
45a6f1a235","RecordType":15,"ResultStatus":"Succeeded","UserKey":“123451BEEF125@A
boutDFIR.com","UserType":0,"Version":1,"Workload":"AzureActiveDirectory","ClientIP":“1
5.16.17.181","ObjectId":"Unknown","UserId":“devon.ackerman@AboutDFIR.com","AzureA
ctiveDirectoryEventType":1,"ExtendedProperties":[{"Name":"UserAgent","Value":"
Microsoft Office/15.0 (Windows NT 6.1; Microsoft Outlook 15.0.4737; Pro)"},
{"Name":"UserAuthenticationMethod","Value":"1"},{"Name":"RequestType","Value":"OrgI
dWsTrust2:process"},{"Name":"ResultStatusDetail","Value":"Success"}],"Actor":[{"ID":"4d4
6d3bd-95b3-4cad-bcda-88cddfdc2c52","Type":0},
{"ID":"devon.ackerman@AboutDFIR.com","Type":5},{"ID":“1245ASGSAF312351","Type":3}]
,"ActorContextId":“fasd631-1240-4125c-9125a-b32515asg31",
"ActorIpAddress":"15.16.17.181","InterSystemsId":"4dsF1-g12wb-512a-8sd-
0a8asdzxg324","IntraSystemId":“adfas32-6afsd-4adf1-b562-
f336135a14110","Target":[{"ID":"Unknown","Type":0}],"TargetContextId":“fast12b-124f-
490c-9a15-b60621e1617y","ApplicationId":“f13241-2412-4422-san-sr0ck$1rs38"}
{"CreationTime":"2018-01-19T16:11:25","Id":"f8fast70-2bbe-456f-8sea-
7513rfasf2541","Operation":"UserLoggedIn","OrganizationId":"b3bas52-8487-484f-8a41-
45a6f1a235","RecordType":15,"ResultStatus":"Succeeded","UserKey":“123451BEEF125@A
boutDFIR.com","UserType":0,"Version":1,"Workload":"AzureActiveDirectory","ClientIP":“1
5.16.17.181","ObjectId":"Unknown","UserId":“devon.ackerman@AboutDFIR.com","AzureA
ctiveDirectoryEventType":1,"ExtendedProperties":[{"Name":"UserAgent","Value":"
Microsoft Office/15.0 (Windows NT 6.1; Microsoft Outlook 15.0.4737; Pro)"},
{"Name":"UserAuthenticationMethod","Value":"1"},{"Name":"RequestType","Value":"OrgI
dWsTrust2:process"},{"Name":"ResultStatusDetail","Value":"Success"}],"Actor":[{"ID":"4d4
6d3bd-95b3-4cad-bcda-88cddfdc2c52","Type":0},
{"ID":"devon.ackerman@AboutDFIR.com","Type":5},{"ID":“1245ASGSAF312351","Type":3}]
,"ActorContextId":“fasd631-1240-4125c-9125a-b32515asg31",
"ActorIpAddress":"15.16.17.181","InterSystemsId":"4dsF1-g12wb-512a-8sd-
0a8asdzxg324","IntraSystemId":“adfas32-6afsd-4adf1-b562-
f336135a14110","Target":[{"ID":"Unknown","Type":0}],"TargetContextId":“fast12b-124f-
490c-9a15-b60621e1617y","ApplicationId":“f13241-2412-4422-san-sr0ck$1rs38"}
Add-MailboxPermission
Add-RecipientPermission
Set-Mailbox
The end goal of UAL analysis is to
identify if unauthorized access did
occur, when, and what else the
actor did while in the account
Groupings to be aware of
Mail rule creation
Geolocation of IP addresses
IPs that are part of netblocks
User Agent Strings
Baselining User Activity
Client=Microsoft.Exchange.Mapi; Microsoft
Office/16.0 (Windows NT 6.1; Microsoft Outlook
16.0.8201; Pro)
Client=POP3/IMAP4;Protocol=IMAP4
Client=Microsoft.Exchange.ActiveSync; Apple-
iPhone8C1/1302.143
New-InboxRule
Set-InboxRule
Set-Mailbox
Diving Deeper
• Search-UnifiedAuditLog -IPAddresses "123.123.123.123" -StartDate
MM/DD/YYYY -EndDate MM/DD/YYYY | Export-csv "C:ipaddress.csv“
• Search-UnifiedAuditLog -IPAddresses IPaddress1,IPaddress2 -StartDate
MM/DD/YYYY -EndDate MM/DD/YYYY | Export-csv "C:ipaddress.csv"
Beyond the UAL
Sufficient licensing
level of O365
tenant is required
MICROSOFT’S AZURE ACTIVE DIRECTORY
Wrapping Up:
Bonus Round
• get-mailbox -id devon@AboutDFIR.com | select whenCreated
• get-mailboxstatistics -id devon@AboutDFIR.com
• get-mailbox devon@AboutDFIR.com | fl name,*audit*
• “Search & investigation” > “Content search”
• GlobalAdmin account > eDiscovery Admin role to preview
and download results of searches.
Hello Frank,
Per our prior conversation, please let me know what you
think about it.
YoursTruley,
Julie
Attachment: companyllp.doc
Julie,
Is this legitimate?
Thank you,
Frank
Frank,
Yes it is
Frank,
Yes it is, I sent it.
Email Analysis
• Phishing email w/an attachment
• forensics revealed that the user had opened the phishing email
• clicked the link
• accessed the web page
• had submitted their credentials
• after the webpage returned an error, the user then returned to the
phishing email and sent back the following in a Reply:
“Send me something that I can
open and not something that
makes me feel uncomfortable.”
Domain Auto Forwarding Blocks
PowerShell commands for domain-specific auto forwarding block
• New-RemoteDomain -Name ExternalDomain -DomainName
notAboutDFIR.com
• Set-RemoteDomain -Identity ExternalDomain -AutoForwardEnabled:$FALSE
The change can be verified with the PowerShell command
• Get-RemoteDomain ExternalDomain | fl domainname,autoforwardenabled
• Another option can be found in the Office365 portal under: AdminSecurity
and Compliancesecure ScoreEnable Client Forwarding Rules Block.
“For every security mechanism devised,
there is someone who will subvert or defeat it.”
@AboutDFIR
linkedin.com/in/devonackerman
devon.ackerman@kroll.com

More Related Content

What's hot

Hacking liferay
Hacking liferayHacking liferay
Hacking liferay
Armel Nene
 
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
Marco Balduzzi
 

What's hot (20)

Advanced API Security
Advanced API SecurityAdvanced API Security
Advanced API Security
 
Office 365 incident Response: BSides Vancouver 2018
Office 365 incident Response: BSides Vancouver 2018Office 365 incident Response: BSides Vancouver 2018
Office 365 incident Response: BSides Vancouver 2018
 
Security Exploit of Business Logic Flaws, Business Logic Attacks
Security Exploit of Business Logic Flaws, Business Logic AttacksSecurity Exploit of Business Logic Flaws, Business Logic Attacks
Security Exploit of Business Logic Flaws, Business Logic Attacks
 
Live Hacking like a MVH – A walkthrough on methodology and strategies to win big
Live Hacking like a MVH – A walkthrough on methodology and strategies to win bigLive Hacking like a MVH – A walkthrough on methodology and strategies to win big
Live Hacking like a MVH – A walkthrough on methodology and strategies to win big
 
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
 
Hacking liferay
Hacking liferayHacking liferay
Hacking liferay
 
A story of the passive aggressive sysadmin of AEM
A story of the passive aggressive sysadmin of AEMA story of the passive aggressive sysadmin of AEM
A story of the passive aggressive sysadmin of AEM
 
OWASP Top 10 Proactive Controls
OWASP Top 10 Proactive ControlsOWASP Top 10 Proactive Controls
OWASP Top 10 Proactive Controls
 
Attacking thru HTTP Host header
Attacking thru HTTP Host headerAttacking thru HTTP Host header
Attacking thru HTTP Host header
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
 
Practical API Security - PyCon 2018
Practical API Security - PyCon 2018Practical API Security - PyCon 2018
Practical API Security - PyCon 2018
 
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ BehaviourWAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
 
Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty Hunter Methodology - Nullcon 2016Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty Hunter Methodology - Nullcon 2016
 
CNIT 129S: 13: Attacking Users: Other Techniques (Part 2 of 2)
CNIT 129S: 13: Attacking Users: Other Techniques (Part 2 of 2)CNIT 129S: 13: Attacking Users: Other Techniques (Part 2 of 2)
CNIT 129S: 13: Attacking Users: Other Techniques (Part 2 of 2)
 
The top 10 windows logs event id's used v1.0
The top 10 windows logs event id's used v1.0The top 10 windows logs event id's used v1.0
The top 10 windows logs event id's used v1.0
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Windows logging cheat sheet
Windows logging cheat sheetWindows logging cheat sheet
Windows logging cheat sheet
 
Offzone | Another waf bypass
Offzone | Another waf bypassOffzone | Another waf bypass
Offzone | Another waf bypass
 
OWASP Top Ten 2017
OWASP Top Ten 2017OWASP Top Ten 2017
OWASP Top Ten 2017
 
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
 

Similar to Forensically Sound Incident Response in Office 365 - SANS DFIR Summit 2018

Better together: Enterprise Vault.cloud and Microsoft Office 365
Better together: Enterprise Vault.cloud and Microsoft Office 365Better together: Enterprise Vault.cloud and Microsoft Office 365
Better together: Enterprise Vault.cloud and Microsoft Office 365
proutley
 

Similar to Forensically Sound Incident Response in Office 365 - SANS DFIR Summit 2018 (20)

Office 365 - Attacks and References.pptx
Office 365 - Attacks and References.pptxOffice 365 - Attacks and References.pptx
Office 365 - Attacks and References.pptx
 
Symantec Enterprise Vault.cloud for Microsoft Office 365 Better together [EN]
Symantec Enterprise Vault.cloud for Microsoft Office 365 Better together [EN]Symantec Enterprise Vault.cloud for Microsoft Office 365 Better together [EN]
Symantec Enterprise Vault.cloud for Microsoft Office 365 Better together [EN]
 
Better together: Enterprise Vault.cloud and Microsoft Office 365
Better together: Enterprise Vault.cloud and Microsoft Office 365Better together: Enterprise Vault.cloud and Microsoft Office 365
Better together: Enterprise Vault.cloud and Microsoft Office 365
 
Automating Attacks Against Office365 - BsidesPDX 2016
Automating Attacks Against Office365 - BsidesPDX 2016Automating Attacks Against Office365 - BsidesPDX 2016
Automating Attacks Against Office365 - BsidesPDX 2016
 
Governance in the Modern Workplace: SharePoint, OneDrive, Groups, Teams, Flow...
Governance in the Modern Workplace: SharePoint, OneDrive, Groups, Teams, Flow...Governance in the Modern Workplace: SharePoint, OneDrive, Groups, Teams, Flow...
Governance in the Modern Workplace: SharePoint, OneDrive, Groups, Teams, Flow...
 
Governance in the Modern Workplace: SharePoint, OneDrive, Groups, Teams, Flow...
Governance in the Modern Workplace: SharePoint, OneDrive, Groups, Teams, Flow...Governance in the Modern Workplace: SharePoint, OneDrive, Groups, Teams, Flow...
Governance in the Modern Workplace: SharePoint, OneDrive, Groups, Teams, Flow...
 
Phishing Intelligence Engine - BlueHat v17
Phishing Intelligence Engine - BlueHat v17Phishing Intelligence Engine - BlueHat v17
Phishing Intelligence Engine - BlueHat v17
 
eDiscovery and Microsoft Teams
eDiscovery and Microsoft TeamseDiscovery and Microsoft Teams
eDiscovery and Microsoft Teams
 
July 2021 Microsoft 365 Need to Know Webinar
July 2021 Microsoft 365 Need to Know WebinarJuly 2021 Microsoft 365 Need to Know Webinar
July 2021 Microsoft 365 Need to Know Webinar
 
Green Code Lab Challenge 2015 Subject Details
Green Code Lab Challenge 2015 Subject DetailsGreen Code Lab Challenge 2015 Subject Details
Green Code Lab Challenge 2015 Subject Details
 
Wrong slides! Please check description for correct deck
Wrong slides! Please check description for correct deck Wrong slides! Please check description for correct deck
Wrong slides! Please check description for correct deck
 
Making auditing great again! Office 365
Making auditing great again! Office 365Making auditing great again! Office 365
Making auditing great again! Office 365
 
Office 365 Disruption - Metalogix Roadshow - 20th October 2016
Office 365 Disruption - Metalogix Roadshow - 20th October 2016Office 365 Disruption - Metalogix Roadshow - 20th October 2016
Office 365 Disruption - Metalogix Roadshow - 20th October 2016
 
Office 365 Incident Response 2019 B-Sides Orlando
Office 365 Incident Response 2019 B-Sides OrlandoOffice 365 Incident Response 2019 B-Sides Orlando
Office 365 Incident Response 2019 B-Sides Orlando
 
BSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysBSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad Guys
 
OpenIDM - Flexible Provisioning Platform - April 28 Webinar
OpenIDM - Flexible Provisioning Platform - April 28 WebinarOpenIDM - Flexible Provisioning Platform - April 28 Webinar
OpenIDM - Flexible Provisioning Platform - April 28 Webinar
 
Overview of SharePoint Server 2016 and Office 365 Hybrid Scenarios
Overview of SharePoint Server 2016 and Office 365 Hybrid ScenariosOverview of SharePoint Server 2016 and Office 365 Hybrid Scenarios
Overview of SharePoint Server 2016 and Office 365 Hybrid Scenarios
 
October 2021 Microsoft 365 Need to Know Webinar
October 2021 Microsoft 365 Need to Know WebinarOctober 2021 Microsoft 365 Need to Know Webinar
October 2021 Microsoft 365 Need to Know Webinar
 
Reducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachReducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security Breach
 
SPSVienna Office 365 Tenant to Tenant Migration - a complete Survial Guide
SPSVienna Office 365 Tenant to Tenant Migration - a complete Survial GuideSPSVienna Office 365 Tenant to Tenant Migration - a complete Survial Guide
SPSVienna Office 365 Tenant to Tenant Migration - a complete Survial Guide
 

Recently uploaded

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Forensically Sound Incident Response in Office 365 - SANS DFIR Summit 2018

Editor's Notes

  1. As of October 2017 the calendar that will display to the incident responder (to select history of data to export) will indicate presence of log data on each day by color coding. A grey date is not selectable and will not contain data A black date is selectable and contains data By default, the UAL maintains data for 90 days Experience and research has observed as few as 30 days and up to 120 days are possibilities
  2. Once the log has been queried for user(s) accounts in question, the top right-hand corner of the page displays an export option. This will download a file containing data in JavaScript Object Notation (JSON) for the events the user selected to be queried.
  3. This table captures email-related operators that can be captured and written to the Unified Audit Log It also designates what is captured by default or must be manually enabled through PowerShell. Notice that FolderBind and Message Bind cannot be enabled for Owner level accounts for the UAL.
  4. Green -> On by default Red -> Can be enabled – the 2nd tier of logging
  5. JSON file format with information about multiple properties.
  6. JSON file format with information about multiple properties.
  7. Global Admins are never popped, right? Forensic evidence of email account access will not be in the target/victim account, it will be in the log data for the Global Admin that established delegate rights and accessed the target account.
  8. Establishing a baseline of access activity before the event allows for quicker identification of outliers. Forensic Fact: Unified Audit Logs default to UTC (Coordinated Universal Time, not the time zone of the user’s Office 365 account.
  9. Enabling of this Forwarding is not considered a mail rule and does not leave the traditional forensic artifacts in the logs. It also can not be identified through the Outlook Client.
  10. Run PowerShell Queries to Search globally across the tenant for those IP’s. Do they exist on any other accounts for associated Login events? If yes, then the cycle repeats - inspect those accounts further for signs of unauthorized access that may be prior unknown to those account holders. Search netblocks Example: If the offending unauthorized user originated from an IP address of 121.121.121.121, then a potentially useful search technique would be searching for all IPs in the netblock range that match the first three octets such as searching for 121.121.121* Since some actors come from servers within a similar range, this can be a helpful technique.
  11. If UAL wasn’t enabled, and you are within 30 day window, this may be a useful area of evidence to preserve. Based on conversations direct with Technical Leads at Microsoft’s Identity Cloud team, it was verified that Azure Active Directory logs remain separate and apart from the Unified Audit log as they contain Azure specific data.